










Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of questions and answers related to cybersecurity, focusing on key issues such as security threats in virtual environments and online gaming. it explores the advantages and disadvantages of virtualization for organizations, examines the ethical and legal implications of creating malware to combat national security threats, and discusses the social risks associated with online gaming. The detailed answers provide valuable insights into cybersecurity challenges and mitigation strategies.
Typology: Exams
1 / 18
This page cannot be seen from the preview
Don't miss anything!
Running head: ASSIGNMENT QUESTIONS AND ANSWERS ON CYBERSECURITY 1
Assignment Questions and Answers on Cybersecurity Question One-Identify one security concern in a virtual environment. Does virtualization provide a totally secure environment? Why or why not? In considering the security and cost advantages, would you recommend virtualization as the best option for all organizations? Explain why you feel or do not feel that desktop virtualization is the way to go for all organizations. Before undertaking the question, it is important to know the definition of security virtualization. Security virtualization refers to the shift of different security functions from a hardware appliance to software. The software should be able to be transferred between commodity hardware. Sometimes, a company may use the cloud to ensure an effective security virtualization. The advanced nature of the security and information system management experiences increased virtualization, which brings together different network and computing environments. With the above changes, it becomes easy to initiate a flexible and cloud-based security. Concerning virtualization providing a secure environment, it is essential to note that the answer is yes. The backbone of the answer revolves around the benefits associated with security virtualization in the market. Virtualization increases the scalability, flexibility, and agility of information technology systems (Roman, Lopez, & Mambo, 2018). Increased productivity, agility, efficiency, and responsiveness makes it possible for computer systems to deal with security threats amicably. Security is also made possible through the simplification of the data center management of systems. The aspect of security virtualization providing more excellent business continuity and enabling a high level of disaster recovery is the solution towards a secure
References Khan, S. (2019). Cloud Computing Paradigm: A realistic option for Business Organizations-A Study. Journal of Multi Disciplinary Engineering Technologies, 12 (2), 85-97. Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78 , 680 - 698. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34 (1), 1-11.
Question Two-Is it acceptable to create malware to stop activities that threaten national security? Why? Could there be any consequences associated with this? Please explain. Consider some of the most recent cyber-attacks. If malware is created to defend a nation from these types of attacks, are there any legal ramifications? What would they be? Explain. Also, discuss whether you think it’s appropriate to make these attacks public. Why or why not? Explain the consequences of allowing the public to have knowledge of the workings of these software. Samples of malware comprise computer viruses, spyware, adware, and worms, among others. Their differences originate from their unprecedented growth with a link to the rapidly changing technological context that arises from the use of the internet and many other mobile services. About the creation of malware in stopping activities that threaten national security, it is essential to do so. The main reason is that the world comprises of many terrorist groups on the online and offline platforms that serve as a threat to the concept of national security. It is crucial to create malware that either collects information through spying about them and their intended purposes (Hintz & Brown, 2017). Also, malware should be designed to destroy systems that are used by criminals to plan for the destruction of my country. The consequences associated with the act is that it may place some of the systems in the country at risk of being affected. This is when individuals in the country pick them to use them to meet their needs instead of their intended objectives. The use of malware may also be redesigned to hack into government systems by local criminals instead of those which they were designed for. There are legal ramifications associated with the use of malware (Czosseck, Ottis, & Talihärm, 2011). The issue of legal ramification revolves around stakeholders such as cyber- criminals, blackmailers, swindlers, and vandals. The creation of viruses, Trojans, worms, and
References Czosseck, C., Ottis, R., & Talihärm, A. (2011). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1) , 24-34. Hintz, A., & Brown, I. (2017). Digital Citizenship amd Surveillance| Enabling Digital Citizenship? The Reshaping of Surveillance Policy After Snowden. International Journal of Communication, 11 , 20. Murch, R., So, W., Buchholz, W., Raman, S., & Peccoud, J. (2018). Cyberbiosecurity: an emerging new discipline to help safeguard the bioeconomy. Frontiers in bioengineering and biotechnology, 6 , 39.
Question Three-Identify one kind of security threat that can occur with gaming applications. Feel free to utilize the Internet in order to read about online gaming and security threats. What are some of the aspects gaming industry security designers need to consider in developing gaming applications? Can this threat be mitigated? Discuss the social risks, if any, with online gaming. What are some of the best practices for an online gamer to avoid these security risks? Gaming applications have become a common form of entertainment for growing children and some adults in the modern world. Online gaming has different features such as the infrastructural blueprint of some buildings, such as the White House and the Empire Statehouse building amount others in the world today. The amount of criminality that comes with the games is another issue to focus on (Balakrishnan & Griffiths, 2018). Games have levels that a hero has to unlock to pass through during the playing period. The gaming industry has a problem of influencing radicalization and chaotic aspects of the mind of a child, who is the leading player. Violent games may somehow create a significant influence on aggressive behavioral outcomes among the players. The above situation has a high possibility of raising children who may become detrimental to the security of the country. Online gaming also comes with the threat of criminals using it to support their needs (Adhami, Giudici, & Martinazzi, 2018). A game may have codes that are purposively meant to either unlock a system or control systems that may cause security problems. When it comes to designing different gaming applications by security designers, it is essential to focus on the security and safety of the games. The games should have the capacity to mitigate any hacking and security initiatives. It is crucial to close all loopholes associated with the games so that they are not used for the wrong purposes by innocent players who should be
References Adhami, S., Giudici, G., & Martinazzi, S. (2018). Why do businesses go crypto? An empirical analysis of initial coin offerings. Journal of Economics and Business, 100 , 64-75. Balakrishnan, J., & Griffiths, M. (2018). Loyalty towards online games, gaming addiction, and purchase intention towards online mobile in-game features. Computers in Human Behavior, 87 , 238-246. Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13 (1), 41-69.
