2173 Salk Avenue, Suite 250 Carlsbad, CA

support@assignmentprep.info

I’m working on a computer science discussion question and need guidance to help me

June 1, 2021
Christopher R. Teeple

I’m working on a computer science discussion question and need guidance to help me understand better.I need assistance with a reply for the following questions. For reply Number 1 and Number 2, here is the criteria:Evaluate your peer’s protocols and indicate aspects of their posts that effectively address the issues of prevention and detection of malicious insider activity. Suggest additional issues not considered in your peer’s initial post.

Recommend changes to the protocols that would make them more effective. Support your suggestions and recommendations with evidence from your sources.Your responses should be a minimum of 150 words.For reply Number 3 and Number 4, here is the criteria:Evaluate your peer’s software license language. Suggest at least one additional element for the boilerplate language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.Your responses should be a minimum of 200 words.

Please provide a reply for each of the following responses:Number 1Malicious insider is anyone that has internal access or more knowledge about an organization’s structure and security procedures that aides them easy access and difficult to detect when abusing the use of the system. It is very difficult to detect a malicious insider but there are still steps and precaution that could be taken to prevent or detect a malicious insider from conducting unethical actions.Monitoring employee abnormal behavior is one way to detect a malicious insider. When an employee is behaving abnormally from the standard or required norms of their duty or acting suspicious, this could be consisted red flags and needs to be monitored.

The company has trained all employees especially managers to observe unusual or abnormal behaviors, have a conversation with the employee or person involved and if there are no changes, then the issue would be escalated to the appropriate authorities for further actions.Imitating a look alike phishing or malicious attack is another way to detect malicious insider behaviors. This tests as conducted by my company periodically got me so bad because they looked so real, after failing the test the first time, I had to take a training to remind me of how to prevent and report any malicious or suspicious information.

The second time, I failed the test due to ignorance and negligence (which anyone could be a victim of), I took the training again and was warned that I could be terminated or on probation on the third attempt (thankfully I passed) but this helped me know how to detect and prevent external or even internal attacks. This act could help determine an employee’s behavior and watch for patterns and immediately swig into action if the company is at a risk of exposure to internal or external attacks.

Two reasonable protocols that recon with me according to Reynolds (2015), are performing thorough background check as well as psychological and drug test for candidates handling sensitive information and positions, and define job roles and procedures so it is impossible for same person to both initiate and approve an action (p. 97). This two protocols are common in several organizations and have helped in preventing malicious insider behaviors, even though this does not entirely prevent such behaviors from happening, they are measures that have proven to detect any unusual or suspicious behaviors.Number 2As CIO of the company of 10,000 employees it is important to safeguard the valuable information held within the organization. The various types of proprietary and valuable data signifies the need for the organization to take the precautionary measures to ensure that this data is protected on all levels and from insider and outsider threats.

Taking into consideration the broad legal issues related to data protection two reasonable protocols that could be used to detect malicious insiders and their activity within the organization are utilizing software that will monitor the employee’s activities and detect when malicious coding and intent is being utilized. Another protocol would be utilizing time lockouts to reduce employees accessing organizational equipment when employees should not be working. Legally overtime work should be going through a process to get approved and paid to do so instead of working longer hours and not being compensated for that time.

It is unknown what the employee may be doing at the odd hours of the day using organizational equipment so safeguards such as these will mitigate a problem like that. Now taking into consideration the ethical issues related to employee monitoring, two protocols that could be used to prevent activities of malicious insiders so that they do not gain access to proprietary and valuable data is to instill the disciplinary measures and showcase them so that all employees know what to expect if they violate and partake in wrongdoings. Also training would be beneficial for the organization so that they will be able to recognize when an insider threat has been breached and also signs that indicate a potential threat may be forthcoming.

It is important to bring awareness to the organization and so that all employees know the steps and measures to take if something may arise and situation occurs.Number 3Only authorized and authenticated site users are allowed to use software on this site. The Software available on this website are provided “as is” without warranty of any kind, either express or implied. Use at your own risk. The use of the software on this site is done at your own discretion and risk and with agreement that you will be solely responsible for any damage to your computer system or loss of data that results from such activities. You are solely responsible for adequate protection and backup of the data and equipment used in connection with any of the software, and we will not be liable for any damages that you may suffer in connection with using this software. No advice or information, whether oral or written, obtained by you from us or from this website shall create any warranty for the software.

In no event shall we be liable to you or any third parties for any special, punitive, incidental, indirect or consequential damages of any kind, or any damages whatsoever, including, without limitation, those resulting from loss of use, data or profits, and on any theory of liability, arising out of or in connection with the use of this software.I added the first sentence to the above to add protection based on anonymous users, something that came to light in a 2017 case between Diageo and mySAP.Diageo had implemented a connection to mySAP through a Salesforce third party application, bypassing the mySAP requirements named user accounts (Saran, 2017).

