Chat with us, powered by LiveChat IT545-3:?Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies. P - Essayabode

IT545-3:?Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies. P

 

IT545-3: Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies.

Purpose

The purpose of this assignment is for you to engage in defining a mitigation strategy for a web server attack from within a cloud-based WAN. You will apply biometrics or cryptography as part of the solution.

Assignment Instructions

  1. You are a cybersecurity specialist working for an online retail organization that houses their network and all servers and data in the cloud. The CEO is concerned about the web servers being hacked since they are public facing, and if they are hacked, possible access gained to sensitive customer and employee data. Assume the attack to be similar to the one performed in your lab. For this assignment, make the following assumptions:
    • The organization has an outward facing website that allows customers to view and purchase their products. The web server housing this website is in the organization’s demilitarized zone (DMZ). The DMZ uses a single firewall system. Users place orders and pay using PayPal or a credit card. 
    • Other servers on the cloud-based network house several databases. One holds all customer personal and sensitive information. The second database holds employee personal and sensitive information. There is some encryption of these databases for data at rest, but not for data in transit and data in use (while data is being processed).
    • Also, on the internal network are an email server, print servers, and application servers.
  2. Discuss potential vulnerabilities in this system. 
  3. Discuss in more detail the following:
    • Biometric Authentication
      • Discuss biometric-based authentication types that are relevant in this cloud-based system
      • Select a type of biometric-based authentication you would recommend for this system and justify your recommendation
    • Addition of Encryption for data in transit and data in use (while processed)
      • Discuss why there is an emerging need for encrypting data in use in a cloud environment.
      • Provide a description of homomorphic encryption and provide a justification as to why it should be deployed in this scenario to protect data in use.
  4. Conclusion Paragraph

Assignment Requirements

The paper should be 2–3 pages, use 12 pt. Times New Roman, and be in APA format.

    Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

    Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

    Do you need an answer to this or any other questions?