In your role as a highly paid consultant, you are given a list of potential thre
ID: 3572183 • Letter: I
Question
In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Evaluation of privilege
Explanation / Answer
spoofing:creation of Internet protocol packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.usually it is done by using proxy servers and can be controlled by blocking of packets from outside the network with a source address inside the network which is also called as ingress filteringThis prevents an outside attacker spoofing the address of an internal machine and check furthur damage.
tampering:interfere to cause damage to a system is called as tampering.
repudition:to reject a command or any instruction
Information disclosure:revealing secret information to others .usully done by spywares and malwares and can be controlled by appropriate anti spyware a anti malwares
.Denial of service::here the person r seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.this is done to save secret information from hands of thefts
evaluation of privilage