After reading this week’s materials, please respond
After reading this week’s materials, please respond to one or more of the following questions:
- describe what is meant by “defense-in-depth” in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security.
- The CIA triad is a common way of describing how confidentiality, integrity and availability concerns form the pillars of information security. Give an example from your experience or a technical article you’ve read that describes methods of improving security of information in each area of the CIA triad.
- Describe the administrative management practices of separation of duties, job rotation, and mandatory vacations and their role within operations security.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Discussion question on the importance of scanning.
Discussion question on the importance of scanning. <br/>Define scanning
and why it’s considered one of the most important phases of intelligence gathering for an attacker/hacker. Also discuss what kind of information is collected through scanning and explain why it is important to hackers?
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Describe the difference between the Biba Integrity Model
Describe the difference between the Biba Integrity Model and
the Clark-Wilson Integrity Model. Give an overview of the Bell LaPadula Confidentiality.
-own words, describe the concept of ring protection. What is the difference between Layering and data hiding?
-Describe the different components addressed within the Common Criteria used for evaluation of the security elements within a system. What is the difference between certification and accreditation of a system?.
-Define cloud computing and describe the differences between Software as as Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Define parallel computing and describe bit-level parallelism, instruction-level parallelism, task-level parallelism, and data parallelism.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Describe the four stages of the information life cycle.
Describe the four stages of the information life cycle. What is the difference between backup and archival?
- What is data remanence? Describe the four different approaches to eliminating data remanence: overwriting, degaussing, encryption, and physical destruction.
- Describe the media management tasks required to safeguard information within the media life cycle.
- Describe what data leak prevention (DLP) is and compare the benefits and drawbacks of network DLP, endpoint DLP, and hybrid DLP.
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
What is a cryptosystem and what services can cryptosystems
-What is a cryptosystem and what services can cryptosystems
provide? Give an example of a cryptosystem and describe its operation.
2. What is a “man-trap”? What is the difference between “fail-safe” and “fail-secure” configurations in how doorways with automatic locks operate?
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
From what security risks does EFS offer protection,
From what security risks does EFS offer protection, and from what
risks does it not offer protection? Describe what a “FEK” is and how it’s used? Feel free to research EFS at http://technet.microsoft.com/en-us/library/cc962103.aspx. With some detail, how can multiple people be granted access to an EFS-encrypted file?
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
Which of the following actions is not easily accomplished in an existing Excel chart:
Which of the following actions is not easily accomplished in an existing Excel chart:
Alphabetize an set of axis labels in an existing chart.
Change the chart type
Insert a chart via the Recommended Charts option
Rearrange chart data via the switch rows/columns option
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"
The Transport layer provides two service protocols
-The Transport layer provides two service protocols: UDP and
TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection-oriented versus connection-less communication.
-Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?