Jack Doe is the Community Liaison Officer for 3D Media Comm. Ltd based in Perth, Western...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Jack Doe is the Community Liaison Officer for 3D Media Comm. Ltd based in Perth, Western Australia. It is assumed that Jack carries a laptop, smart phone and Surface Pro 4 everywhere he goes. His laptop specifications include an Intel i7 CPU, 16GB RAM, and Windows 10 Professional with the latest update until June 2020. Jack uses Microsoft Office Professional 2019 for all his business needs. Jack connects his laptop to the company network, whilst occasionally he uses internet cafes networks when he leaves his laptop in his car. It is understood that Jack does not use third party firewalls, anti-virus software, encryption or authentication mechanisms. 1. For the given case study, review and evaluate the objectives of security (Confidentiality, Integrity, Availability, Authenticity and Access Control) in relation to the work environment of Jack Doe, at 3D Media Comm. 2. Clearly mention the risks and countermeasures for each objective. 3. What other types of attack can target Jack Doe working environment while connecting with different network domains (LAN, WAN, LAN-WAN, etc.). Also suggest countermeasures for each identified attack. Jack Doe is the Community Liaison Officer for 3D Media Comm. Ltd based in Perth, Western Australia. It is assumed that Jack carries a laptop, smart phone and Surface Pro 4 everywhere he goes. His laptop specifications include an Intel i7 CPU, 16GB RAM, and Windows 10 Professional with the latest update until June 2020. Jack uses Microsoft Office Professional 2019 for all his business needs. Jack connects his laptop to the company network, whilst occasionally he uses internet cafes networks when he leaves his laptop in his car. It is understood that Jack does not use third party firewalls, anti-virus software, encryption or authentication mechanisms. 1. For the given case study, review and evaluate the objectives of security (Confidentiality, Integrity, Availability, Authenticity and Access Control) in relation to the work environment of Jack Doe, at 3D Media Comm. 2. Clearly mention the risks and countermeasures for each objective. 3. What other types of attack can target Jack Doe working environment while connecting with different network domains (LAN, WAN, LAN-WAN, etc.). Also suggest countermeasures for each identified attack.
Expert Answer:
Answer rating: 100% (QA)
1 Objectives of security in Jack Does work environment at 3D Media Comm a Confidentiality The objective of confidentiality is to prevent unauthorized access to sensitive information In Jacks case sens... View the full answer
Related Book For
Accounting Information Systems basic concepts and current issues
ISBN: 978-0078025334
3rd edition
Authors: Robert Hurt
Posted Date:
Students also viewed these computer network questions
-
Use Microsoft Access or similar database software to create a DBMS for the imaginary company called Top-Text Publishing, which is described in Case In Point 9.1 on page 410. Add several sample...
-
Use Microsoft Access or similar database software to create a DBMS for the imaginary company called TopText Publishing, which is described in Case In Point 9.1 on page 365. Add several sample records...
-
What is two-factor authentication with regard to smart cards or security tokens?
-
In Problem, find the indicated derivative. Find y (5) if d 2 y/dx 2 = 3 3x + 2.
-
Consider the same basic facts as in P12-2, but instead of a forward contract Sue purchases put options to sell 300,000 bushels at $6.20 per bushel. The options cost $0.05 a bushel. REQUIRED 1....
-
Task 4: Risk of substances forming an explosive atmosphere 4 Comment on what should be considered when assessing the risk of an explosion occurring during the spray-painting activity in the spray...
-
Some people believe that, instead of producing tangible benefits, business controls create resentment and loss of company morale. Discuss this position.
-
Bates Company issued $1,000,000, 10-year bonds and agreed to make annual sinking fund deposits of $78,000. The deposits are made at the end of each year into an account paying 6% annual interest....
-
How is Blockchain, directly linked with the "Supply chain"? And what are examples of companies that are exploring blockchains nowadays, and how?
-
Derive and solve the equation of motion for the mass m in terms of the variable x for the system shown. Neglect the mass of the lever AOC and assume small oscillations. C k2 k1 ww TxB = bo cos ot A a
-
Problem 13-23 Portfolio Returns and Deviations [LO2] Consider the following information about three stocks: Rate of Return if State Occurs Probability of State State of Economy Boom Normal of Economy...
-
What are the advantages of separating account and entry patterns?
-
In what respect do researchers act much like detectives?
-
Write two constraints of AnyEntry stability pattern.
-
A particle starts at the origin of a Cartesian coordinate system and moves with a velocity vector \(v=2 \cos 2 t \mathbf{i}+3 \sin 2 t \mathbf{j}+0.4 \mathbf{k} \mathrm{m} / \mathrm{s}\). (a)...
-
What is a QDRO?
-
You work for an appellate court judge. He gives you the trial record for an unusual criminal case and explains that he would like you to discuss specific questions that are below. Specifically, one...
-
Eleni Cabinet Company sold 2,200 cabinets during 2011 at $160 per cabinet. Its beginning inventory on January 1 was 130 cabinets at $56. Purchases made during the year were as follows: February . 225...
-
a. What is the distinguishing characteristic of e-business that makes it different from traditional brick-and-mortar businesses? b. The chapter discusses five basic types of e-business arrangements....
-
a. What four common classifications are often associated with computer crime? b. What computer crimerelated risks and threats are associated with information systems? c. What categories are commonly...
-
Please refer to the following short case as you answer these questions: After earning both her accounting degree and her CPA license, Barb opened her own public accounting practice. One of her...
-
Consider the exponential-gamma mixture. This model is a special case of a MPH model. The survivor function, conditional on a multiplicative heterogeneity factor \(v\), for the exponential model is...
-
(a) Using a 50\% random sample of the McCall data set estimate the KaplanMeier nonparametric survival and integrated hazard function estimates by type of censoring, that is, by whether transition is...
-
Consider a latent variable modeled by \(\boldsymbol{y}_{i}^{*}=\mathbf{x}_{i}^{\prime} \boldsymbol{\beta}+\varepsilon_{i}\), with \(\varepsilon_{i} \sim \mathcal{N}[0,1]\). Suppose we observe only...
Study smarter with the SolutionInn App