intrusion detection week 5
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
101
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by ProfessorProtonWombat25
I
ntrusion detection
week 5
1
a)
There is a list of potential risks in this task. Chris put himself and his family in danger
since he was easily found online. Tom approached him at a bar without his
knowledge, or his family could have been solicited. More significantly, he endangered
the military and ultimately the nation. Providing opponents with vital information
about military activities and resources could hurt our nation.
b)
In this situation, Alice and Tom are the threats. The first danger comes from Alice and
the company she works for. His web search turned up a ton of information that could
affect American national security. According to
Gunduz
(2020),
Tom poses a threat as
well because he poses as a contractor much like Chris does. He made Chris feel at
ease so that they could have delicate conversations using the knowledge he had
gathered.
According to the reading, Chris's online username, the data he puts online, the free
Wi-Fi at the coffee shop, the quiet rooms there, and the fact that he shares important
information with individuals who do not need to know in a public place are all
vulnerabilities. Chris can be identified more easily because his username contains
identifying information. According to
Humayun
(2020), the secret military capability
information Chris posted provided the opponents with unneeded intelligence, and he
also provided some insight into his personal life. An opponent may find it simpler to
overhear conversations in quiet rooms and steal information. Chris may be at
increased risk for data compromise from his connected device due to the free Wi-Fi.
c)
Chris ought to have made sure that secret discussions were not had with strangers in
secret places. According to
Yaacoub
(2022), sensitive material should only be
discussed with authorized individuals in a secure setting. Chris must also change his
username and refrain from posting anything that could be used to identify him online.
I
ntrusion detection
week 5
2
He should not publish private company information online either. Additionally, he
needs to be wary of locations that provide free Wi-Fi and quiet rooms.
References
Gunduz, M. Z., & Das, R. (2020). Cyber-security on
the
smart grid: Threats and potential
solutions.
Computer networks,
169, 107094.
Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber
security threats and vulnerabilities: a systematic mapping study.
Arabian Journal for
Science and Engineering,
45, 3171-3189.
Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber
security: Vulnerabilities, attacks, countermeasures, and
recommendations.
International Journal of Information Security, 1-44.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help