Reference no: EM132608621
CLASS DISCUSSION: (CYBR 436) Internet and Network Security
Class discussion are designed to ensure critical reflection and application of course content as well as peer interaction. For each discussion, you will:
1. Most people see Bluetooth as a personal wireless network (PAN). Why is this so? What standard does Bluetooth use?
2. If you are an enterprise security chief, how would you go about choosing a security best practice? Is it good security policy to always use a best security practice? What are the benefits of using a best practice?
3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those vulnerabilities? Defend your response.
4. Study the reporting patterns of computer crimes reported by industry. Which industry best reports?
5. Discuss a good security auditing system.
6. Physical access to resources is essential and must be the most restricted. Why?
7. Authentication is based on three factors. List the factors and discuss why each one determines which type of authentication to use. Physical access to resources is essential and must be the most restricted. Why?