Course Hero Logo

Week 2 Homework.edited.docx - RUNNING HEAD: WEEK 2...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 11 pages.

RUNNING HEAD: WEEK 2 HOMEWORK: ASSESSING SECURITY CULTUREWEEK 2 HOMEWORK: ASSESSING SECURITY CULTURENameInstitutionCourseDate
2WEEK 2 HOMEWORK: ASSESSING SECURITY CULTUREStep 1: Measure and Set Goals1.Using outside research indicates the potential security risks of allowing employees to accesswork information on their devices. Identify at least three possible attacks that can becarried out.
3WEEK 2 HOMEWORK: ASSESSING SECURITY CULTUREadvertisements and sends unwanted information from the smartphone. Many open-sourceand mobile phone commercial applications, operating systems, and middleware arecomplicated and extensive. In normal execution, these networks can change throughseveral states(Martins & Eloff, 2002). These features make it mainly hard to grow orfunction software that is reliably correct or safe.Accessing unsecured Wi-Fi: Intruders might be looking on open Wi-Fi spots such asairports and can see everything sent over the unencrypted networks to include the logininformation at passwords to applications and sites of the company(Okere, Van Niekerk,& Carroll, 2012). If the employees download or send important corporation files over theunsecured networks, anyone using that Wi-Fi can see the files and documents.DoS: Denial-of-Service (DoS) attacks are attacks are meant to shut down networks ormachines, making them unreachable to their intended consumers (Tolah, Furnell, &Papadaki, 2017). A DoS attack achieves this by sending the target information thattriggers crashes or flooding them with traffics. In both instances, the DoS attacks deprive

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 11 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Information Security, Computer Security, Denial of service attack, da Veiga

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture