Premium Essay

Csec

In:

Submitted By mosley
Words 1747
Pages 7
Government Intervening To Protect Our Cyberspace University of Maryland University College

Table of Contents Introduction page…………………………………………………………………..3 Justification to Regulate Private Industry Cybersecurity………………………3-4 Real World Threat…………………………………………………………………4-5 Methods for Government Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9

Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind: That is, developing experience in interconnecting computers and to expand productivity via resource sharing (Bosworth, 2014). These independent large-scale computer systems only had four nodes which included the big time universities like UCLA, Utah, University of California, and Stanford. At the time there was no thought of any concerns for security issues as the mainframe computer rooms

Similar Documents

Premium Essay

Csec

...CARIBBEAN SECONDARY EDUCATION CERTIFICATE® EXAMINATIONS TIMETABLE MAY-JUNE 2016 2016 MORNING Friday 15 April VISUAL ARTS 2 (General) Monday 18 April FRENCH 3 (General) SPANISH 3 (General) Oral Examinations to begin (see Note 5) Monday 25 April PHYSICAL EDUCATION AND SPORT 2 (General) Practical Examination to begin (see Note 7) Monday 02 May AFTERNOON VISUAL ARTS Paper 2 (General) Examination to begin (see Note 4) Question paper handed to candidates for Examination to be held during period 02 -11 May (see note 4) FRENCH 3 (General) SPANISH 3 (General) Oral Examinations to end (see Note 5) MUSIC 2 (General) Practical Examination to begin (see Note 8) Tuesday 03 May MECHANICAL ENGINEERING TECHNOLOGY 2 Technical – 2 hr 40 min ADDITIONAL MATHEMATICS 2 General – 2 hr 40 min CLOTHING & TEXTILES 2 General – 2 hr 10 min PHYSICAL EDUCATION AND SPORT 2 (General) Practical Examination to end Wednesday 04 May ELECTRONIC DOCUMENT PREPARATION & MGT 2 General - 2 hr 20 min Thursday 05 May TECHNICAL DRAWING 3 General – 3 hr 10 min PHYSICS 3/2*** General – 2 hr 10 min Copyright: Every application to register for the examination will be deemed to constitute an assignment by the candidates to the Council of the future copyright of all their examination work, practical or written. *** For PRIVATE candidates only. NOT for candidates registered in schools and recognized full-time educational institutions...

Words: 2689 - Pages: 11

Premium Essay

Csec Eng B

...yMacmillan Study Companions Sharon R. Wilson-Strann POETRY FOR THE CSEC® ENGLISH B EXAMINATION Second edition Prescribed list for 2012–2017 CSEC® is a registered trademark of the Caribbean Examinations Council (CXC) POETRY FOR THE CSEC® ENGLISH B EXAMINATION is an independent publication and has not been authorised, sponsored, or otherwise approved by CXC. CSEC Study Comp Poetry 2nd Ed_2011.indd i 9/6/11 4:31 PM Macmillan Education Between Towns Road, Oxford OX4 3PP A division of Macmillan Publishers Limited Companies and representatives throughout the world www.macmillan-caribbean.com ISBN: 978-0-230-41802-8 Text © Sharon R. Wilson-Strann 2011 Design and illustration © Macmillan Publishers Limited 2011 First published 2008 This edition published 2011 All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers. These materials may contain links for third party websites. We have no control over, and are not responsible for, the contents of such third party websites. Please use care when accessing them. Designed by Mike Brain Graphic Design Ltd Typeset by E Clicks Enterprise, Malaysia Cover design by Clare Webber Cover photo by Jenny Palmer The author and publishers are grateful for permission to reprint the following copyright material: Bloodaxe Books for the poem...

Words: 3558 - Pages: 15

Premium Essay

Csec 630

...CSEC630 Week 3 Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment can range from 0-100 percent. There are eight questions. • full credit- The answer is thoroughly developed and clearly stated. It represents...

