Define firewall security techniques
Computer Security:
Please note that the Answers for Question 1 and 2 should be shared before 3 days and all the others can be shared within in 10 days.
1. A) Discussion – Relate any incident you have been involved with that relates to a security issue. (200-300 words)
B) Assignment –
Learning About Cookies as Spyware.
Research what kind of information cookies store. You might find the following websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.
2. Discussion – Using the Web or other resources, find out what your state’s (Georgia) laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean. (200-300 words)
3. Assignment –
Using WORD, write an ORIGINAL brief essay of 300 words or more:
Find a DoS attack that has occurred in the last six months
You might find some resources at www.f-secure.com.
Note how that attack was conducted.
Write a brief explanation of how you might have defended against that specific attack.
4. A) Discussion – Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved. (200-300 Words)
B) Assignment –
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
5. A) Assignment –
Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
B) Final Project TOPIC (Topics attached as a doc below)
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research i
6. A) Discussion –
Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented. (200-300 words)
B) Assignment –
Do some basic research on security certifications.
See https://www.giac.org/.
Write a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.
C) Project Abstract –
Submit your research paper abstract here.
7. A) Assignment –
Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
