Question: [ CLO # 3 - Analyze / Model / Solve scenario by applying security & risk management tools / techniques ] Question 2 : Analyze

[CLO #3- Analyze/Model/Solve scenario by applying security & risk management tools/techniques]
Question 2: Analyze each of the following brief scenarios and suggest possible solutions along with a detailed explanation of any one solution. Format your answer as per the given template. [35=15
Time: 1 Hour.
Note:
The grader expects you to process each scenario similarly to the format given below.
Solutions falling outside our syllabus will get zero scores.
The same solution specified for different scenarios will be graded once.
\table[[Q2(a):],[Possible solutions:],[1. Single-line hint only],[2.],[3.],[Explanation of one solution: (3-4 lines)]]
a) A series of information security incidents took place in a recently establlshed medium-sized company. The management is concerned about the security of information systems including sensitive customer data.
b) Several research institutions are collaborating on a groundbreaking project that involves the exchange and analysis of research data. They need to exchange data over multiple networks including the Internet and it contains proprietary algorithms, experimental results, and confidential information critical to the success of the project.
c) The government is modernizing its election infrastructure to conduct secure and tamper-proof elections by a robust mechanism to validate each voter during electronic online voting.
d) A pharmaceutical research lab is equipped with state-of-the-art equipment, highly sensitive data, and proprietary research findings. The management wants real-time security to safeguard intellectual property and prevent unauthorized access.
e) A manufacturing plant producing electronics relies on an interconnected network to control automated manufacturing processes, monitor equipment, and manage sensitive intellectual property. Recent incidents of unauthorized access to various servers and bandwidth consumption by outward traffic raise concerns about potential cyber threats.
(O).
 [CLO #3- Analyze/Model/Solve scenario by applying security & risk management tools/techniques]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!