DeVry SEC 571 finale xam

    1. (TCO A) You are responsible for developing a security
    evaluation process that can be used to assess various operating systems both
    during and after development. List the five most desirable qualities your
    evaluation process should have and explain why they are important. (Be sure to
    address qualities of the evaluation process, not specific metrics for
    assessment of operating systems.) (Points : 40)
    2. (TCO B) The Open Systems Interconnection model is
    inherently inefficient. On the source host, each layer must take the work of
    higher layers, add some result, and pass the work to lower layers. On the
    destination host, each layer must process these results from lower layers and
    pass the appropriate information to upper layers. Surely this wrapping and
    unwrapping process is inefficient. Assess the security advantage of this
    layered approach. (Points : 40)

    3. (TCO C) Why is a firewall usually a good place to
    terminate a Virtual Private Network (VPN) connection from a remote user? Why
    not terminate the VPN connection at the actual servers being accessed? Under
    what circumstances would VPN termination at the server be a good idea? (Points
    : 40)

    4. (TCO D) A computer programmer has been arraigned for a
    computer crime. She is suspected of having accessed system files on a public
    Web server. The programmer’s attorney argues that his client was only trying to
    determine if the website was secure and that no harm was done to the Web server
    or its system files. The programmer’s attorney also argues that it is possible
    that the log files that show that his client accessed system files were
    tampered with. The attorney claims that the Web server was made accessible to
    the public anyway so that there was no violation of the law and that the
    arraignment against her client should be thrown out. You’re the judge. What is
    your analysis of these arguments? (Points : 40)
    5. (TCO E) After reading about attacks on servers similar to
    the ones used in one of your company’s departments, the CIO has asked you to
    come up with a report as to what, if any, steps should be taken with your
    servers. List and describe the steps you would need to take in order to
    complete a detailed report. (Points : 40)

    6. (TCO F) In the U.S., laws are enforced by police agencies
    and the courts. What are ethics and who enforces them? (Points : 40)

    7. (TCO G) Which of the following statements is true?
    (Points : 20)
    From a legal point of view, it is easier to return software
    to a store because it doesn’t meet your needs than it is to do so because the
    software is of poor quality. –
    If a programmer is, i) supervised in his work, ii) subject
    to being fired by his employer, iii) directed in his work by his employer, and
    iv) under contract for the work he is doing, it is most likely true that the
    programmer is considered the author of the work he has produced. –
    A civil judge cannot find that a plaintiff has been harmed
    and hold a defendant liable if the defendant has violated no written law –
    It is easier to prove guilt in a criminal case than it is in
    a civil case.

    8. (TCO H) Some IT department policies are designed to
    prevent behaviors by IT staff. While some depend upon the employee voluntarily
    complying with the policy (for example: do not reveal technical information to
    outside parties), others are enforced technically (for example, authentication
    required for system access). What is an example of a policy that technically
    enforces ethical behavior by IT staff? Provide policy wording for your example.
    (Points : 40)

    Order for this paper or request for a similar assignment by clicking order now below

    Order Now

    Do NOT follow this link or you will be banned from the site!