Cyber Security Planning

SUBJECT: Cyber Security Planning

QUESTION 1: (400 words with 2 JOURNAL ARTICLE REFERENCES)

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet?

Be sure to weigh security against usability.

QUESTION 2: (400 words with 2 JOURNAL ARTICLE REFERENCES)

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database.

Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals if such data were used in other ways. In your view, are such concerns justified? Why or why not?

QUESTION 3: (400 words with 2 JOURNAL ARTICLE REFERENCES)

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea.

But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it.

Explain your answer (whether you believe all data should or should not be encrypted).

QUESTION 4: (400 words with 2 JOURNAL ARTICLE REFERENCES)

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

If you do use a VPN, which one and why did you select that particular one?

QUESTION 5: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)

you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.

In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.

QUESTION 6: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)

Select one of the below biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

Biometric techniques:

1. Fingerprint recognition

2. Signature dynamics

3. Iris scanning

4. Retina scanning

5. Voice prints

6. Face recognition

QUESTION 7: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)

you learned that random numbers (or, at least, pseudo-random numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them.

Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

 

You can hire someone to answer this question! Yes, essay96.com has paper writers dedicated to completing research and summaries, critical thinking tasks, essays, coursework, and other homework tasks. It's fast and safe.