Description
- Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks. Present the basic technical knowledge that a layman would need in order to use the methods you identified.
- Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
I use Studypool every time I need help studying, and it never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
5 pages
Software Development Plan
used in structuring, planning, and controlling the process development within the information system. With the case scenar ...
Software Development Plan
used in structuring, planning, and controlling the process development within the information system. With the case scenario provided, the ideal ...
ISSC 452 discussion response
Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold b ...
ISSC 452 discussion response
Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.1. If you could, what would you do to help create a national "security culture" in which everyone is more knowledgeable and proactive about threats to information security?2. There have been several incidents of data theft or loss involving personal information held by large companies. As a result, legislation is being discussed that would provide penalties not just for data thieves, but for companies that fail to keep private information secure. Discuss your opinions about this as a group. Are such laws needed? Please give reasons to support your answer.Student one: This will be our last week and my last post. It has been a pleasure working with everyone. I must say this class has flown by. I wish every success in all of their future endeavors. R1. I think the old saying is true, “?Knowledge is power”. In order to help create a national security culture I would first aim to educate everyone. Raising awareness for the importance of information security how it directly effects everyone can help everyone buy in. Just like in a presidential election, or when a new movie star or music start takes over. In order to win over the masses you have to have appeal. I would work to appeal it to everyone and ensure everyone knows that data breaches, hackers, or other computer crimes can happen to anyone. Building a healthy security culture would also be something that I would want to implement to help create the national security culture. I would also try and recognize the people that take information security seriously and do all the right things. R2. In another class I recently read a case regarding Rite Aid and it failing to properly protecting its customers and employees. I do think that companies should be charged if they don’t ensure that sensitive information remains private. Even in the Target data breach many experts came out and said that the breach could have been prevent had their security team just done one more preventative measure. In the case of Rite Aid they were order to pay a million dollar fine. Rite Aid&risque;s information security and network would be auditing at least once every two years. I think even though this might seem a bit much to some, I don&risque;t think it is enough. I think Rite Aid and companies like it need to be hit with much heftier fines. Because the fear of fines is probably the only thing that would make a company ensure their network is safe. References5 Steps to Create a Security Culture within your Organization. (2018, January 11). Retrieved from https://resources.infosecinstitute.com/5-steps-cre...CYBER SECURITY ESSENTIALS. (2017). Place of publication not identified: CRC Press.Rite Aid Corporation, In the Matter of. (2015, January 06). Retrieved from https://www.ftc.gov/enforcement/cases-proceedings/...-BrittanyStudent two:Good morning everyone,It is beyond amazing and impressive to see that we made it to the end and we all learned a plethora of information about cybersecurity. However, there is always more to learn and improve on, which leads to the focus of the future. To create safety and as well awareness, both the government and private corporations need to be involved in a weekly and monthly basis to educate and help the public, as well as business stay safeguarded from malicious activity. There should be personal involvement so that there are monthly checks and everything is running up to speed. Same concept that the Department of Motor Vehicles (DMV) has, well same system or something similar should be employed but for computer safety. There is a lot of room for possibilities and in the process create new jobs and new entities that their sole focus is to take care of this matters.On another note, corporations and the government with their many agencies should be help accountable for data loss or theft, in which they are banned, suspended or forfeit pay to those that were affected. Take for example "Google’s revelation today that its social network Google+ suffered a second major security lapse in less than a year makes clear the Internet giant cannot be trusted to police its own platforms and underscores the need for strong laws like the California Consumer Privacy Act..." (Simpson,2019). Legislation would create the guidelines for what to do on what event(s) and how to inform the general public so that no chaos arise from these matters. Laws are needed and to be employed so that there is guidance. This shows that the government cares and works hard for its people.Lastly, I want to thank you all that read my posts and gave me amazing feedback! I hope you all continue on your endeavors, never give up, and always stay informed in this interesting yet crazy world we live in. Best of luck and I hope that you all complete your dreams and goals!v/rFranciscoReferencesAPUS LibraryTaylor, R. W., Fritsch, E. J., Liederbach, J. C. Digital Crime and Digital Terrorism. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97813232886...Graham, J., Howard, R., & Olson, R. (2011). Cyber security essentials. Boca Raton: Auerbach Publications.Simpson, J., Google’s Second Failure to Protect Data Security on Its Social Network Shows Need for California Privacy Law, 2019https://www.consumerwatchdog.org/privacy-technology/googles-second-failure-protect-data-security-its-social-network-shows-need
5 pages
Software Systems
Explain why a software system that is used in a real-world environment must change or New advances in software development ...
