intrusion detection week 5

docx

School

Kenyatta University *

*We aren’t endorsed by this school

Course

101

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by ProfessorProtonWombat25

Report
I ntrusion detection week 5 1 a) There is a list of potential risks in this task. Chris put himself and his family in danger since he was easily found online. Tom approached him at a bar without his knowledge, or his family could have been solicited. More significantly, he endangered the military and ultimately the nation. Providing opponents with vital information about military activities and resources could hurt our nation. b) In this situation, Alice and Tom are the threats. The first danger comes from Alice and the company she works for. His web search turned up a ton of information that could affect American national security. According to Gunduz (2020), Tom poses a threat as well because he poses as a contractor much like Chris does. He made Chris feel at ease so that they could have delicate conversations using the knowledge he had gathered. According to the reading, Chris's online username, the data he puts online, the free Wi-Fi at the coffee shop, the quiet rooms there, and the fact that he shares important information with individuals who do not need to know in a public place are all vulnerabilities. Chris can be identified more easily because his username contains identifying information. According to Humayun (2020), the secret military capability information Chris posted provided the opponents with unneeded intelligence, and he also provided some insight into his personal life. An opponent may find it simpler to overhear conversations in quiet rooms and steal information. Chris may be at increased risk for data compromise from his connected device due to the free Wi-Fi. c) Chris ought to have made sure that secret discussions were not had with strangers in secret places. According to Yaacoub (2022), sensitive material should only be discussed with authorized individuals in a secure setting. Chris must also change his username and refrain from posting anything that could be used to identify him online.
I ntrusion detection week 5 2 He should not publish private company information online either. Additionally, he needs to be wary of locations that provide free Wi-Fi and quiet rooms. References Gunduz, M. Z., & Das, R. (2020). Cyber-security on the smart grid: Threats and potential solutions. Computer networks, 169, 107094. Humayun, M., Niazi, M., Jhanjhi, N. Z., Alshayeb, M., & Mahmood, S. (2020). Cyber security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering, 45, 3171-3189. Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 1-44.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help