QUESTION 1: (400 words with 2 JOURNAL ARTICLE REFERENCES)
In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet?
Be sure to weigh security against usability.
QUESTION 2: (400 words with 2 JOURNAL ARTICLE REFERENCES)
Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database.
Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals if such data were used in other ways. In your view, are such concerns justified? Why or why not?
QUESTION 3: (400 words with 2 JOURNAL ARTICLE REFERENCES)
Do you believe that all data should be encrypted? Many computing professionals think this is a good idea.
But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it.
Explain your answer (whether you believe all data should or should not be encrypted).
QUESTION 4: (400 words with 2 JOURNAL ARTICLE REFERENCES)
What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?
If you do use a VPN, which one and why did you select that particular one?
QUESTION 5: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.
In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.
QUESTION 6: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
Select one of the below biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.
Biometric techniques:
- Fingerprint recognition
- Signature dynamics
- Iris scanning
- Retina scanning
- Voice prints
- Face recognition
QUESTION 7: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
you learned that random numbers (or, at least, pseudo-random numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them.
Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.
Ethical Hacking -W8
Information Systems homework help
Report Issue
- Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals
- Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.
The post SUBJECT: Cyber Security Planning appeared first on acehomeworktutors.