Software Systems
Explain why a software system that is used in a real-world environment must change or New advances in software development may make an existing piece ...
Design company case study, essay help
Answer the following questions and requirements to write your paper of 3–5 pages. As you answer each question, you must ...
Design company case study, essay help
Answer the following questions and requirements to write your paper of 3–5 pages. As you answer each question, you must provide support or evidence that will enhance and empirically prove your answers. Academic information technology (IT) articles or real-life IT findings that are not found in journals or other academic sources must be used in supporting your answers. Please use APA style for all cited sources, including your reference page.The following is a case study about a design company.You are a senior network administrator for a networking solutions firm. Years ago, you installed a small local area network (LAN) at a design company. It is growing fast and needs your networking solutions firm to upgrade its network. You assigned Liz to the job. That afternoon, while preparing to work on a lab assignment from her class in routing, Liz mentions that she would use a router to increase the performance of the design company's network because routers are better than bridges. Explain to Liz when and where a router would be the best choice. Under what circumstances would a router not be the best choice? Provide examples to clarify your points. Another technician, Janis, overhears the discussion as she sits down to examine the lab materials on Liz's desk. Janis thinks the design company should use a bridge to solve the problem. She reminds you that the design company has a relatively small network and that a router would be more equipment than necessary. The design company's network is using nonroutable protocols. What do you tell Janis? Provide examples in your explanation and recommendations. Luke also takes classes in Cisco routing, and he enjoys the hands-on exercises in his class. As he reviews his notes for that night's class, he is unsure of the concept of routing tables. Explain to Luke what kind of information is kept in a router's routing table and what it is used for. What 2 methods can be used to build these tables? Provide examples in your explanation to clarify and accentuate your explanation. As you chat with Janis and Luke, they inquire how best to monitor the routed environment. Discuss your recommendations as to monitoring and managing this type of environment. Be sure to cite all references using APA style.
Texas A & M University Network Attacks Prevention Organizations Case Study
Develop the Topic/Proposal: Work with the advisor to select a topic and develop the case study proposal; the
proposal sh ...
Texas A & M University Network Attacks Prevention Organizations Case Study
Develop the Topic/Proposal: Work with the advisor to select a topic and develop the case study proposal; the
proposal should utilize the appropriate template, for an Implementation
Project or a Research Project. Template can be found ( attached). Once the proposal has been prepared to your advisor’s satisfaction, your
advisor will forward the proposal to the
ISSC321 Database Security Research Paper DRAFT
This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to wri ...
ISSC321 Database Security Research Paper DRAFT
This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. The research paper specifications are as follows:8-10 pages (double-spaced) Times New Roman 12 pt font.Must have Abstract, Table of Contents, Introduction, Conclusion and section headingsUse at least five references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situationsYour paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.No PlagiarismUse scho
Similar Content
CU Bill for IoT Standard Legal Notation Question
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation.
...
Its 835 Monash University Enterprise Risk Management Discussion
the approach Mars, Incorporated used to implement ERM. approach University of California Health System used to implement ...
information technology and society
Compare and contrast Dell's business model with that of a traditional manufacturer. Where does IT and JIT come together to...
CSC 161 Using Java Lab Report
CSC 161 is an Intro to Comp Sci Using Java.
Please view the attached files on how to do the labs.
Please ask for any Tem...
University of The Cumberlands Information Technology Management Question
DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECT...
SEU Databases Worksheet
College of Computing and Informatics
Assignment 2
Deadline: Tuesday 14/11/2021 @ 23:59
[Total Mark for this Assignment is...