Words: 376 - Pages: 2

Premium Essay

Csec 610

...------------------------------------------------- VULNERABILITES FACTING IT MANAGERS TODAY ------------------------------------------------- “THE HUMAN FACTOR” Alicia M. Frazier Abstract This paper will identify and give the proper knowledge about the single most important vulnerability that IT managers face today. It will provide significant evidence about reasons why it is the most vulnerable, its impacts on a organization, and how an organization can best address its potential impacts. “As human beings, we are vulnerable to confusing the unprecedented with the improbable. In our everyday experience, if something has never happened before, we are generally safe in assuming it is not going to happen in the future, but the exceptions can kill you and climate change is one of those exceptions”. -Al Gore What is Vulnerability? When you think of the word vulnerability what comes to mind? Although, definitions of Vulnerability may vary, Vacca (2013) defines the term as “an asset or a group of assets that can be exploited by one or more threats”. In the cyberworld vulnerability can be described as a weakness in a computer hardware or software, which could possibly become exploited. Most would consider vulnerability, as a threat as the approach in which vulnerability can be exploited through a potential cause of an incident. Today, processes and technology alone can’t assure a secure organizational...

Words: 2316 - Pages: 10

Free Essay

Csec 610

...Running Head: Lab Assignment: Password Cracking Using Cain and Abel Lab Assignment 1: Password Cracking Using Cain University of Maryland University College Fall 2015 Lab Report Provided below is a table of the different generated user accounts and their accompanied passwords, along with the methodology used to crack each and either the time it took to reveal the password or estimated time provided by Cain and Abel to generate a successful solution. NTLM HASH | | Brute Force | Dictionary Attack | User 1 | No result, due to estimated time > 4yrs | Password cracked in < 1min | UUser 2 | No result, due to estimated time > 4yrs | Password cracked in < 1min | UUser 3 | No result, due to estimated time > 4yrs | No result. Estimated Time > 3hrs. | Table1: NTLM password cracking results LM HASH | | Brute Force | Dictionary Attack | User 1 | Password cracked in < 3min | Password cracked in < 2 min | User 2 | Password cracked in < 3min | Password cracked in < 1min | User 3 | No result, estimated time >3hrs | No result, I stopped it after 5 min. | Table2: LM password cracking results 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? A dictionary attack uses a file containing words, phrases, common passwords, and other strings that are likely to be used as a password. Each word in the file...

Words: 1638 - Pages: 7

Premium Essay

Csec Ia1

...Introduction Cybercrime targets both government and private industries with various methods and motives behind them. Those various attack methods can make a significant damage ranging from an individual identity theft based scale to national scale concerning its security as a sovereign nation. In other words, cybercrime equally brings serious concerns for both private industries and government. Also, private industries have an interchangeable relationship with government agencies as client to provide services. Most of utilities-related critical infrastructure systems in every city are mostly managed by private organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry...

Words: 3978 - Pages: 16

Premium Essay

Csec 630

...CSEC630 CSEC630 - Individual Assignment Objective: Assess the security vulnerabilities of an organization's computer/network operating systems along with the techniques used to protect them. Competencies: Critical thinking Instructions: In 10-12 double-spaced pages discuss the following: 1. The relative advantages and disadvantages of at least three different measures used to protect operating systems. 2. The ease of implementation of the measures. 3. The associated security management issues related to measures discussed above. 4. The ranking of the measures from best to worst with supporting rationale. Prepare your paper in Word. Include a minimum of 5 sources. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. The assignment is due at the end of the session week 7. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT TO THE LAST MINUTE TO DO THIS. It might take several hours to do this. Resubmissions can take a day or more. For instructions, go to " Basic Turnitin Instructions" in the General Information module. After it meets all of the stated criteria, submit the paper AND the originality report in your Assignments Folder. * DUE DATE: End of Week 7 (Two Week assignment – Week 6 and Week 7). CSEC630 Individual Assignment Grading Criteria This assignment is worth 10 percent...

Words: 666 - Pages: 3

Premium Essay

Csec 620 Ia

...Hacker Culture and Mitigation: Nuclear Power Facility Khamara Harris University of Maryland University College CSEC 620 Table of Contents Abstract Page 3 Introduction Page 4 Threat Actors Page 4 Motives Page 5 Methods of Preventing/Discouraging Hackers Page 7 Conclusion Page 8 References Page 9 Abstract "All states possess an inherent right to self-defense, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says the report. "We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law." Anderson, 2012 Hacker Culture and Mitigation: Nuclear Power Facility Introduction In the past few years cyber warfare has been at an all-time high. War is no longer just bombs and weapons, but targeting a nation’s critical infrastructure as a means to benefit the other. Lately the most valuable target has been Nuclear power facilities. The largest attack on a nuclear power facility started in 2006 when President Bush was in office. President Bush and the NSA named the attack code name: Olympic Games but was later named STUXNET after that bug had been found in 2010. At this point in time STUXNET has been the most powerful cyber-attack launched by the United States. For many years STUXNET was so sophisticated that it was able to target Iran’s...

Words: 2306 - Pages: 10

Premium Essay

Csec Individual Assignment

...CSEC 610, University of Maryland University College July 12, 2014 Cybersecurity Vulnerabilities Facing IT Managers Cybersecurity Vulnerabilities Facing IT Managers Table of Contents Introduction ………………………………………………………………………………………………………………… 3 Types of Vulnerabilities ………………………………………………………………………………………………. 5 Important Vulnerability, Impact & Solutions ……………………………………………………………….. 8 References …………………………………………………………………………………………………………………… 12 Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.). Before we get into the details let first examine what exactly...

Words: 2784 - Pages: 12

Free Essay

Csec 610 Lab One

...1) Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? For the assignment we utilized Cain & Abel password recovery tool for Microsoft Operating Systems. For this lab assignment we utilized Brute Force NT LAN Manager (NTUM) and LAN Manager (LM) and Dictionary NTLM and LM hashes. (Features overview, n.d.) Brute Force is a password cracking -technique that tries every combination of numeric, alphanumeric, and special characters until the password is broken or the user is locked out. Dictionary is a technique that runs a given password against each of the words in a dictionary (file of words) until a match is found or the end of the dictionary is reached. (p. 13) Cain and Abel couples Brute Force and Dictionary with LM and NTLM hash. Based on my lab experience, my assessment is that the Dictionary NTLM Manager is the better of the processes. The table below reveals that Dictionary NTLM delivered more favorable results over LM because this process uncovered the passwords in the shortest amount of time and recovered the passwords in their entirety. Table | Brute Force LM | Brute Force NTLM | Dictionary LM | Dictionary NTLM | User1 | No password, 6-8 hours | No password, estimated time 10 years | yes, 75 seconds | yes, 40 | User2 | No password, 6-8 hours | No password, estimated time 10 years | yes, 30 | yes, 25 | User3 | No password, 6-8 hours...

Words: 971 - Pages: 4

Premium Essay

Csec 630 1

...Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? I personal like all the ways that I saw in the above list. I think that a cryptanalyst would likely to use the Histogram. I personally think it is easier to read and the information that it gives is very valuable. It gives you the frequency and percent on how many times a certain character was used. Which if I think if I was a cryptanalyst this may help me out in deciphering the encrypted text. Q2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case? I really don’t see too much change however, what I have noticed from the first histogram using Caesar cipher vs. using Vigenère I noticed that E is no longer the letter with the most characters used like it was in the Caesar cipher. As a matter of fact it is between L, and K and really doesn’t give a character to use to help decipher it. We know that the letter could be a J but how many words or even phases have a lot of Js in its message? It seems that Vigenere is the better and more difficult cipher to use. Q3. There is an error in the following ciphertext representation of this quote, what is it? What should the correct ciphertext be? (Hint: when using the CrypTool there are several ways to decode one that you can use is “Playfair” encipher...

Words: 1234 - Pages: 5

Premium Essay

Csec 640 Final Exam

...CSEC 640 Final Exam Click Link Below To Buy: http://hwaid.com/shop/2049/ • This test is open book and open note. All work, however, must be your own. You are not allowed to discuss this exam with anyone else. • Points will be awarded or deducted based upon: o The answer displays a sound understanding of the subject matter and course material. o The support used in the answer corresponds to the information sought in the question o The explanation displays a sound and thorough understanding of the matter in question. o The answer reflects the student’s own thoughtful consideration of the material. You may quote and reference other sources if you like. If you do, please cite your sources and include a bibliography with your answer. • Partial credit will be given as appropriate. Do not leave any problem blank. Many questions have no right or wrong answers. If you encounter a problem that you don’t know the answer, make a logical guess (I would like to see how you think and react). 1. [16 points total, TCP/IP] a. Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination. What problems do you see if IP reassembly is attempted in intermediate devices like routers? [8 points] Answer: b. Let’s assume that Host A (receiver) receives a TCP segment from Host B (sender) with an out-of-order sequence number that is higher than expected as shown in the diagram. Then, what do Host...

