Uncategorized

Chapter 14 • Information Security and Infrastructure Protection

Writing TWO Informational Reports – 1000 words for either
a) Distant-Learning Mode: With the outbreak of coronavirus everywhere now, many educational organizations have completely or partly shifted to the distant-learning mode. Write an informational report about the challenges of this method of learning and how they can be surmounted: you have also to dwell upon the changes students have to make in order to make the most of such new style of learning.
b) Pandemics in History: Throughout history, there have been a number of pandemics, diseases that killed a huge number of people and had a negative economic impact on nations. Choose three pandemics, for example smallpox, tuberculosis and Black Death (or any other three) and write an informational report about them with special reference to their aftermaths.
c) Bullying Children: Bullying tendencies can often show very early often in childhood, and the consequences for victims can last a lifetime. Write an informational report on bullying: examples, and methods of intervention to alleviate the horrific consequences.
You should include the following in either report: a. Title Page b. Table of Contents c. List of Illustrations/ Graphics d. Introduction
3
e. At least three parts that cover the discussion f Conclusion /Summary g. List of References
Format: a. Font size for text is 12 points and 14 points for headings. b. Use two fonts only in the whole report. Arial is to be used for headings and Times New Roman is for text. c. Use a I-1/2-inch margin at the top and 1-inch margins for the left, right, and bottom. d. Spacing between lines is 1.5 lines. e. Use Roman numerals for pages before page 1 of the introduction f Use Arabic numerals for pages beginning with page I of the introduction. g. Don’t display a numeral on the title page.

interactive operation (rather than batch processing and output), rudimentary network-ing, graphics, tools and utilities, and so on.2 In many cases, the primary limitation was the capacity of the hardware. Limitations imposed by operating memory, storage, and processing speed each forced adaptations. The net effect was the absence of security. At the time, physical security (i.e., locked doors) was sufficient to protect computing resources. The primary concern of system architects was the expansion of useful func-tion and overcoming hardware limitations. Although decisions made at this early point would later have negative effects on security, they were really unavoidable. As technologies matured and found supporters in mainstream business, the computer moved from research platform to business tool. Complex software was cre-ated for business, and essential functions were transferred from armies of clerks to computer systems. Such moves were always in one direction. It is impossible to reemploy clerical staff and reimplement paper-based procedures once the existing sys-tem is gone. Furthermore, the cost savings of computers make such a backward move unlikely. This placed new emphasis on the availability of data and recovery from errors and disasters. Computer centers were created to concentrate technical expertise and provide a controlled environment in which to maximize the availability of computing resources. Innovations in fire suppression,3 efficient environmental controls,° and administrative procedures (Le., backup schedules) gave reasonable assurance against disaster. The user was undeniably part of the computing environment. During this era, legitimate users were the primary human threat to computers. More harm was caused by failure to properly maintain systems and backup schedules than from intrusion or malicious intent. When malicious intent played a part, it was typically on the part of an insider? Although there are documented cases of intrusion and loss, a much greater threat came from the relative scarcity of experts to operate and maintain systems. Once again, the operational need for availability was more pressing than security.
Personal Computers and Intruders Although recreational system intrusion was not unknown in the previous era, it was largely restricted by access to computers from insiders (see Chapter 4). Few people had access, and fewer still had the skill to break through the rudimentary security on most systems. Those who did were often deeply invested in terms of time and resources spent to acquire that knowledge.6 Recreational intrusion was a minor problem at best. The advent of the home or personal computer (PC) in 1975 marked the beginning of the democratization of computing. It also marked the movement of hacking from the old-school era to the bedroom hacker era (again, see Chapter 4).7 By the end of the 1970s, the restraint of peers and the investment in knowledge no longer provided reasonable protection against malicious users. In this era, intruders sought knowledge and resources to continue their use of computers. Much of the literature is devoted to detailing the social connections or lack thereof among intruders and hackers.8 Most pundits resort to the myth of the hacker as loner and contentious in interaction with other hackers.9 An often-overlooked facet of the hacker culture is the need for information and resources. In the early era of intru-sion, access to other computers required a phone connection, usually to a long-distance number. Thus, the search for access to resources and knowledge of how to exploit them dominated the vast majority of hacker interactions.

The post Chapter 14 • Information Security and Infrastructure Protection appeared first on My Assignment Online.

Leave a Reply

Your email address will not be published. Required fields are marked *