Emerging Threats & Countermeasure

 

Research a company or organization and their Cyber Security Plan to address 3-5 specific issues from the following list.

1. Technologies- What might be the effects of not using encryption on network or Internet traffic?

2. Create a plan for the implementation of secure (encrypted) e-mail in an organization.

3. Evaluate biometric controls: You want to install a biometric access control outside of a restricted room in your facility. You are considering a retina pattern system and a voice recognition system.

4. Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

5. Identify countermeasures to minimize company information exposure on social networking sites. What are the steps or countermeasures you would recommend minimizing the level of information exposure? Passwords and Social Networking: Compare and contrast password strength versus a password manager.

6. Evaluate port scanning countermeasures- You are evaluating port scanning countermeasures to help prevent an attacker from acquiring information about your network. The options you are considering are the deny-all approach, firewall testing, and security awareness.

7. Analyze a set of security risks and determine the appropriate physical, technical, and administrative controls to protect against those risks.

8. develop a plan for a business that needs to upgrade its video surveillance system. Research the various types of cameras, viewing, and recording equipment available, and develop a detailed plan for camera placement, image retention, and monitoring.

9. Develop a disaster recovery plan.

10. Develop cyber security awareness program

 

Sample Solution

Emerging Threats & Countermeasure

Securing data transferred between different endpoint is important not only through public networks but also in private networks. All data transfers are done using a public or private network. If the data is not encrypted and the only HTTPS is in place, the data is in readable form before being sent further inside the private network protected by a firewall. Operators of the firewall can intercept, change or manipulate data. The reason why it is important to encrypt files before sharing is simple, encrypting your files ensures your privacy. Someone unauthorized can’t open the files, meaning only you and your recipient gets access.

 

 

exposition on facebook friendshipThe Internet these days assumes a critical job in individuals’ professions, connections, and different circles of life. Since it began to pick up ubiquity in the mid 1990s, it has transformed into a worldwide system, associating any person who can manage the cost of having a PC to the remainder of the world.

Bit by bit, administrations permitting to make new companions and to keep in contact with previously obtained companions began to show up, and today billions of individuals utilize different interpersonal organizations, of which the biggest is Facebook. These informal organizations despite everything stay a discussed wonder, just as the outcomes they lead to and the manner in which they have changed social orders. Furthermore, maybe, one of the weirdest (at any rate to me) marvels associated with them is Facebook companionship.

A Facebook kinship is adding an individual to your rundown of companions. As I would like to think, this is a sensible activity with individuals whom you care about, or whom you keep up a relationship with. Genuine companions, guardians, your beloved(s), partners with whom you spend time with after work, individuals whom you have warmed up to while voyaging, etc, should be available in any Facebook companion list.

Be that as it may, in reality, individuals include new individuals whom they have never met or known. Regardless of whether they have never traded words, they despite everything keep each other in their companion records. Or on the other hand another model is when associates who work in a similar office include one another, yet don’t speak with one another in Facebook or even in the workplace. Or on the other hand when irregular individuals who have (under certain conditions) conveyed for a few minutes, at that point add each other to their companion records. At times individuals even add different clients to their companion records for a demonstration of amount—maybe, it is intended to show how friendly they are. These, just as numerous other comparable cases, I don’t comprehend, and this is one reason why I have stopped utilizing informal organizations about a year back.

Companion records can be a wellspring of different aggravations. For instance, individuals some of the time are reluctant to erase such arbitrary “companions” from their rundowns, due to expecting an issues associated with this demonstration—managing someone’s feelings, for instance, or clarifying their reasons. Or maybe regularly, erasing individuals from Facebook companions should show the pace of dissatisfaction or outrage caused to a client by the erased individuals. Simultaneously, genuine correspondence frequently proceeds as though nothing spe

 

 

 

 

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.