Types of malicious activities


Assignment:

DISCUSSION 1

Please respond to the following in a post of 150-200 words:

Distinguish among character, block, and stream ciphers.

Specify when to use each.

Note: Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.

DISCUSSION 2

The three major types of malicious activities that organizations' information systems face include:

  • Hostile or malicious insider activity.
  • Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  • Large scale DoS (denial-of-service) attacks.
  • Go to Strayer University Library to research one of these types of malicious activities.

Please respond to the following in a post of 150 to 200 words:

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.
  • Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.

Provide a full citation and reference, formatted according to Strayer Writing Standards.

For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Types of malicious activities
Reference No:- TGS03193059

Now Priced at $25 (50% Discount)

Recommended (97%)

Rated (4.9/5)