Computer Security Q - A
Computer Security Q - A
Security management must manage risks in terms of causes, effects and costs of a
security loss. The costs resulting from a security breach must be balanced with the costs
resulting from enhanced security measures. This means that systematic security
management allows counter measures to be chosen in a planned and managed way,
since too much security wastes money while too little security wastes IS capability.
Explain your understanding to the following stages in systematic management of
security.
a. Risk identification - Is the process of determining risks that could potentially occur, how
they could affect a system and their outcomes. It typically includes documenting and
communicating the concern.
b. Risk analysis or assessment - This is the study of identified risks to determine the
extent to which an organization information assets are exposed to risk. The risks may be
ranked by determining the risk magnitude, likelihood of occurrence and potential losses
that could be met in case they occur. One can make decisions whether the risk is
unacceptable or whether it is serious enough to warrant handling.
c. Risk Handling - This is the application of control to reduce risk to organizational assets
i.e.by managing identified risks so as to minimize or eliminate potential effects of the risk
to a system. Systems with contingencies to handle risks will be better prepared and have
a more cost-effective way of dealing with them.
d. Disaster Recovery - This a strategic security planning that aims to protect a system
from significant events of risks. Disaster recovery allows a system to maintain or quickly
resume to its functionality following a disaster occurrence.
e. Risk management - This is the process of identifying risk as represented by
vulnerabilities to an organization and taking steps to reduce the risk to an acceptable
level.
Firewalls fall into five major processing-mode categories. List and explain three
● Packet-filtering firewalls - Examine header information of data packets that come into the
network looking for compliance with or violation of the rules of the firewall.
● Application gateways - Application level firewall frequently installed on a dedicated
computer. Runs on a special software that acts as a proxy for a service request.
● Circuit gateways - Prevent direct connections between one network to another by
creating tunnels connecting specific processes or systems on each side of the firewall
and then allowing only authorized traffic.
● MAC Layer firewalls - Links the addresses of specific host computers to ACL entries that
identify the specific types of packets that can be sent to each host, and block all other
traffic.
● Hybrid firewalls - Combine elements of other types of firewalls.
● Investigation - Outline project scope and goals, estimate costs, Evaluate existing
resources and analyses feasibility.
● Analysis - Assess current system against plans developed during the investigation.
Develop preliminary system requirements. Study integration of new system with existing
system. Document finding and updating the feasibility findings
● Logical Design - Assess current business needs against plans developed during the
analysis phase. Select applications, data support and structures. Generate multiple
solutions or considerations.
● Physical Design - Select technologies to support solutions to the logical design i.e. select
best solutions.
● Implementation - Develop and document the software. Present the system to users and
train them. Testing and system review can also be done here.
● Maintenance - Done to support and modify the system during its useful life. Tests done
periodically to determine compliance with business needs
Risk management involves three major undertakings. List and explain them.
● Risk identification - Is the process of determining risks that could potentially occur, how
they could affect a system and their outcomes. It typically includes documenting and
communicating the concern.
● Risk assessment - This is the study of identified risks to determine the extent to which
an organization information assets are exposed to risk. The risks may be ranked by
determining the risk magnitude, likelihood of occurrence and potential losses that could
be met in case they occur. One can make decisions whether the risk is unacceptable or
whether it is serious enough to warrant handling.
● Risk Handling - This is the application of control to reduce risk to organizational assets
i.e.by managing identified risks so as to minimize or eliminate potential effects of the risk
to a system. Systems with contingencies to handle risks will be better prepared and have
a more cost-effective way of dealing with them.