Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Quantitative vs. Qualitative Analysis Assignments For the first assignment, you

ID: 671516 • Letter: Q

Question

Quantitative vs. Qualitative Analysis Assignments

For the first assignment, you will need to perform a qualitative analysis on the below scenario.

Qualitative Analysis

For this part of the assignment, take these 7 risks and arrange them into a spreadsheet. Perform a probability assessment and write about the impact of the risk for each.

Category(Risk)

Probability(0.0-1.0)

Impact(0-100)

Risk Level(P*1)

Description

Zombies

.02

90

1.8

Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations.

Viruses

Worms

Spyware

Trojan horses

Adware

Botnets

Category(Risk)

Probability(0.0-1.0)

Impact(0-100)

Risk Level(P*1)

Description

Zombies

.02

90

1.8

Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations.

Viruses

Worms

Spyware

Trojan horses

Adware

Botnets

Explanation / Answer

Category(Risk) Probability(0.0-1.0) Impact(0-100) Risk Level(P*1) Description Zombies 0.02 90 1.8 Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations. Viruses 0.6 95 A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Worms 40 While the specific purpose of a computer worm varies depending on its code, in general a worm will usually make copies of itself so it can spread to other computers without anybody knowing. It can send email using an address book stored on the computer and it can inconspicuously open TCP ports to create holes in your security security. Because this kind of malware becomes so intertwined with the system files, it is easy for it to bypass your firewall and infect any other computer that your computer communicates with. Spyware 45 n its most benign form, spyware can gather data on your Web surfing habits and serve up ads for specific products or services. It can also turn your computer into a zombie system, sending spam e-mail messages to your contacts and far beyond. Your system can also be used to store data, such as e-mail lists, personal information or illegal images. Some spyware programs are designed to capture every keystroke and mouse click, allowing hackers to follow you around the Web in real time, as you log in to your bank account or other important sites. Trojan horses 45 Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include: • Deleting data • Blocking data • Modifying data • Copying data • Disrupting the performance of computers or computer networks Adware 50 it may make changes to the operating system to make its removal more difficult. It may create many processes to prevent removal and ensure an abundance of displayed ads. It is not “quality” software and is usually poorly written from a performance and stability perspective. It will use part of your internet connection speed to display ads and thereby slow your legitimate traffic to the internet. It may download other adware software from the same company or other partner companies. Botnets 30 There are botnets out there which have many hundreds of thousands of nodes. This is pure power as only a few individuals control them. Nowadays, nearly everyone has an ADSL- like connection at home w i t h about 40KB/s upstream to the Internet. There is no way to protect critical systems effectively against DdoS attacks initiated from so many zombies simultaneously. In most cases it would be enough to start an attack from a few hundred or f e w thousand systems in order to bring almost every server down, so t h a t it won’t be able to handle incoming connections. One of the biggest problems is that most users don’t even know that their systems are being hacked and are no longer under their own control. There are still many computers connected to the Internet which are not at all well enough protected or secure. Many users don’t update their computers or even use an antivirus program.