1 answer

Cyber Security Question: A University is considering placing a smart television in each dorm room. One...

Question:

Cyber Security Question:

A University is considering placing a smart television in each dorm room. One exciting feature for this new television is that it uses voice control, with no control buttons on the television (other than an on/off button to turn the screen on and off). There is no remote control (so that you cannot lose it). The smart television is also connected to the campus Ethernet network. The television computer is always “on” to listen to the voices in the room in case any of the voice is a command to the television.

You are asked to do a risk assessment for this system.

(a) Identify 3 assets in this environment. Describe the function or capability of each. [Expect ¼ page of discussion.]

(b) What are the confidentiality, integrity, and/or availability issues in this environment (use any combination of the three)? Discuss three issues. [Expect ¼ page of discussion.]

(c) If we use a wireless network instead of a wired network, would there be any additional concerns? Discuss three concerns. [Expect ¼ page of discussion.]

(d) What would be the possible “damages” if the three assets identified in (a) are attacked by hackers? Discuss three damages. [Expect ¼ page of discussion.]

(e) To minimize the damages to these assets, discuss the application of one management control, one operational control, and two technical controls. [Expect ½ page of discussion.]


Answers

Answers:

(a) Identify 3 assets in this environment. Describe the function or capability of each.

Answer: A Smart Television is use in a wide range of protocol to identify and retrive any type of information over the voice control command from the enviorment. The addtional feature is gained of network capabilities from outside the enviorment. Smart Television uses new type protcol(VOIP-Voice Over Internet Protocol) that will useful for the retrival of the data and scanning of any new person or object by using Voice node.Smart Television include

1.Domain Name System

2.Hardware

3.Software

4.IP adresses

5.Model

Assets found in enviorment are

A) VOIP(Voice Over Internet Prortcol): VOIP is also called as the IP-Phone.VOIP uses voice over IP Technology for the tranmission of call VOIP is the combination of the software and hardware that enables the consumer for tranmission of calling through internet(Ethernet Network). the tramsmission call through network is possible due to passing of the Data Packets from Source to the Destination

B)FireWall: Firewall is for Monitoring and Controlling the incoming and the outgoing network trafic

it keep safe from third party.it allows only the authorized user.it provide protection from the cyber crime.

it allows transmission data packets without any disturbance and safe.

C)Switch: Switch Commonly known as Hubs or MAC bridage or bridding hub.

Switch is a networking device that connect your device in your network.

Hubs on computer that coonect to other device useful in the Reciving and Forwarding of the data by using the Packet Switching

Answer:

(b) What are the confidentiality, integrity, and/or availability issues in this environment (use any combination of the three)? Discuss three issues

Answer: Likehood the combination of the confidentiality, integrity, and/or availabilityissues in enviorment are the

A)INTERNET ACESS: This is correspond to the replacement of the Internet Channel used by the Smart Television in order to the aceesses interactive services to the internet

Threat sources are the malicious person nearby home,virus.

Threats: data altered, medium replaced

B) TV Broadcast :This threat similar to a malicious replacement of the TV broadcast channel used by the TV in order to receive the contents of TV channels.

Threat sources: malicious person nearby home. –

Threats: data altered

the combination of the confidentiality, integrity, and/or availabilityissues in enviorment for Supporting assets are

Local acesses

Local Area Acesses

Television broadcast

Television Operator

VOD Provider

(c) If we use a wireless network instead of a wired network, would there be any additional concerns? Discuss three concerns

Answer:

1) The additional concern with use of the wireless network is the phsical moviability i.e we can move the Smart Television accordint our convience

2) It handles lagre number of user at a time

3) Insataneous transmission of infrmation to the social network

4) Students can easily aceesible to the wireless network than the wired network

5) Smart television can easily share their data or any information to the student all over the university

6)Wireless cable reduces cost and time expense of adding the cables on the wall

(d) What would be the possible “damages” if the three assets identified in (a) are attacked by hackers? Discuss three damages

Answer: Smart Television is Hacked then following damges produce

1) If cyber attack take place in our smart televsion the first of all hacking of all personal information present in the main memory of smart television

2) Hacking all prevoius search history cache, voice recognization files.

3)Hackers can control of voice of the Smart television and control the voice accoting to the hacker it may produce the discrimination

4)Collection of all data related to work and it stil for money and further miss use of data for doing the fruads

5) Damage of the Data Packets

(e) To minimize the damages to these assets, discuss the application of one management control, one operational control, and two technical controls.

Answer:

  1)Smart television is expressed and the purpose and scope of the IT system is well documented.

2)Smart television is designed, purchased, programmed, developed, or otherwise constructed.

3) Use og Qualititve as well as Quantitative Techniques.

4) Internal infra structure process technology should be strong.

5) Avoidance of sharing of the information.

6)internal and external , foraml an inforaml communication method should be strong.

7)Policies and procedure should be accurate.

8) Verification and recocillation should be done properly.

9)Adapt to any changes n enviorment .

10)improve with innovative practices and algein with them.

11)disposition of information, hardware, and software. Activities may include moving, archiving, discarding, or destroying information and sanitizing the hardware and software.

