Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Information Security Management

Essay Instructions:

*** Be sure to provide your OWN answers to these questions. ***
Information Security Management Short Answer
1. Discuss the Software as a Service (SaaS) model used in cloud computing.
Answer Value:8 points
Answer:
2. How might an attacker misuse a QR code?
Answer Value:8 points
Answer:
3. What is the difference between multi-factor authentication and single-factor authentication?
Answer Value:8 points
Answer:
4. Describe the purpose of a honeypot.
Answer Value:8 points
Answer:
5. What is a hot site?
Answer Value:8 points
Answer:
NEED TO SUMBIT ON THE Turnitin. Will check similarity.
Make sure you did your own work, use your own language to answer all the questions.
Submission will be sent to Turnitin to be electronically reviewed for plagiarism.

Essay Sample Content Preview:

INFORMATION SECURITY MANAGEMENT
Name:
Course Code:
Date:
1. Discuss the Software as a Service (SaaS) model used in cloud computing.
Software as a Service (SaaS) is a software distribution system which allows users to access the software over the internet with a web browser. The vendors of the software host and maintain the servers, databases and the code that makes up the application. In most cases, users subscribe to access the software and do data manipulation online. the application’s source code is the same to all customers and each customer has a portal where he/she can access the site according to the service level agreement. Data can be stored offline, online or both on the online servers and offline servers. Example of a software as a service is Adobe Creative Cloud. Adobe Creative cloud is a subscription plan that offers Adobe's creative products such as Photoshop and Premiere Pro.
2. How might an attacker misuse a QR code?
QR code can be compromised by QRLJacking. QRLJacking or Quick Response Code Login Jacking is a social engineering attack vector capable of session hijacking affecting all applications that rely on “Login with QR code” feature as a secure way to login into accounts CITATION OWA \l 1033 (OWASP, n.d.).
CITATION OWA \l 1033 (OWASP, n.d.) describes how QRLJacking works behind the scenes:
The attacker initializes a client side QR session and clones the Login QR Code into a phishing page.
The attacker then sends the phishing page to the victim.
If convinced, the victim scans the QR Code with a specific targeted Mobile App.
The mobile app sends the secret token to the target service to complete the authentication process.
As a result, attacker, who initializes a client side QR session, gains control over the victim’s account.
Then the...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: