Question: 3. Using the Web, search for software firewalls. Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a

3. Using the Web, search for "software
3. Using the Web, search for "software
3. Using the Web, search for "software firewalls." Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package. 4. Access the firewall available on your personal computer (e.g. Windows Defender Firewall). Read the firewall documentation to determine how to configure inbound and outbound rules for it and practice defining rules for some applications of your choice. Write about your experience. Questions: 1. Suppose Advanced Communications has a new application development project with projected revenues of $2 million. Using the following table, calculate the ARO and ALE for each threat category the company faces for this project. Threat Category Cost per Incident (SLE) Frequency of Occurrence Programmer mistakes $5,000 1 per week Loss of intellectual property $75,000 1 per year $500 1 per week Software piracy Theft of information (hacker) $2,500 1 per quarter 1 per 6 months Theft of information (employee) Web defacement $5,000 $500 1 per month Theft of equipment $5,000 1 per year Viruses, worms, Trojan horses $1,500 1 per week Denial-of-service attacks $2,500 1 per quarter Earthquake $250,000 1 per 20 years Flood Fire $250,000 $500,000 1 per 10 years 1 per 10 years 3. Using the Web, search for "software firewalls." Examine the various alternatives available and compare their functionality, cost, features, and type of protection. Create a weighted ranking according to your own evaluation of the features and specifications of each software package. 4. Access the firewall available on your personal computer (e.g. Windows Defender Firewall). Read the firewall documentation to determine how to configure inbound and outbound rules for it and practice defining rules for some applications of your choice. Write about your experience. Questions: 1. Suppose Advanced Communications has a new application development project with projected revenues of $2 million. Using the following table, calculate the ARO and ALE for each threat category the company faces for this project. Threat Category Cost per Incident (SLE) Frequency of Occurrence Programmer mistakes $5,000 1 per week Loss of intellectual property $75,000 1 per year $500 1 per week Software piracy Theft of information (hacker) $2,500 1 per quarter 1 per 6 months Theft of information (employee) Web defacement $5,000 $500 1 per month Theft of equipment $5,000 1 per year Viruses, worms, Trojan horses $1,500 1 per week Denial-of-service attacks $2,500 1 per quarter Earthquake $250,000 1 per 20 years Flood Fire $250,000 $500,000 1 per 10 years 1 per 10 years

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!