.

Similar Solved Questions

1 answer
Questions is based on the partial equilibrium analysis. Remember to draw relevant graphs for all questions....
Questions is based on the partial equilibrium analysis. Remember to draw relevant graphs for all questions. 3. Belgium is a small country. Suppose it consumes computer disks, some of which are produced domestically and some of which are imported from the rest of the world (ROW). It currently has a t...
1 answer
Have you ever encountered a health tradition that you found "strange?” Give us a brief description...
Have you ever encountered a health tradition that you found "strange?” Give us a brief description of the situation and tell us how you view this tradition now that we are five weeks into this course. Do you view the tradition differently now or do you view it in the same way? Why?...
1 answer
9. (15 points)Express e dr as a gamma function and find its value. State explicitly what...
9. (15 points)Express e dr as a gamma function and find its value. State explicitly what formulas and theorems you are using to reach your answer....
3 answers
Daffynition decoder: Lumberjack quartz watch First aid instructor
daffynition decoder:Lumberjackquartz watchFirst aid instructor...
1 answer
Problem 13.03 Part A Suppose you're making a scale model of the solar system showing the...
Problem 13.03 Part A Suppose you're making a scale model of the solar system showing the eight planets (not including the dwarf planet Pluto) and having each planet at its farthest position from the Sun If you use a marble of radius 16 mm for Mercury how far from the Sun must you place your oute...
1 answer
The Arizona Department of Transportation (ADoT) is considering changing statewide speed limits from 65 mph to...
The Arizona Department of Transportation (ADoT) is considering changing statewide speed limits from 65 mph to 75 mph. They wish to perform analysis on ?, the proportion of Arizona residents that favor this change. In order to prove that a majority of residents favor the change, ADoT wishes to test t...
1 answer
What are the possible mono-brominated products when you react hexane and add Br2?
What are the possible mono-brominated products when you react hexane and add Br2?...
1 answer
Ball 2 The table summarizes the known values for a completely elastic collision. Given the information,...
Ball 2 The table summarizes the known values for a completely elastic collision. Given the information, what is the mass of ball 2? mass (kg) initial velocity (m/s) final velocity (m/s) Ball 1 6.7 2.0 -6.18 -5.0 0.83 m2 = m2 = kg...
1 answer
Hello, Could you please help me to answer this question in detail? Thank you XX A.2.A....
Hello, Could you please help me to answer this question in detail? Thank you XX A.2.A. E E . Normal 1 No Spac... Heading! Heading 2 Title Seite ang 2. What is the expected growth mile markers for a 6 month infant?...
1 answer
Re System Announcements RESOURCES omework 07A -02A -03 $556,600 402,500 154,100 Tamarisk Company Income Statement For...
Re System Announcements RESOURCES omework 07A -02A -03 $556,600 402,500 154,100 Tamarisk Company Income Statement For the Year Ended December 31, 2022 Sales revenue Cost of goods sold Gross profit Selling expenses $41,400 Administrative expenses 13,800 Income from operations Interest expense Income ...
1 answer
Give an example of an order on the set R^3. Verify the order properties (trichotomy and...
Give an example of an order on the set R^3. Verify the order properties (trichotomy and transitivity)...
1 answer
M Corp. has an employee benefit plan for compensated absences that gives each employee 15 paid...
M Corp. has an employee benefit plan for compensated absences that gives each employee 15 paid vacation days. Vacation days can be carried over indefinitely. Employees can elect to receive payment in lieu of vacation days. At December 31, 2018, M's unadjusted balance of liability for compensated...
1 answer
Review Constants Periodic Table Part A A stainless steel alloy is to be analyzed for its...
Review Constants Periodic Table Part A A stainless steel alloy is to be analyzed for its chromium content A 3.90 g sample of the steel is used to produce 250.0 mL of a solution containing Cr2O72.A 10.0-mL portion of this solution is added to BaCl2 (aq). When the pH of the solution is properly adjust...
1 answer
Boswell and Johnson form a partnership on May 1, 2016. Boswell contributes cash of $74,000; Johnson...
Boswell and Johnson form a partnership on May 1, 2016. Boswell contributes cash of $74,000; Johnson conveys title to the following properties to the partnership: Book Value Fair Value Land $ 27,000 $ 52,000 Building and equipment 47,000 60,000 The partners agree to start their partne...
1 answer
The below represents the comparative financial statements of Kamla Co Kamla Corporation Comparative Income Statement For...
The below represents the comparative financial statements of Kamla Co Kamla Corporation Comparative Income Statement For the Years Ended December 31, 2016 and 2015 2016 2015 $1,228,000 $1,026,000 Net sales (all on account) Expenses: Cost of goods sold $812,000 $708,000 Selling and administrative 229...
1 answer
Not for sure about the answers. The 1 picture is the story to answer the problems.
Not for sure about the answers. The 1 picture is the story to answer the problems. Many companies rely on mystery shoppers to conduct marketing research. In recent years, mystery shopping has changed as it has taken on an even more prominent role in the implementation of marketing strategy B...