KINDLY THE NUMBER ONE MAKE IT ONLY LIKE 200 WORDS AND THE NUMBER TWO FOR 800 WORDS
1)
Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.
The news media seems to regularly report on organizations, government, and individuals who lose data storage devices such as hard drives or USB drives and other digital systems such as laptops, smart phones, etc.
- What do you think is an organization’s responsibility to ensure protection and proper destruction of any sensitive or personal information regarding employees, customers, etc.?
- How do you dispose of sensitive automated information? Do you think this is sufficient to protect your information or that of your organization? Why or why not?
- Discuss your understanding of how disk encryption can help protect data in case the hardware is lost or stolen.
- Do you think this is enough to protect the data? Explain your answer.
2)
INDIVIDUAL PROJECT
Assignment Description
Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.
A client of yours is concerned about external intrusion on their corporate network, and those inside their environment that they seek to fire! They've heard about firewalls and they need your professional opinion as to whether, with the implementation of firewalls, they can feel 100% secured. Still on their quest to maintain a secure environment, especially with much concern on external attacks, they would like to understand what Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) are about. In addition they would like an understanding of Threat Management techniques that can be implemented with the Firewall, such as Vulnerability Testing, Penetration Testing and SIEM.
In your 3 page MS Word paper, complete the following within the suggested format:
- Title page
- Introduction (1-2 paragraphs)
- Explanation of the capabilities of IDS and IPS, how they can protect at both host and network level resources, and the threats IDS/IPS may encounter (1-2 pages)
- Describe the use of Vulnerability testing as a threat management technique. (1-2 pages)
- Describe the use of Penetration testing and SIEM as a threat management technique(1-2 pages)Conclusion (1-2 paragraphs)
- APA Reference List.
With regard to MY assignments (IP’s, GP’s, DB’s), consider the source before you include information from Web sites.
Who sponsors the Web site?
Is the information on the site supported by theory and research?
WIKIPEDIA, Yahoo Answers, dictionaries, encyclopedias, or similar websites, may NEVER be used or cited under any circumstances, on any assignment, discussion, or response for this class.