Information Assurance

In: Computers and Technology

Submitted By booneybrown
Words 533
Pages 3
Encryption Standards for Web Browsers
Joaquin Javier Brown
American Military University

For every operating system connected to the internet, there must be a web browser to navigate it. Given the amount of risks posed by viruses and other threats on the internet, measures must be taken to secure one’s computer against these threats. From the standpoint of a user many types of software can be implemented to prevent intrusions and detect them once they’ve occurred. In spite of this there is still an element of risk. To combat this from the side of the programmer, there has been a type of encryption that controls data flow from work stations to the internet. The level of this is encryption across most internet surfing tools is set at 128 bits of encryption. 128 bits of encryption is extremely difficult to crack. It works by utilizing 128 character comprised of ones and zeros. The reason this standard is chosen is that it strikes a balance between complexity and efficiency. It would take longer than the average human lifespan to crack, which essentially means the cracker stumbled upon the correct key within the span of half the possible combinations (Bradford). Though there are stronger types of encryption such as the one time pad, it bears to reason that having to replace the key after every single web page is loaded is inefficient. Though 128 bit encryption is indeed powerful, there are other encryption types available to the public which are even stronger. Advanced Encryption Standard (AES) is the standard which 128 bit comes from. However there are other forms of encryption offered from the same algorithm. AES can go as high as 192 and 256 bits to secure data against nearly all attacks with the exception of brute force. In terms of government level and corporation encryption, the standards are much higher. The need for better security has been…...

Similar Documents

Information Assurance

...Risk Management Framework Computer Security Division Information Technology Laboratory NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Enterprise Risk Key activities in managing enterprise-level risk—risk resulting from the operation of an information system: Categorize the information system Select set of minimum (baseline) security controls Refine the security control set based on risk assessment Document security controls in system security plan Implement the security controls in the information system Assess the security controls Determine agency-level risk and risk acceptability Authorize information system operation Monitor security controls on a continuous basis NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2 Risk Management Framework Starting Point CATEGORIZE Information System Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. MONITOR Security State Continuously track changes to the information system that may affect security controls and reassess control effectiveness. SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment. Security Life Cycle AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. IMPLEMENT Security Controls Implement...

Words: 723 - Pages: 3

Foundations of Information Assurance Assignment 5

...Administrative Center, and view or manage the directory information for those domains or domain controllers  Filter Active Directory data by using query-building search Below is an example of domain control using Active directory administrator Above figure shows the hierarchy in that particular domain Above example shows a list of users in a sub – domain. As shown by examples above, Active directory administrator can be very efficiently used to configure and manage access control thus achieving CIA for departmental LANs, departmental folders, data, etc. Source: http://www.trainsignal.com/blog/videos/windows-server-2008-r2-active-directoryadministrative-center 5. Would it be a good practice to include the account or user name in the password? Why or why not? >> It is not a good idea to have a user name in the password, because it easy for people can try to hack or decode the password. Passwords can be cracked in a variety of different ways. The most simple is the use of a word list or dictionary program to break the password by brute force. These programs compare lists of words or character combination against password until they find a match. One can build a list of probable letters used and the length of the passwords which can now be used to perform a brute force attack. Initially, attacker usually creates a word list involving the usernames, first and last names, and other related personal information to cover the weak password category before even trying......

Words: 1095 - Pages: 5

Cmgt 400 Intro to Information Assurance & Security

...Introduction These past few years have been distinct by several malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in identification of the foreign program. Therefore, the most common authentication application is done through......

Words: 1123 - Pages: 5

Cmgt 400 - Intro to Information Assurance & Security

...Assignment (Individual) - Risky Situations CMGT 400 Week 1 Assignment (Team) - Kudler Fine Foods IT Security Report -Kudler System Review CMGT 400 Week 1 Discussion Question # 1- How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Discussion Question # 2- What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 WEEK 2 CMGT 400 Week 2 Assignment (Individual) - Common Information Security Threats CMGT 400 Week 2 Assignment (Learning Team) - Kudler Fine Foods IT Security Report -Top Threats CMGT 400 Week 2 Discussion Question # 1- Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Discussion Question # 2- Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 WEEK 3 CMGT 400 Week 3 Assignment (Individual) - Disaster Securing and Protecting Information CMGT 400 Week 3 Assignment (Learning Team) - Kudler Fine Foods IT Security Report - Security Considerations CMGT 400 Week 3 Discussion Question # 1- How can a company......

Words: 627 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security) Entire Class

...CMGT 400 (Intro to Information Assurance & Security) Entire Class All Individual and Team Assignments, DQs Download` http://www.homework-aid.com/CMGT-400-Intro-to-Information-Assurance-Security-Entire-Class-089.htm?categoryId=-1 CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1405 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security) Entire Class

...CMGT 400 (Intro to Information Assurance & Security) Entire Class All Individual and Team Assignments, DQs Download` http://www.homework-aid.com/CMGT-400-Intro-to-Information-Assurance-Security-Entire-Class-089.htm?categoryId=-1 CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1405 - Pages: 6

Ites in Information Assurance

...MGS 555 Final Project TEAM RAKSHA Information Assurance, Security and Privacy Services Table of Contents SL NO | CONTENTS | PAGE NUMBERS | 1 | Introduction | 3 | 2 | Summary | 4 | 3 | Application of IT enabled services | 5 | 4 | Technologies involved | 6 | 5 | Challenges | 7 | 6 | Threat to management | 9 | 7 | Conclusion | 10 | Introduction Information Technology that enables the business by improving the quality of service is IT enabled services. ITES is the acronym for the term “IT Enabled services”. It is one of the fastest growing segments of international trade. ITES is a form of outsourced service which has emerged due to involvement of IT in various fields such as banking and finance, telecommunications, insurance, etc. It also involves the contracting of the operations and responsibilities of a specific business process to a third-party service provider. ITES sector includes services ranging from call centers, claims processing, eg. Insurance. Office operations such as accounting, data processing, data mining. Billing and collection, eg. Telephone bills. Internal audit and pay roll, eg. Salary bills on monthly basis, Cash and investment management, eg. Routine jobs given to a third party and giving importance to core business. Summary The most important aspect is the Value addition of IT enabled service. The value addition could be in the form of - Customer relationship management, improved database, improved look and feel, etc.......

Words: 941 - Pages: 4

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 358 - Pages: 2

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 7066 - Pages: 29

Cmgt 400 Intro to Information Assurance & Security

...CMGT 400 Intro To Information Assurance & Security Purchase Here: http://www.homeworkprinciples.com/downloads/cmgt-400-intro-to-information-assurance-security/ CMGT 400 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations CMGT 400 Week 2 CMGT 400 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual Assignment-Common Information Security Threats (1100+......

Words: 624 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6