Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please, I need answers from textbook \"Security Program and Policies: Principles

ID: 3738685 • Letter: P

Question

Please, I need answers from textbook "Security Program and Policies: Principles and Practices" author: Sari Stern Greene. 2th edition

notice: no handwriting , no picture.

Q1: Email is the most preferred way of communication in many sectors currently. Apart from its advantages in communication, emails are also prone to cause various threats to the information technology framework. Explain in the various threats (at least 2) of emails being sent over the internet or a network, and the techniques (at least 2) to protect the messages sent over emails.

Q2: Describe the activities involved in log management. How to select the appropriate data to log.

Explanation / Answer

Q1.Ans-:Threats of emails being sent over internet are-:

1.Embedded Malware-: Email can be used as a method to attack and infiltrate an organization .Mechanism like Embedding Malware in an attachment and directing a recipient to click a hyperlink that connects to a malware distribution site.

2.Hoaxes-:A hoax is deliberately fabricated falsehood Like some hoaxes ask recipients to take action that can be damaging like sending uninvited mail,or defaming an individual or group by forwarding the message on.A vast amount of money is lost every year in form of support costs and equipment workload,due to hoaxes sent by email.

Techniques to protect messages sent over emails are-:

1. To protect email messages in response to deluge of spam and email malware distribution ,blacklisting is done.Blacklisting is a list of email addresses,domain names,or IP addresses known to send unsolicited commercial email(spam) .Blacklisting is used as an email filter .The receiving email servers checks the incoming emails against the blocklist and when a match is found email is denied.

2. To mitigate the effects of Denial Service Attacks of emails ,the mail server should be configured to limit the amount of operating system resources it can consume.

Q.2.)Ans-: Log management activities are configuring log sources,including log generation,storage ,security,performing analysis of log data,initiating appropriate responses to identified events and managing the long-term storage of log data.

To select appropriate data to log .This process includes information system owners as well as information security,compliance,legal and IT personnel from which data is to be taken and analysing that data.