Reference no: EM132397562
Assignment: In today's world, both the government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
You must do the following:
1) Create a new thread. As indicated above, please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
2) Select AT LEAST 2 other students' threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive. (I'm looking for about a paragraph - not just "I agree.")
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
1. What did you learn from your classmate's posting?
2. What additional questions do you have after reading the posting?
3. What clarification do you need regarding the posting?
4. What differences or similarities do you see between your posting and other classmates' postings?
Discuss the counts and percentages of the categorical fields
: Discuss the Min, Max, Median, and Mean of the continuous fields. Discuss the Counts and Percentages of the categorical fields.
|
What recommendations would you make for the scenario
: Server rooms often have halogen systems for extinguishing fires. An accidental discharge of the halogen could have disastrous results. Ask students to describe.
|
Define information risk planning and management steps
: In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management steps is to develop metrics and measure results.
|
Describe the strategic importance of cloud computing
: Research at least two articles on the topic of the strategic importance of cloud computing in business organizations. Write a brief synthesis and summary of.
|
How you would reduce potential vulnerabilities
: Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
|
Security monitoring system for your building
: Security consultants for a small company and the owner would like you to purchase cameras to install as part of a security monitoring system for your building.
|
About the trends in communication and networking
: After completing your reading and assignments this week, what do you think about the trends in communication and networking?
|
Explain what tools are required to conduct a passive scan
: Explain what tools are required to conduct a passive scan on a website or company. Outline the procedures and results of the data gathering, noting any flaws.
|
Discussing use of encryption to protect data at rest
: Essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
|