The implication was that Diageo was breaking the license with mySAP, but the issue in this case is disclaiming that only authorized users can use the system prevents unauthorized, anonymous users, a security risk anyway, from coming in, using the system, breaking it, and suing based on their use.That first sentence protects the company from such access.Number 4A software license agreement is an agreement between a company and its buyer for the use of a software you have rights to (LegalNature, n.d.). Several companies have investigated ways to limit or avoid liabilities claims even since an uncontrollable increase in security breach.

Most organizations have concluded that to avoid these uncontrollable debt, loss, and lawsuit, they must adopt a fair remedy under Uniform Commercial Code (UCC) (Gilstrap, 2012). UCC allows businesses to spread costs more efficiently and give proper incentives to software vendors (Gilstrap, 2012). Below is a boilerplate language that could protect the company from liability risk should the third-party software crash or fail. “The Licensor agrees that the Licensee is not liable for any damages, loss or liability claims, including direct, indirect, compensatory, special, incidental, exemplary, punitive or consequential damages, connected with or resulting from use (access) of this software”.With the above language, licensee would be able to disclaim any potential liabilities claim.

Although this does not eliminate the licensor’s ability to refuse claims due to negligent misrepresentation or fraudulent inducement (Gilstrap, 2012). A fictitious example that may not sufficiently protect the company is stated below (Karlyn, 2008): “Licensor shall not be liable to licensee for any lost profits, lost revenues or opportunities, downtime, or any consequential damages or costs, resulting from any claim or cause of action based on breach of warranty, contract, negligence, or any other legal theory, even if licensor knew or should have known of the possibility thereof”.

This clause does not favor the company, it leaves the company zero to little protection whatsoever. A software license should include a mutual agreement with some clauses and protection to protect both licensor and licensee from aggregate liability. Also limitation on what damage is covered under the liability contract should be reviewed and should include the obligation of the licensor to indemnify the company for damages due to software infringes (Karlyn, 2008).

Struggling With a Similar Paper? Get Reliable Help Now.

Delivered on time. Plagiarism-free. Good Grades.

What is this?

It’s a homework service designed by a team of 23 writers based in Carlsbad, CA with one specific goal – to help students just like you complete their assignments on time and get good grades!

Why do you do it?

Because getting a degree is hard these days! With many students being forced to juggle between demanding careers, family life and a rigorous academic schedule. Having a helping hand from time to time goes a long way in making sure you get to the finish line with your sanity intact!

How does it work?

You have an assignment you need help with. Instead of struggling on this alone, you give us your assignment instructions, we select a team of 2 writers to work on your paper, after it’s done we send it to you via email.

What kind of writer will work on my paper?

Our support team will assign your paper to a team of 2 writers with a background in your degree – For example, if you have a nursing paper we will select a team with a nursing background. The main writer will handle the research and writing part while the second writer will proof the paper for grammar, formatting & referencing mistakes if any.

Our team is comprised of native English speakers working exclusively from the United States. 

Will the paper be original?

Yes! It will be just as if you wrote the paper yourself! Completely original, written from your scratch following your specific instructions.

Is it free?

No, it’s a paid service. You pay for someone to work on your assignment for you.

Is it legit? Can I trust you?

Completely legit, backed by an iron-clad money back guarantee. We’ve been doing this since 2007 – helping students like you get through college.

Will you deliver it on time?

Absolutely! We understand you have a really tight deadline and you need this delivered a few hours before your deadline so you can look at it before turning it in.

Can you get me a good grade? It’s my final project and I need a good grade.

Yes! We only pick projects where we are sure we’ll deliver good grades.

What do you need to get started on my paper?

* The full assignment instructions as they appear on your school account.

* If a Grading Rubric is present, make sure to attach it.

* Include any special announcements or emails you might have gotten from your Professor pertaining to this assignment.

* Any templates or additional files required to complete the assignment.

How do I place an order?

You can do so through our custom order page here or you can talk to our live chat team and they’ll guide you on how to do this.

How will I receive my paper?

We will send it to your email. Please make sure to provide us with your best email – we’ll be using this to communicate to you throughout the whole process.

Getting Your Paper Today is as Simple as ABC

No more missed deadlines! No more late points deductions!

}

You give us your assignments instructions via email or through our order page.

Our support team selects a qualified writing team of 2 writers for you.

l

In under 5 minutes after you place your order, research & writing begins.

Complete paper is delivered to your email before your deadline is up.

Want A Good Grade?

Get a professional writer who has worked on a similar assignment to do this paper for you