Words: 1146 - Pages: 5

Free Essay

Csec 630 Individual

...CSEC630 Individual Assignment 1 Disclaimer/Caveat/Disclosure/Whateveryouwouldliketocallthis: You are more than welcome to use my paper below as a reference. But, please be smart and do not simply copy and paste because your Prof. or TA will know. Just like you, they have access to this website as well. So be nice and smart and don't set yourself up for a failure, at the very least you should rephrase/paraphrase/reword/Whateveryouprefertocallthis. Just a suggestion, but at the end of the day, it will be your decision. :) Also, I have got at the very least 90% in each of my papers, but that DOES NOT guarantee that you will get the same. It depends almost exclusively on how your professor looks at your response and how s/he grades. The ones that I got were awesome professors and my work and my points went across to them, hence the higher grade. So, basically what I am trying to say here is that if you score less than 90% while using my papers as reference or as a whole, don't curse me out, you just got a stricter professor. :) Operating System: An Operating System (OS) is an intermediary agent between the user and the computer hardware. The OS manages the computer’s resources (hardware, abstract resources, software), allocates the resources and control programs, to prevent errors and improper computer use. (Bower, 2009) Without an OS, a state of the art hardware can serve no purpose besides being a door stopper or a paper weight. Currently, OS comes in different...

Words: 2948 - Pages: 12

Premium Essay

Csec 630 Lab 1

...Lab Assignment #1: Introduction to Encryption Algorithms CSEC 630 University of Maryland University College Professor Jingyu Zhang 1. Which tool or technique would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The best analysis tool to break the Caesar cipher is histogram because it performs a statistical analysis on cipher text which shows the frequency of each letter used in the file. This can later be compared and matched to the frequency of letters in the English language. 2. What do you notice about the histogram results when text is encrypted with the Vigenère cipher in comparison to the results of the Caesar cipher? Why is this the case? Histogram simply gives the frequency of each individual letter in cipher text without taking the plaintext into consideration. Since in Caesar cipher the relationship between plaintext and cipher text is one to one, histogram is more efficient to break the cipher. Since the key in vigenere is somewhat random the histogram shown below seems random as well. 3. There is an error in the following cipher text representation of this quote, what is it? The original unencrypted message is: TH ED IF FE RE NC EB ET WE EN ST UP ID IT YA ND GE NI US IS TH AT GE NI US HA SI TS LI MI TS The original encrypted message is: THE CORRECT CIPHERTEXT SD AH FO HL AR ST RE AS YL BS CI MQ TF NI VE TG HB SN QC NC SD TD HB SN QC DE CN IC IF OT IC This is the error example: SD...

Words: 1083 - Pages: 5

Premium Essay

Csec Timetable 2015

...CARIBBEAN SECONDARY EDUCATION CERTIFICATE® EXAMINATIONS TIMETABLE MAY-JUNE 2015 2015 Friday 17 April MORNING VISUAL ARTS 2 (General) Question paper handed to candidates for Examination to be held during period 04 -13 May (see note 4) FRENCH 3 (General) SPANISH 3 (General) Oral Examinations to begin (see Note 5) AFTERNOON Monday 20 April Monday 27 April PHYSICAL EDUCATION AND SPORT 2 (General) Practical Examination to begin (see Note 7) FRENCH 3 (General) SPANISH 3 (General) Oral Examinations to end (see Note 5) Monday 04 May VISUAL ARTS Paper 2 (General) Examination to begin (see Note 4) MUSIC 2 (General) Practical Examination to begin (see Note 8) MECHANICAL ENGINEERING TECHNOLOGY 2 Technical – 2 hr 40 min CLOTHING & TEXTILES 2 General – 2 hr 10 min ADDITIONAL MATHEMATICS 2 General – 2 hr 40 min PHYSICAL EDUCATION AND SPORT 2 (General) Practical Examination to end INTEGRATED SCIENCE SA 3/2*** # General – 2 hr 10 min Tuesday 05 May Wednesday 06 May ELECTRONIC DOCUMENT PREPARATION & MGT 2 General - 2 hr 20 min Thursday 07 May TECHNICAL DRAWING 3 General – 3 hr 10 min PHYSICS 3/2***# General – 2 hr 10 min Copyright: Every application to register for the examination will be deemed to constitute an assignment by the candidates to the Council of the future copyright of all their examination work, practical or written. 2 2015 Friday 08 May MORNING AGRICULTURAL SCIENCE D/A 1** AGRICULTURAL SCIENCE S/A 1** General – 1 hr 15 min MUSIC PAPER...

Words: 2733 - Pages: 11