For Exercises 1 through 3, refer to the figure below:
Develop a sample threat analysis for the network in this
figure. Show assets and potential threats as in the Threat
Analysis worksheet approach discussed in class.
Assume that a security model is needed for the protection of information on your computer. Using
the CNSS model, examine each of the cells and write a brief statement on how you would address
the three components represented in that cell.
Problems 7.1 7.2
7.1 A manufacturing firm plans to consolidate two key applications on the same IT
infrastructure. The following are their service characteristics:
Application A Supports 1000 simultaneous users, each user performs on average about 5
Which of the following evaluation criteria most likely apply to
equipment evaluations, which apply to service provider evaluations,
and which apply to both?
Available Service Level Agreements (SLAs)
Standards compliance (IETF)
Mean Time Bet
Go to the following Web site http:/msisac.cisecurity.org/. Choose two of the MS-ISAC Advisories that
are listed. For each, answer the following questions IN YOUR OWN WORDS:
What is the vulnerability that has been identified?
You are a network consultant who has been asked to attend an initial meeting with the executive
management team of Hardley Davidson, Inc . Hardley Davidson manufactures motorcycles. Its new
electric motorcycle was just picked up by a large ret
Design and draw a logical topology that will support Hardley Davidsons needs.
Access Layer PCs