Latest Activity In Study Groups

Join Your Study Groups

VU Past Papers, MCQs and More

We non-commercial site working hard since 2009 to facilitate learning Read More. We can't keep up without your support. Donate.

Assignment No. 01 Semester: Spring 2017 Information Security – CS205 Total Marks: 20 Due Date 8th of May, 2017

Assignment No. 01
Semester: Spring 2017
Information Security – CS205

Total Marks: 20

Due Date

8th of May, 2017

 

Objectives

Objective of this assignment is to assess the understanding of students about basics of Information Security, Security services, OSI Security Architecture, Legal, ethical and Professional Issues in Information Security.

 

 

Instructions

Please read the following instructions carefully before submitting assignment:

  1. You should consult the recommended books, PowerPoint slides and audio lectures to clarify your concepts.
  2. You are supposed to submit your assignment in .doc or .docx format. Any other formats like SCAN IMAGES, PDF, ZIP, RAR and BMP will not be accepted.
  3. It should be clear that your assignment will not get any credit if:
  • The assignment is submitted after due date.
  • The assignment is copied from Internet or from any other student.
  • The submitted assignment does not open or file is corrupt.

 

Note: No assignment will be accepted after the due date through email in any case (load shedding, server down, internet malfunctioning etc.).

It is recommended to upload solution file at least two days before its closing date.

 

For any query about the assignment, contact atcs205@vu.edu.pk

 

 


 

Given Scenario

Samsung Group is a well-known South Korean multinational company. It comprises numerous affiliated businesses, most of them united under the Samsung brand. Under the Samsung brand, they widely produce electronic devices such as mobile phones.

Samsung is planning to launch a wearable mobile design, which has an advance charging mechanism dependent on human pulse. This idea is considering as the breakthrough in wearable mobile devices and other business opponents wants to get into this idea.

Suppose you are hired as an Information security analyst. Your job is to check the current security system and you must enhance the system to deal any type of threats.

So, considering your job responsibilities, you should answer the following questions.

Question No 1:                                                                                                          Marks:5

Samsung research department was working on pulse detection system and they have made a complete proposed circuit diagram that will help to detect the human pulse and its rate. As per the research team, it will be the final proposed design.

This circuit diagram was later sent to testing department for testing purposes, where they have found a minor mistake in proposed design.

When communicated among the research and testing departments, the research department scientists were insisting that, they have sent the working circuit diagram and it seems that the data was altered during the transmission.

So, you must ensure the data originality, which service you suggests to be implemented and why? Justify you answer.

Question No 2:                                                                                                          Marks:5

After the approval of the proposed design, a complete circuit was compacted to an Integrated Circuit Chip (IC). This IC design was shared with a third-party hardware manufacturer XYZ for bulk production of that IC. The Samsung Research department and XYZ manufacturers shared a business account. Either the departmental head from Samsung or the CEO of XYZ firm can only withdraw the money from that account.

At the end of a month, a discrepancy of money was a found. After analysis, it was found that someone’s from XYZ firm had made that transaction but nobody was taking the responsibility.

To ensure, this should never happen again, as an information security analyst, which service would you suggest to be implemented and why? Justify your answer.  

Question No 3:                                                                                                            Marks:5

As stated, the final design was altered during transmission. Now the Research department head is insisting you to enhance or redefine the security levels so that they only specified heads or executives can access the research and design lab and all other staff should have some restrictions in this case.

Question No 4:                                                                                                              Marks:5

During the chip (IC) manufacturing, the CEO of XYZ firm request Samsung research department to view the initial Pulse detection circuit diagram. Permission was granted by Samsung research department. Later when the CEO of XYZ firm was questioned about the need to view the initial circuit diagram, both parties were surprised that the CEO of XYZ firm never made such request. Someone outside the premises has pretended to be the CEO of XYZ firm to get the access to the initial circuit diagram.

As an information system analyst, to avoid such scenario which service you would suggest to be implemented and why? Justify your answer.

BEST OF LUCK

 

Views: 461

Attachments:

Replies to This Discussion

Sir is ka sol. B upland ad kr dain.

solution hai tou share kerin

Please Discuss here about this assignment.Thanks

Our main purpose here discussion not just Solution

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>

 

Note:-

For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Or visit this link 

Click Here For Detail.

&

.•°How to Download past papers from study groups°•. 

RSS

Looking For Something? Search Below

Latest Activity

Terry Brown replied to irshad kausar's discussion math
1 hour ago
Profile IconTerry Brown and Fahad Chaudhary joined Virtual University of Pakistan
1 hour ago
+ Dazzling smile updated their profile
3 hours ago
Muhammad Rizwan Ansari liked Karina Lopez's profile
7 hours ago
alvia khan and Shoaib Hasan Khan are now friends
7 hours ago
Huma noor left a comment for Karina Lopez
11 hours ago
Shoaib Hasan Khan updated their profile
13 hours ago
memon added a discussion to the group CS615 Software Project Management
14 hours ago

© 2022   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service