Principles Of Computer Security Discussion

Principles Of Computer Security Discussion

WE WRITE ESSAYS FOR STUDENTS

Tell us about your assignment and we will find the best writer for your project

Write My Essay For Me

4.1 Assignment: Devotional

1. Review the material in the Getting Started section, including the specific Bible passages.

2. Be sure to address to the following prompts in your paper:

a. How does keeping your soul diligently and training for godliness compare to training used in the workplace?

b. How might you apply the principles presented in these verses to prepare a security awareness program?

3. Your paper should be at least 250 words in length.

4.2 Discussion: Textbook Reading

Resources

· Textbook: Principles of Computer Security: CompTIA Security and Beyond

1. Read Chapters 14–17 in your textbook.

2. Using the discussion link below, respond to the following questions:

a. What was the most useful takeaway for you from this workshop’s reading?

b. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

4.3 Discussion: Security Threats and Vulnerabilities

Resources

· Textbook: Principles of Computer Security: CompTIA Security and Beyond

1. Read Chapters 14–17 in your textbook.

2. Using the discussion link below, respond to the following prompts and questions:

a. What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?

b. How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?

3. Your initial post should be at least 300 words and supported with at least three references.

4.4 Assignment: Mitigation Strategy (Phase 2 of Final Project)

1. Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4.

2. As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).

3. Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.

a. Include a short executive summary for this assignment, which you will revise later for use in the final paper.

b. The mitigation strategy should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.

c. You may use tables or other graphic representations; however, these additions to the paper should not be included in the page count.

d. The paper should include references to any material used in preparing the paper. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.

3.3 Discussion: Protecting System Infrastructure

Read and respond in at least 150 words to at least two of your classmates’ postings

Peer Review 1:

The security of information system infrastructure comprises of CIA triad. When protection and security of data and information is discussed CIA triad is considered as it includes a model of three main components: confidentiality, integrity and availability. Each of these components represents a fundamental objective of information security. The component of confidentiality is associated with secrecy and the use of encryption making the data only available for the authorized parties. The component of integrity deals with certainty that there has been no tampering or degradation of data done and that the data has not been subjected to any unauthorized modification. The component of availability deals with the availability of information to authorized users in times of need. (The Three-Pillar Approach to Cyber Security: Data and Information Protection, n.d.) Enabling a firewall, installation of antivirus and anti spyware software, password protections, cryptographic and using VPN are a few hardware components that can be installed. Authentication methods help in protecting unauthorized access to sensitive information. From a long time cybercriminals have increasing day by day and they have been gaining access to systems and steal information and without a secure authentication the organization is at a risk. Access control has guaranteed users who have authorized permission to have appropriate access to company’s data. An organization can adopt four models of access control discretionary access control, mandatory access control, role based access control and attribute based access control. Intrusion detection system helps organization monitor network traffic for malicious activities and altering on detection. Network intrusion detection system examines traffic from all devices on the network. An example of NIDS is installing the system on subnet where firewalls are located in order. Whereas, Host intrusion detection system run on independent hosts or devices on the network. An example of HIDS can be used on mission critical machine. (GeeksforGeeks, 2020)

Peer Review 2:

· Protection of information system and infrastructure from threats like hacking, destruction or unauthorized access and use has become a crucial practice taken up by organizations from various industries to protect their sensitive data, information, communication and messages. Information security helps the company in protecting its data from attacks such as malware or phishing. The CIA triad is a mainframe used for information security which consists of confidentiality, integrity and availability as the principles of security. Confidentiality refers to concealing the information only to authorized users. Integrity aims to keep the information unaltered and in its true form. Availability refers to providing access to information when it is needed by the authorized users accessing the data. (5 Components of Information Security, 2019) With digital security measures implemented for security of information infrastructure it is also essential that the information hardware is also protected from security threats by implementing firewalls or proxy serves to provide hardware security.

· Authentication can be referred to as a process of providing a user permission to access a system or information after recognizing their user identity. When authorized credentials are provided which match the database, the user is provided the access. This process of authentication helps a company in protecting their system or sensitive data from being accessed in an unauthorized manner by a hacker or cyber criminal. It not only helps the data from unauthorized access but also helps in preventing theft or unwanted manipulation of information. The access control system includes three types/levels Discretionary access control (DAC), Non-discretionary access control (NDAC) and Role based access control (RBAC)

· An intrusion detection system can be referred to as a software that protects the network or system by monitoring and identifying suspicious or malicious activities in the network traffic and enables in discovery in case of an attack. (What Is an Intrusion Detection System, 2021)

Essay writing help – Principles Of Computer Security Discussion Online Essay Writing Agency – Pro-Dissertation.

Write my Essay. Premium essay writing services is the ideal place for homework help or essay writing service. if you are looking for affordable, high quality & non-plagiarized papers, click on the button below to place your order. Provide us with the instructions and one of our writers will deliver a unique, no plagiarism, and professional paper.

Get help with your toughest assignments and get them solved by a Reliable Custom Papers Writing Company. Save time, money and get quality papers. Buying an excellent plagiarism-free paper is a piece of cake!

All our papers are written from scratch. We can cover any assignment/essay in your field of study.

PLACE YOUR ORDER