Question Four-Identify a smart phone operating system currently being used in the mobile phone market and list a security threat to that particular operating system. Explain the level of risk that is involved with the security threat. What can be done to mitigate the risk of the threat? What types of personal practices increase the probability of security threats? You can support your description of the threat with a real case. Would it be possible to make generalizations or universal standards that help to prevent these types of security risks? Why or why not? Are there any smart phone security best practices that can be applied to the cases that your classmates have presented? Mobile security threats are many. The most common ones comprise malware, spyware, and potential unauthorized access to the data of mobile devices. The loss of data occurs when one has lost his/her mobile device. When it comes to operating systems, there are many loopholes associated with it. The mobile operating system serves only as a framework to support operational development in a device. However, the security of a device comes from a security framework that may be derived from either an anti-virus system. Therefore, when the security of mobile devices is below standards, it means that the operating system may have several problems associated with its security features (Hussain et al., 2018). This shows that the operating system may be attacked using viruses, spyware, and malware with different levels and status. The situation may create some security problems in the operations of the mobile device. Concerning the mitigation of security threats, it is important to establish a window that enables the identification of the malware types that affect the operating system. Knowing about the malware types ensure that an operating system acquires the strengths to fight it. Also, it is important to know the severity of the security since it is the one that may destroy the normal
References Cui, J., Zhang, Y., Cai, Z., Liu, A., & Li, Y. (2018). Securing display path for security-sensitive applications on mobile devices. Computers, Materials and Continua, 55 (1), 17. Ghai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9 (16), 3049 -
Hussain, M., Zaidan, A., Zidan, B., Iqbal, S., Ahmed, M., Albahri, O., & Albahri, A. (2018). Conceptual framework for the security of mobile health applications on android platform. Telematics and Informatics, 35 (5), 1335 - 1354.
Question Five-Do you agree that it is important to protect web pages even though they don’t transmit sensitive information? Identify the security threats that may affect web pages even if they don’t transmit sensitive information. Please note that you may use the Internet in order to search for information about different kinds of attacks. Read the link below… Transmission of sensitive information is the basis for the aspect of web pages having to receive a visitation from people in the market. However, some pages lack confidential information and should not be ignored when it comes to their security. I believe that the web pages, just like the rest, have essential information that does not necessarily have to be sensitive. Therefore, it is vital to have their infrastructure protected from malware and viruses in the market. Web pages are somehow connected to the system of a computer (Ibrahim & Kant, 2018). It is important to note that the security associated with the threats may spread to the rest of the browser, and this may affect the computer. Such a move requires the implementation of robust, reliable input validation. The creation of robust firewalls is one of the most significant approaches in ensuring that the operating system and the functionality of a computer system work in the best way possible. Ransomware, malware, phishing, data breaches, DDOs Attacks, and the sabotage of employees are some of the important risks that need to be evaluated at all times to enable proper development (Patil & Patil, 2017). Sensitive data is critical to focus on, and ensuring that you deal with the issue that may threaten it becomes essential to influencing positive developments. The protection starts with the servers because this serves as the place whereby the information originates from and moves to other online dimensions.
Question Six-Is it important for social networking companies to implement strict security measures to protect customer information? Why? Explain. What might be some consequences of neglecting basic security protection mechanisms in social networking applications? Ironically, according to the article below we see that the stock price of LinkedIn rose in the days after the breach. Discuss your perspectives on why this must have occurred. Networking means that more systems, processes, and procedures are connected in one platform. Therefore, companies have the role and responsibility of ensuring that they implement strict security measures in the protection of customer information. Hacking, phishing, malware integration, and connections of viruses are the risks that are associated with the risks of networking by the companies (Rathore, Sharma, Loia, Jeong, & Park, 2017). It means that the information of customers may be in danger of being stolen by unauthorized individuals. Companies need to look into security frameworks that are instrumental in ensuring robust security outcomes (Van Schaik, Jansen, Onibokun, Camp, & Kusev, 2018). Customers are always critical about the different firms when it comes to how their information is used. Thus, for them, they may choose a company that focuses on enabling the security of their data. The protection of customers’ data focuses on ensuring confidence in the relationship companies has with their customers. When neglecting the security protection of information, customers may choose dessert companies for their competitors. Also, customers may sue companies in the court of law, which may lead to either closure and financial loss (Muhammad, Sajjad, Mehmood, Rho, & Baik, 2018). Companies may also lose their market position due to a negative brand in the market. The stock of LinkedIn rose because the breach influenced the
social site to be known to the market. It became a more advanced platform for individuals when they saw it for the first time as a sensitive data platform that could be attacked.