Case Study: Jack Doe is the Community Liaison Officer for 3D Media Comm. Ltd based in Perth, Western Australia. It is assumed that Jack carries a laptop, smart phone and Surface Pro 4 everywhere he goes. His laptop specifications include an Intel i7 CPU, 16GB RAM, and Windows 10 Professional with the latest update until June 2020. Jack uses Microsoft Office Professional 2019 for all his business needs. Jack connects his laptop to the company network, whilst occasionally he uses internet cafes networks when he leaves his laptop in his car. It is understood that Jack does not use third party firewalls, anti-virus software, encryption or authentication mechanisms. 1. For the given case study, review and evaluate the objectivesof security (Confidentiality, Integrity, Availability, Authenticity and Access Control) in relation to the work environment of Jack Doe, at 3D Media Comm. 2. Clearly mention the risks and countermeasures for each objective. 3. What other types of attack can target Jack Doe working environment while connecting with different network domains (LAN, WAN, LAN-WAN, etc.). Also suggest countermeasures for each identified attack.
Case Study: Jack Doe is the Community Liaison Officer for 3D Media Comm. Ltd based in Perth, Western Australia. It is assumed that Jack carries a laptop, smart phone and Surface Pro 4 everywhere he goes. His laptop specifications include an Intel i7 CPU, 16GB RAM, and Windows 10 Professional with the latest update until June 2020. Jack uses Microsoft Office Professional 2019 for all his business needs. Jack connects his laptop to the company network, whilst occasionally he uses internet cafes networks when he leaves his laptop in his car. It is understood that Jack does not use third party firewalls, anti-virus software, encryption or authentication mechanisms. 1. For the given case study, review and evaluate the objectivesof security (Confidentiality, Integrity, Availability, Authenticity and Access Control) in relation to the work environment of Jack Doe, at 3D Media Comm. 2. Clearly mention the risks and countermeasures for each objective. 3. What other types of attack can target Jack Doe working environment while connecting with different network domains (LAN, WAN, LAN-WAN, etc.). Also suggest countermeasures for each identified attack.
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
I require a correct and unique answer that is free of plagiarism. If I see plagiarism, I will undoubtedly reduce the rating and report it. So, do not copy from anyplace.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 5 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education