We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>
+ Link For Assignments, GDBs & Online Quizzes Solution
+ Link For Past Papers, Solved MCQs, Short Notes & More
Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion
How to Add New Discussion in Study Group ? Step By Step Guide Click Here.
Assignment No. 01
Total Marks: 20
8th of May, 2017
Objective of this assignment is to assess the understanding of students about basics of Information Security, Security services, OSI Security Architecture, Legal, ethical and Professional Issues in Information Security.
Please read the following instructions carefully before submitting assignment:
Note: No assignment will be accepted after the due date through email in any case (load shedding, server down, internet malfunctioning etc.).
It is recommended to upload solution file at least two days before its closing date.
For any query about the assignment, contact firstname.lastname@example.org
Samsung Group is a well-known South Korean multinational company. It comprises numerous affiliated businesses, most of them united under the Samsung brand. Under the Samsung brand, they widely produce electronic devices such as mobile phones.
Samsung is planning to launch a wearable mobile design, which has an advance charging mechanism dependent on human pulse. This idea is considering as the breakthrough in wearable mobile devices and other business opponents wants to get into this idea.
Suppose you are hired as an Information security analyst. Your job is to check the current security system and you must enhance the system to deal any type of threats.
So, considering your job responsibilities, you should answer the following questions.
Question No 1: Marks:5
Samsung research department was working on pulse detection system and they have made a complete proposed circuit diagram that will help to detect the human pulse and its rate. As per the research team, it will be the final proposed design.
This circuit diagram was later sent to testing department for testing purposes, where they have found a minor mistake in proposed design.
When communicated among the research and testing departments, the research department scientists were insisting that, they have sent the working circuit diagram and it seems that the data was altered during the transmission.
So, you must ensure the data originality, which service you suggests to be implemented and why? Justify you answer.
Question No 2: Marks:5
After the approval of the proposed design, a complete circuit was compacted to an Integrated Circuit Chip (IC). This IC design was shared with a third-party hardware manufacturer XYZ for bulk production of that IC. The Samsung Research department and XYZ manufacturers shared a business account. Either the departmental head from Samsung or the CEO of XYZ firm can only withdraw the money from that account.
At the end of a month, a discrepancy of money was a found. After analysis, it was found that someone’s from XYZ firm had made that transaction but nobody was taking the responsibility.
To ensure, this should never happen again, as an information security analyst, which service would you suggest to be implemented and why? Justify your answer.
Question No 3: Marks:5
As stated, the final design was altered during transmission. Now the Research department head is insisting you to enhance or redefine the security levels so that they only specified heads or executives can access the research and design lab and all other staff should have some restrictions in this case.
Question No 4: Marks:5
During the chip (IC) manufacturing, the CEO of XYZ firm request Samsung research department to view the initial Pulse detection circuit diagram. Permission was granted by Samsung research department. Later when the CEO of XYZ firm was questioned about the need to view the initial circuit diagram, both parties were surprised that the CEO of XYZ firm never made such request. Someone outside the premises has pretended to be the CEO of XYZ firm to get the access to the initial circuit diagram.
As an information system analyst, to avoid such scenario which service you would suggest to be implemented and why? Justify your answer.
BEST OF LUCK
.+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)
+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)+ Click Here to Search (Looking For something at vustudents.ning.com?) + Click Here To Join (Our facebook study Group)
Sir is ka sol. B upland ad kr dain.
solution hai tou share kerin
Please Discuss here about this assignment.Thanks
Our main purpose here discussion not just Solution
We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>
For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.
For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.
Or visit this link