04 Aug Define firewall security techniques
Computer Security:
Please note that the Answers for Question 1 and 2 should be shared before 3 days and all the others can be shared within in 10 days.
1. A) Discussion – Relate any incident you have been involved with that relates to a security issue. (200-300 words)
B) Assignment –
Learning About Cookies as Spyware.
Research what kind of information cookies store. You might find the following websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.
2. Discussion – Using the Web or other resources, find out what your state’s (Georgia) laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean. (200-300 words)
3. Assignment –
Using WORD, write an ORIGINAL brief essay of 300 words or more:
Find a DoS attack that has occurred in the last six months
You might find some resources at www.f-secure.com.
Note how that attack was conducted.
Write a brief explanation of how you might have defended against that specific attack.
4. A) Discussion – Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved. (200-300 Words)
B) Assignment –
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
5. A) Assignment –
Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
B) Final Project TOPIC (Topics attached as a doc below)
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research i
6. A) Discussion –
Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented. (200-300 words)
B) Assignment –
Do some basic research on security certifications.
See https://www.giac.org/.
Write a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.
C) Project Abstract –
Submit your research paper abstract here.
7. A) Assignment –
Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.