Compare the information in the given three articles

Assignment Help Computer Network Security
Reference no: EM131144560

Personal and Corporate Computer Security Awareness and Countermeasures

Continuing with your efforts to educate CSII employees, you now need to provide them with the most current information about personal and corporate computer security awareness and countermeasures.

Most government agencies and employers post their own policies and procedures based on the experiences of their information technology (IT) security professionals and recommend countermeasures accordingly. Many of these government agencies and employers visit various websites (including but not limited to government websites) and offer and take advice from specialty organizations.

Here is a list of websites to consider:

• The National Institute of Standards and Technology (NIST) at https://www.nist.gov/index.html
• The Computer Security Resource Center of the NIST at https://csrc.nist.gov/
• The SANS Institute at https://www.sans.org/
• The CERT Coordination Center of the Software Engineering Institute at Carnegie Mellon University at https://www.cert.org/homeusers/HomeComputerSecurity/

Tasks:

Using the Argosy University online library resources and the websites specified above, find three articles and analyze each on two of the following topics:

• Social engineering
• Shoulder surfing
• Password or passphrase best practices
• Hardware or software firewalls
• Antivirus protection

Prepare an 8- to 10-slide Microsoft PowerPoint presentation designed to educate CSII employees about the two topics you selected. In the presentation:

• Include a definition and description of your topic as it is used in everyday life, followed by a summary of each of the three articles.
• Compare the information in the three articles and point out specific issues where the authors may disagree or emphasize different points.

The presentation should include a title slide, an objectives slide, and a reference slide. Use the Notes function to provide additional comments as though you are making this presentation to a live audience.

Cite references in APA format.

Reference no: EM131144560

Questions Cloud

Write program that initialize array with ten random integers : Write a program that initializes an array with ten random integers and then prints four lines of output, containing every element at an even index, every even element, all elements in reverse order and only the first and last element.
Social security and medicare benefits : Identify at least two changes that may occur for Social Security and Medicare benefits in the next 20 years. Then, describe key policies that the U.S. government could implement in order to ensure positive changes for Social Security and Medicare ben..
Is the technique acceptable to the client system : Potential Implementation of the Technique (PIT) - asks the following questions: can the proposed technique actually work in a practical application? What are the actual costs of this technique and the impact of the costs upon the client system? Ho..
Compute the horizontal angles in triangle abc : On the photograph of Problem 27.12, the image c of a third point C appears. Its elevation hC = 1365 ft, and its photo coordinates are xc = 2.96 in. and yc = -3.02 in. Compute the horizontal angles in triangle ABC.
Compare the information in the given three articles : Compare the information in the three articles and point out specific issues where the authors may disagree or emphasize different points.
Defines enterprise resource planning : Which answer best defines "Enterprise Resource Planning?
Important person or event in history of social psychology : Choose an important person or event in the history of social psychology. Summarize the significance of that person or event to the advancement of the field. What is something that might be different today without the influence of that person or event..
Compute the area in acres of a triangular parcel of land : Compute the area in acres of a triangular parcel of land whose sides measure 48.78 mm, 84.05 mm, and 69.36 mm on a vertical photograph taken from 6050 ft above average ground with a 152.4 mm focal length camera.
Explain how you would use the information in item selected : Explain how you would use the information in the item selected with a client or organization. Describe the types of clients or organizations that would benefit from this information. Why did you choose this item?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Case study incident-response policy

Case Study Incident-Response Policy

  Evaluate the benefits of upgrading software

Evaluate two possible replacement packages, one of which should be an upgrade to the current version of Microsoft Office. Evaluate the benefits of upgrading software as opposed to starting with a new produce line.

  Evaluate the effect of this ruling on forensic investigation

Evaluate the effect of this ruling on forensic investigations from a forensics standpoint and determine whether or not you would consider this an "open door" for criminal activity. Justify your answer

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  Outline the various security threats

Develop a strategy no more than 5-6 pages in length. The strategy should outline the various security threats that are specific to Web Security and explain how each effect the consumer, the business, and the potential applications in use.

  Case study discussing network intrusions

Research by finding an article or case study discussing ONE of the following computer crimes/incidents:

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Write down a 1400- to 2100-word paper which explains the

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd