How will the security solution be used and by whom

Assignment Help Computer Engineering
Reference no: EM133453452

Case Study: You have just moved into a new home, and you are looking to upgrade/replace some of your Internet and networking devices. Suppose you have a budget of $1000 to buy the new devices. Research and pick a new desktop computer and a new router for your home, listing the specs while justifying your choices (like what you did in Assignment 2). The specs for each should also include the pricing and a link to where you can "purchase" it. This should be a complete thought. It could be one or more sentences. After contacting your Internet Service Provider and getting connected, you now need to secure all the devices, mobile, and stationary shown in the above diagram by fulfilling the problem requirements below. Problem Requirements 1. Research and pick a suitable computer and router for your needs. 2. All devices must be protected against intrusion from other people 3. Devices must be secure against malware 4. People using the devices must be security aware 5. Internet access must be secure from unauthorized access and/or intrusion 6. All devices must be up-to-date and properly functioning 7. All critical data must be recoverable in the event of failure 8. The digital communications environment must be safe to use and defended

Part 1: Identify Strategies Here the problem is defined in detail. The scope of the problem is stated so that it is clear why this problem is important. The impact and risks of the problem are evaluated so that each risk is named with its likelihood of occurring and its level of severity. Actions are assigned to each risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a clear declaration of their level of involvement with the problem. These people are called stakeholders. Also include in this document the computer and router you picked.

Part 2: Propose Solutions - Evaluate Solutions - Evaluate Outcomes Here possible solutions are proposed and evaluated, and alternative approaches to solving the problem are identified and discussed (use the Class Project Discussion Forum). There may be many solutions to this problem. We will call them alternative solutions. Alternative solutions should be both creative and reasonable. The goal is to choose one solution. We will call this the recommended solution. Strive to clearly explain why this recommended solution is the best solution.

Questions to consider: Use these and other questions to develop and design your solutions. These are not questions to answer directly in your submissions but only to help you solve the problem and evaluate your solutions.

1. How will the security solution be used and by whom?

2. Are devices protected from unauthorized use and intrusion?

3. Are the people using the devices cyber-security aware?

4. Can the data on the devices be recovered?

5. Is the environment defended against malware?

6. What documentation and planning prepare for security problems?

7. Is the Internet use safe from intrusion?

8. Does your solution solve the whole problem for all the people involved?

 

Reference no: EM133453452

Questions Cloud

Describe the role and importance of project management : Describe the role and importance of Project management in digital transformation. Give a short explanation triple constraint. Are there any other constraints
Why can we diagonalize languages, but not turing machines : Why can we diagonalize languages, but not Turing Machines or C++ programs? Why are the optimization versions of NP-complete decision problems typically
Explain how each stage will be performed for your project : Design a market research strategy for the E- Hospital management system project which includes the 7 stages of the market research process (research objectives
What is the main legal principal is the question about : What is the main Legal Principal is the question about? Identify parties in the scenario, their role, and how they are involved
How will the security solution be used and by whom : How will the security solution be used and by whom? Are devices protected from unauthorized use and intrusion? Are the people using the devices
Should we consider symmetric key encryption as obsolete : A public key can be registered and used to communicate with the owner of the private key. Then should we consider symmetric key encryption as obsolete?
What would be the implications : what would be the implications? If instead the proof conflicts with existing knowledge, then explain why.
Describe how you would protect your digital property : describe how you would protect your digital property and data from theft and corruption and why the particular methods were chosen. Use at least one reference
How the lack of a proper bcp drp prevented the organization : discuss whether/how a BCP/DRP helped mitigate the impact or how the lack of a proper BCP/DRP prevented the organization from properly responding to the incident

Reviews

Write a Review

Computer Engineering Questions & Answers

  How will this module be integrated within the his

Analyze the scope, strengths, and limitations of the reported algorithm? How will the abovementioned functional goals be achieved? How will this module

  Write a program that configures the uart for operation

Write a program that configures the UART for operation at 115200 baud, 8 data bits, no parity and 1 stop bit (assume an 8 MHz clock for MSP430).

  What is the type of the following unknown3 function

What is the type of the following unknown3 function? Give the most general type and include any required class constraints to the best of your understanding.

  Explain the types of software in detail

Describe two scenarios (other than those described here) for the use of this type of software: one in which the use would be ethical.

  Mutual authentication and key establishment protocol

Assume a server-assisted mutual authentication and key establishment protocol. Suppose that Alice and the Server share the pairwise symmetric key KAS; however Bob and Server share a pairwise symmetric key KBS.

  Discuss about information system management systems

To enhance the security of information systems, enterprises are developing and adopting information system management systems.

  Find the spring constants for each of two springs in series

The spring constant k is the force F divided by the amount x the spring stretches (k = F/x). See Fig. (a). For two springs in series (see Fig. (b)).

  Developing the fsm diagram

Develop the FSM diagram showing how to identify a DOS-like file name containing an optional leading drive letter and a colon, followed by an optional backslash, zero or more directory name isolated by the backslashes.

  Estimating the average memory access time

Every data reference which misses in L1 has the 60% chance of hitting in L2. A miss in L1 followed by the hit in L2 has a latency of 10 cycles. Explain the average memory access time for the load data reference within this new con?guration?

  Describe some of its essential characteristics or components

Is this new rage just a fad, a nebulous idea or a far-reaching trend? In 500+ words define this technology. List and describe some of its essential characteristics or components. Name two providers of this service and explain their package

  Implementing a streamlined information assurance program

It could be in the field of securing a wireless network, implementing a streamlined information assurance program, generic security design for a business, personal information privacy protection, etc.

  Why was basic good in the past

Historically, one of the first programming languages we learn has been some variant of BASIC. This is no longer the case. Why was BASIC good in the past?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd