Cyber Security: Multi Essay Questions
**** Need it by 01/04/2020 5 PM EST****
APA Format NEEDED
In-text Citations
NO PLAGIARISM
SUBJECT: Cyber Security Planning
QUESTION 1: (400 words with 2 JOURNAL ARTICLE REFERENCES)
In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet?
Be sure to weigh security against usability.
QUESTION 2: (400 words with 2 JOURNAL ARTICLE REFERENCES)
Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a persons eye and stores that image in a database.
Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals if such data were used in other ways. In your view, are such concerns justified? Why or why not?
QUESTION 3: (400 words with 2 JOURNAL ARTICLE REFERENCES)
Do you believe that all data should be encrypted? Many computing professionals think this is a good idea.
But a small number of computing experts feel that no data should be encryptedthat all data and software should be openly available to anyone who wants it.
Explain your answer (whether you believe all data should or should not be encrypted).
QUESTION 4: (400 words with 2 JOURNAL ARTICLE REFERENCES)
What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?
If you do use a VPN, which one and why did you select that particular one?
QUESTION 5: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.
In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.
QUESTION 6: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
Select one of the below biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.
Biometric techniques:
1.Fingerprint recognition
2.Signature dynamics
3.Iris scanning
4.Retina scanning
5.Voice prints
6.Face recognition
QUESTION 7: (3-4 paragraphs in length and 2 JOURNAL ARTICLE REFERENCES)
you learned that random numbers (or, at least, pseudo-random numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them.
Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.