Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In your role as a highly paid consultant, you are given a list of potential thre

ID: 3572183 • Letter: I

Question

In your role as a highly paid consultant, you are given a list of potential threats to and vulnerabilities of the current communication security protocols of an organization. You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client. Conduct research and describe resources you found that might provide insight into measuring the likelihood that some of the threats would actually occur. In the explanation, include whether you see a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data. Additionally, evaluate which communication security protocols are more effective and provide an explanation.

Spoofing

Tampering

Repudiation

Information Disclosure

Denial of Service

Evaluation of privilege

Explanation / Answer

spoofing:creation of Internet protocol packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.usually it is done by using proxy servers and can be controlled by blocking of packets from outside the network with a source address inside the network which is also called as ingress filteringThis prevents an outside attacker spoofing the address of an internal machine and check furthur damage.

tampering:interfere to cause damage to a system is called as tampering.

repudition:to reject a command or any instruction

Information disclosure:revealing secret information to others .usully done by spywares and malwares and can be controlled by appropriate anti spyware a anti malwares

.Denial of service::here the person r seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.this is done to save secret information from hands of thefts

evaluation of privilage