Response To The First And Second Post
Hello, nice work on this post. Indeed, cryptography has continued to benefit from technological innovations and advancemen...
It Risk Management Plan
Ways in which the risk management process in both IT and non-IT environments are There is a thin line separating the risk ...
Security Architecture And Design
Internet technology has made it possible for many firms today go for online platforms of company operations. Most services...
Related Tags
Book Guides
A Separate Peace
by John Knowles
Sense And Sensibility
by Jane Austen
The Visible Filth
by Nathan Ballingrud
Big Little Lies
by Liane Moriarty
The Fault in Our Stars
by John Green
Their Eyes Were Watching God
by Zora Neale Hurston
The Rhythm Section
by Mark Burnell
Untamed
by Glennon Doyle
Divergent
by Veronica Roth
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
5 pages
Software Development Plan
used in structuring, planning, and controlling the process development within the information system. With the case scenar ...
Software Development Plan
used in structuring, planning, and controlling the process development within the information system. With the case scenario provided, the ideal ...
ISSC 452 discussion response
Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold b ...
ISSC 452 discussion response
Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.1. If you could, what would you do to help create a national "security culture" in which everyone is more knowledgeable and proactive about threats to information security?2. There have been several incidents of data theft or loss involving personal information held by large companies. As a result, legislation is being discussed that would provide penalties not just for data thieves, but for companies that fail to keep private information secure. Discuss your opinions about this as a group. Are such laws needed? Please give reasons to support your answer.Student one: This will be our last week and my last post. It has been a pleasure working with everyone. I must say this class has flown by. I wish every success in all of their future endeavors. R1. I think the old saying is true, “?Knowledge is power”. In order to help create a national security culture I would first aim to educate everyone. Raising awareness for the importance of information security how it directly effects everyone can help everyone buy in. Just like in a presidential election, or when a new movie star or music start takes over. In order to win over the masses you have to have appeal. I would work to appeal it to everyone and ensure everyone knows that data breaches, hackers, or other computer crimes can happen to anyone. Building a healthy security culture would also be something that I would want to implement to help create the national security culture. I would also try and recognize the people that take information security seriously and do all the right things. R2. In another class I recently read a case regarding Rite Aid and it failing to properly protecting its customers and employees. I do think that companies should be charged if they don’t ensure that sensitive information remains private. Even in the Target data breach many experts came out and said that the breach could have been prevent had their security team just done one more preventative measure. In the case of Rite Aid they were order to pay a million dollar fine. Rite Aid&risque;s information security and network would be auditing at least once every two years. I think even though this might seem a bit much to some, I don&risque;t think it is enough. I think Rite Aid and companies like it need to be hit with much heftier fines. Because the fear of fines is probably the only thing that would make a company ensure their network is safe. References5 Steps to Create a Security Culture within your Organization. (2018, January 11). Retrieved from https://resources.infosecinstitute.com/5-steps-cre...CYBER SECURITY ESSENTIALS. (2017). Place of publication not identified: CRC Press.Rite Aid Corporation, In the Matter of. (2015, January 06). Retrieved from https://www.ftc.gov/enforcement/cases-proceedings/...-BrittanyStudent two:Good morning everyone,It is beyond amazing and impressive to see that we made it to the end and we all learned a plethora of information about cybersecurity. However, there is always more to learn and improve on, which leads to the focus of the future. To create safety and as well awareness, both the government and private corporations need to be involved in a weekly and monthly basis to educate and help the public, as well as business stay safeguarded from malicious activity. There should be personal involvement so that there are monthly checks and everything is running up to speed. Same concept that the Department of Motor Vehicles (DMV) has, well same system or something similar should be employed but for computer safety. There is a lot of room for possibilities and in the process create new jobs and new entities that their sole focus is to take care of this matters.On another note, corporations and the government with their many agencies should be help accountable for data loss or theft, in which they are banned, suspended or forfeit pay to those that were affected. Take for example "Google’s revelation today that its social network Google+ suffered a second