Computer Security Assignment-Security Certifications

 

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open. 
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

Write your answers in WORD

Discussion 5

 

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Emerging Threats and discussion

here are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Impact of Big Data on Businesses

Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Big Data on Businesses.

ANALYSIS: Using 900 words, write a brief analysis, in your own words of how the article relates to the selected chapters. 

An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, 

thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Research Current Legal Rulings

 

Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.

In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action. 

For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.

  • Go to:  the Federal Register. https://www.federalregister.gov/.
  • Use the Search bar to find rulings related to your topic.
  • Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
  • Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization. 
  • Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).

Possible topics for your search:

  • Anti-malware
  • compliance/auditing
  • forensics
  • ID management
  • Intellectual property
  • Managed security service providers (MSSPs)
  • Messaging safeguards
  • Patch management
  • Perimeter defenses
  • Security information management (SIM)
  • Security event management (SEM)
  • Incident response
  • Transaction security
  • Wireless security

Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the following chart format for your summary. 

Discussion

 1. Discussion

Write 400–600 words that respond to the following questions:  

  • Explain how can we use Hash function to ensure the security of online communication?
  • How can we use Hash functions for intrusion and virus detections?
  • Provide real life examples support your initial post.

distributed systems

  

a) Briefly differentiate between lazy and (immediate) eager update propagation. How can they be compared to delayed-write and write-through policy in implementation? Which situations would they be good? 

Journal 2

  In chapter 4, the author describes four types of costs that blockchain technology can reduce. Which of the four cost types, if reduced through blockchain technology, would most impact the organization for which you currently work?  What would be the most visible impact on your job role? How could you minimize any negative impact? and also ask three questions to students.  

Journal (Original Post) Structure:

Title

Introduction

Content

Conclusion

Reference list

Please follow the instructions APA Format.

Ethical Hacking

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.