KINDLY THE NUMBER ONE MAKE IT ONLY LIKE 200 WORDS AND THE NUMBER TWO FOR 800 WORDS 1) Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit. The news media seems to...

1 answer below »



KINDLY THE NUMBER ONE MAKE IT ONLY LIKE 200 WORDS AND THE NUMBER TWO FOR 800 WORDS



1)


Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.
The news media seems to regularly report on organizations, government, and individuals who lose data storage devices such as hard drives or USB drives and other digital systems such as laptops, smart phones, etc.



  • What do you think is an organization’s responsibility to ensure protection and proper destruction of any sensitive or personal information regarding employees, customers, etc.?

  • How do you dispose of sensitive automated information? Do you think this is sufficient to protect your information or that of your organization? Why or why not?

  • Discuss your understanding of how disk encryption can help protect data in case the hardware is lost or stolen.

  • Do you think this is enough to protect the data? Explain your answer.



2)


INDIVIDUAL PROJECT



Assignment Description


Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.



A client of yours is concerned about external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secured. Still on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about. In addition they would like an understanding of Threat Management techniques that can be implemented with the Firewall, such as Vulnerability Testing, Penetration Testing and SIEM.


In your 3 page MS Word paper, complete the following within the suggested format:



  • Title page

  • Introduction (1-2 paragraphs)

  • Explanation of the capabilities of IDS and IPS, how they can protect at both host and network level resources, and the threats IDS/IPS may encounter (1-2 pages)

  • Describe the use of Vulnerability testing as a threat management technique. (1-2 pages)

  • Describe the use of Penetration testing and SIEM as a threat management technique(1-2 pages)Conclusion (1-2 paragraphs)

  • APA Reference List.




With regard to MY assignments (IP’s, GP’s, DB’s), consider the source before you include information from Web sites.





    • Who sponsors the Web site?


    • Is the information on the site supported by theory and research?


    • WIKIPEDIA, Yahoo Answers, dictionaries, encyclopedias, or similar websites, may NEVER be used or cited under any circumstances, on any assignment, discussion, or response for this class.


Answered 3 days AfterJul 25, 2022

Answer To: KINDLY THE NUMBER ONE MAKE IT ONLY LIKE 200 WORDS AND THE NUMBER TWO FOR 800 WORDS 1) Watch the...

Rushendra answered on Jul 26 2022
62 Votes
For USB storage
1.Do not plug an unknown USB drive into your computer. 
Use a separate USB for personal and business purposes.
2.Take advantage of security features.
Use password protection
and other encryption methods to protect files on storage devices.
3.Disable Autorun
Disable autorun and scan the devices before using them.
Use spyware and other antivirus protection.
Use antivirus software and update it periodically.
Hard disc drive
1. Physically destroy the disc:
Old hard drives should be physically destroyed to prevent security threats.
2. Degaussing:
change the magnetic properties of the old disc so that data can be recovered.
3.Disk-Wiping Programs
The software is used to wipe data, so data is never compromised.
Data is overwritten with 0/1, so old data cannot be recovered.
4.Reformat disk:
This is less safe as formatted disc data can be recovered by using alternate software.
For smart phones and laptops:
1. Password-protect your phone
Use strong securepassword for mobile
2. Set your phone to auto-lock
This means the phone will be locked after a few minutes of inactivity.
3. Saving passwords isn’t smart.
Avoid saving passwords on devices.
4. Turn off GPS, Bluetooth, and wireless features.
Turn off features when not required.
5. Be careful on Wi-Fi networks.
Only connect to secure wireless networks.
6. Download with discretion.
Kindly check if the site is from a trusted source before downloading information.
Back it up.
Use backup and disaster recovery to recover sensitive data.
References:
https://www.netstar.co.uk/how-to-protect-yourself-if-your-laptop-is-stolen/
https://www.kiplinger.com/slideshow/business/t048-s014-8-ways-to-prevent-smartphone-data-breaches/index.html
https://www.techsoup.org/support/articles-and-how-tos/preventing-data-theft
https://www.cisa.gov/uscert/ncas/tips/ST08-001
Introduction
The IDS is used to detect abnormal network trafficand alert...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here