Question: Question 1.Searching and Sorting Algorithms The study materials contained a number of readings and videos related to searching and sorting algorithms. The increased volume of
Question 1.Searching and Sorting Algorithms
The study materials contained a number of readings and videos related to searching and sorting algorithms. The increased volume of data available to information technology and security professionals related to potential areas of threat or vulnerability on a network make the ability to search for and sort this information an important feature of technology-based control and log analysis offerings. SNORT is an example of technology that needs to be able to search and sort effectively in order to detect anomalies on the network in the most efficient way possible to limit the impact on response time. Discuss examples of how searching and sorting technologies impact information security detection and analysis activities.
Question 2. Heaps, Stacks, Queues, and Buffers The study materials covered a range of characteristics that make up heaps, stacks, queues, and buffers, and some of the potential vulnerabilities that can result from improper coding of applications and operating systems. Discuss the features of these data structures and specific ways that they can create vulnerabilities if not handled properly. Include in the discussion strategies for secure coding procedures that will reduce the risk to information assets that can be caused by improper handling of these aspects of an application of the operating system.
Question 3. Vulnerability Reporting Software, even when it is well vetted, is typically sufficiently complex (and resources sufficiently thin) that it likely contains vulnerabilities. Those vulnerabilities are going to be discovered through the use of that software. Vulnerability reporting can be an ethical challenge for the security professional. There are differing schools of thought as to the proper approach to vulnerability reporting. Some believe that it is important to communicate vulnerabilities widely and quickly, allowing customers dependent on the software the opportunity to make choices as to how to protect the information assets of their organizations. Others believe that a discovered vulnerability should be reported to the developer of the software, giving them the opportunity to come up with a patch or fix for the vulnerability before it becomes widely known. Discuss the approach that you think is best for communicating a newly discovered vulnerability, and provide support for your position.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
