Answers
Answers:
(a) Identify 3 assets in this environment. Describe the function or capability of each.
Answer: A Smart Television is use in a wide range of protocol to identify and retrive any type of information over the voice control command from the enviorment. The addtional feature is gained of network capabilities from outside the enviorment. Smart Television uses new type protcol(VOIP-Voice Over Internet Protocol) that will useful for the retrival of the data and scanning of any new person or object by using Voice node.Smart Television include
1.Domain Name System
2.Hardware
3.Software
4.IP adresses
5.Model
Assets found in enviorment are
A) VOIP(Voice Over Internet Prortcol): VOIP is also called as the IP-Phone.VOIP uses voice over IP Technology for the tranmission of call VOIP is the combination of the software and hardware that enables the consumer for tranmission of calling through internet(Ethernet Network). the tramsmission call through network is possible due to passing of the Data Packets from Source to the Destination
B)FireWall: Firewall is for Monitoring and Controlling the incoming and the outgoing network trafic
it keep safe from third party.it allows only the authorized user.it provide protection from the cyber crime.
it allows transmission data packets without any disturbance and safe.
C)Switch: Switch Commonly known as Hubs or MAC bridage or bridding hub.
Switch is a networking device that connect your device in your network.
Hubs on computer that coonect to other device useful in the Reciving and Forwarding of the data by using the Packet Switching
Answer:
(b) What are the confidentiality, integrity, and/or availability issues in this environment (use any combination of the three)? Discuss three issues
Answer: Likehood the combination of the confidentiality, integrity, and/or availabilityissues in enviorment are the
A)INTERNET ACESS: This is correspond to the replacement of the Internet Channel used by the Smart Television in order to the aceesses interactive services to the internet
Threat sources are the malicious person nearby home,virus.
Threats: data altered, medium replaced
B) TV Broadcast :This threat similar to a malicious replacement of the TV broadcast channel used by the TV in order to receive the contents of TV channels.
Threat sources: malicious person nearby home. –
Threats: data altered
the combination of the confidentiality, integrity, and/or availabilityissues in enviorment for Supporting assets are
Local acesses
Local Area Acesses
Television broadcast
Television Operator
VOD Provider
(c) If we use a wireless network instead of a wired network, would there be any additional concerns? Discuss three concerns
Answer:
1) The additional concern with use of the wireless network is the phsical moviability i.e we can move the Smart Television accordint our convience
2) It handles lagre number of user at a time
3) Insataneous transmission of infrmation to the social network
4) Students can easily aceesible to the wireless network than the wired network
5) Smart television can easily share their data or any information to the student all over the university
6)Wireless cable reduces cost and time expense of adding the cables on the wall
(d) What would be the possible “damages” if the three assets identified in (a) are attacked by hackers? Discuss three damages
Answer: Smart Television is Hacked then following damges produce
1) If cyber attack take place in our smart televsion the first of all hacking of all personal information present in the main memory of smart television
2) Hacking all prevoius search history cache, voice recognization files.
3)Hackers can control of voice of the Smart television and control the voice accoting to the hacker it may produce the discrimination
4)Collection of all data related to work and it stil for money and further miss use of data for doing the fruads
5) Damage of the Data Packets
(e) To minimize the damages to these assets, discuss the application of one management control, one operational control, and two technical controls.
Answer:
1)Smart television is expressed and the purpose and scope of the IT system is well documented.
2)Smart television is designed, purchased, programmed, developed, or otherwise constructed.
3) Use og Qualititve as well as Quantitative Techniques.
4) Internal infra structure process technology should be strong.
5) Avoidance of sharing of the information.
6)internal and external , foraml an inforaml communication method should be strong.
7)Policies and procedure should be accurate.
8) Verification and recocillation should be done properly.
9)Adapt to any changes n enviorment .
10)improve with innovative practices and algein with them.
11)disposition of information, hardware, and software. Activities may include moving, archiving, discarding, or destroying information and sanitizing the hardware and software.
.