major security lapse in less than a year makes clear the Internet giant cannot be trusted to police its own platforms and underscores the need for strong laws like the California Consumer Privacy Act..." (Simpson,2019). Legislation would create the guidelines for what to do on what event(s) and how to inform the general public so that no chaos arise from these matters. Laws are needed and to be employed so that there is guidance. This shows that the government cares and works hard for its people.Lastly, I want to thank you all that read my posts and gave me amazing feedback! I hope you all continue on your endeavors, never give up, and always stay informed in this interesting yet crazy world we live in. Best of luck and I hope that you all complete your dreams and goals!v/rFranciscoReferencesAPUS LibraryTaylor, R. W., Fritsch, E. J., Liederbach, J. C. Digital Crime and Digital Terrorism. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/97813232886...Graham, J., Howard, R., & Olson, R. (2011). Cyber security essentials. Boca Raton: Auerbach Publications.Simpson, J., Google’s Second Failure to Protect Data Security on Its Social Network Shows Need for California Privacy Law, 2019https://www.consumerwatchdog.org/privacy-technology/googles-second-failure-protect-data-security-its-social-network-shows-need
5 pages
Software Systems
Explain why a software system that is used in a real-world environment must change or New advances in software development ...
Software Systems
Explain why a software system that is used in a real-world environment must change or New advances in software development may make an existing piece ...
Design company case study, essay help
Answer the following questions and requirements to write your paper of 3–5 pages. As you answer each question, you must ...
Design company case study, essay help
Answer the following questions and requirements to write your paper of 3–5 pages. As you answer each question, you must provide support or evidence that will enhance and empirically prove your answers. Academic information technology (IT) articles or real-life IT findings that are not found in journals or other academic sources must be used in supporting your answers. Please use APA style for all cited sources, including your reference page.The following is a case study about a design company.You are a senior network administrator for a networking solutions firm. Years ago, you installed a small local area network (LAN) at a design company. It is growing fast and needs your networking solutions firm to upgrade its network. You assigned Liz to the job. That afternoon, while preparing to work on a lab assignment from her class in routing, Liz mentions that she would use a router to increase the performance of the design company's network because routers are better than bridges. Explain to Liz when and where a router would be the best choice. Under what circumstances would a router not be the best choice? Provide examples to clarify your points. Another technician, Janis, overhears the discussion as she sits down to examine the lab materials on Liz's desk. Janis thinks the design company should use a bridge to solve the problem. She reminds you that the design company has a relatively small network and that a router would be more equipment than necessary. The design company's network is using nonroutable protocols. What do you tell Janis? Provide examples in your explanation and recommendations. Luke also takes classes in Cisco routing, and he enjoys the hands-on exercises in his class. As he reviews his notes for that night's class, he is unsure of the concept of routing tables. Explain to Luke what kind of information is kept in a router's routing table and what it is used for. What 2 methods can be used to build these tables? Provide examples in your explanation to clarify and accentuate your explanation. As you chat with Janis and Luke, they inquire how best to monitor the routed environment. Discuss your recommendations as to monitoring and managing this type of environment. Be sure to cite all references using APA style.
Texas A & M University Network Attacks Prevention Organizations Case Study
Develop the Topic/Proposal: Work with the advisor to select a topic and develop the case study proposal; the
proposal sh ...
Texas A & M University Network Attacks Prevention Organizations Case Study
Develop the Topic/Proposal: Work with the advisor to select a topic and develop the case study proposal; the
proposal should utilize the appropriate template, for an Implementation
Project or a Research Project. Template can be found ( attached). Once the proposal has been prepared to your advisor’s satisfaction, your
advisor will forward the proposal to the
ISSC321 Database Security Research Paper DRAFT
This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to wri ...
ISSC321 Database Security Research Paper DRAFT
This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. The research paper specifications are as follows:8-10 pages (double-spaced) Times New Roman 12 pt font.Must have Abstract, Table of Contents, Introduction, Conclusion and section headingsUse at least five references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situationsYour paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.No PlagiarismUse scho
Earn money selling
your Study Documents