What interesting difficult or surprising in what you read

Assignment Help Computer Engineering
Reference no: EM133658022

Homework

Purpose

This homework is intended to help you learn to solidify, reflect on, and find applications for the topics.

Overview

The number of supply-chain attacks has been rising every passing day. They target the weakest link in a supply chain and hack into even the most secure companies by first hacking a less-secure supplier in the chain. The 2020 United States federal government data breach - also known as the SolarWinds breach - was an example of a supply chain attack. It was the worst cyber-espionage incident ever suffered by the U.S. because of the long duration and the sensitivity and high profile of the targets.

Watch the following YouTube video to gain insight into supply-chain attacks:

Supply Chain Attacks - SY0-601 CompTIA Security+Links to an external site.

Watch the following YouTube video about software supply-chain attacks, a particular type of supply-chain attack:

Software supply chain attacks explained.

Why are supply-chain attacks challenging to prevent and detect? What are the solutions to prevent and detect supply-chain attacks?

Action Items

Read/watch the resources as indicated above. Post a 3 to 4 paragraph (375 to 500 words) discussion and reflection on the topics.

1. Consider this to be a mini "reflection paper" per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read. Note any "ah-ha!" moments.

2. Find a current news article or journal article that highlights the topics. Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.

3. Connect the topics from the above resources back into prior coursework you have taken at Franklin or other institutions. Talk about where you first encountered the topics or concepts and whether or not this exposure to them enhanced or solidified your understanding.

Reference no: EM133658022

Questions Cloud

What are the challenges in securing networks : What are the challenges in securing networks (internet, LANs, wireless)? Which network is most difficult to secure and why?
How is cbinsights using ai and big data to revolutionize : How is CBinsights using AI and big data to revolutionize the business sector? What are the different AI technologies that CBinsights uses to process their data?
Confine the deviant members of the community : What were the reasons that Americans in the Jacksonian era constructed and maintained correctional institutions to confine the deviant members of the community?
Demonstrate your understanding of a second case : IFN552 Systems Analysis and Design, Queensland University of Technology Assessment Task1–Requirements Analysis, Use Case and Activity Diagram
What interesting difficult or surprising in what you read : Consider this to be a mini "reflection paper" per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read.
Outline objectives of companys best secure coding practices : Outline the objectives and purpose of your company's best secure coding practices and explain how it will influence your division.
Discuss the principles of cia triad : Discuss the principles of CIA Triad (Confidentiality, Integrity, Availability) and propose an implementation process with the CIA's adherence.
Discuss strength and limitation of the advance directive : Share a link or an attachment to an advanced directive template. Discuss at least one strength and one limitation of the advance directive you shared.
Austronesian language family penetrated geographically : Trudgill (2004) observed that as the Austronesian language family penetrated geographically deeper into the formerly uninhabited Pacific

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd