1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
4 years ago
10

Problem Overview You have just moved into a new home, and you have brought all your digital communications devices. After contac

ting your Internet Service Provider and getting connected, you now need to secure this home environment. Review the diagram below of all the devices, mobile and stationary. Problem Requirements 1. All devices must be protected against intrusion from other people 2. Devices must be secure against malware 3. People using the devices must be security aware 4. Internet access must be secure from unauthorized access and/or intrusion 5. All devices must be up-to-date and properly functioning 6. All critical data must be recoverable in the event of failure 7. The digital communications environment must be safe to use and defended Problem-Solving Process: Only do the Discover and Design Stages of problem-solving. Stage 1: Discover During this stage the problem is defined in detail. The scope of the problem is stated so that it is clear why this problem is important. The impact and risks of the problem are evaluated so that each risk is named with its likelihood of occurring and its level of severity. Actions are assigned to each risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a clear declaration of their level of involvement with the problem. Stage 2: Design In this design stage possible solutions are proposed and evaluated. Each alternative approach to solving the problem is identified and discussed. A method is defined to evaluate each alternative solution. Alternative solutions should be both creative and reasonable. The recommended solution is chosen and stated clearly explaining why this alternative is the best one. Questions to consider: Use these and other questions to develop and design your solution. These are not questions to answer directly in your submissions but only to help you solve the problem. 1. How will the security solution be used and by whom? 2. Are devices protected from unauthorized use and intrusion?​ 3. Are the people using the devices cyber-security aware? 4. Can the data on the devices be recovered? 5. Is the environment defended against malware? 6. What documentation and planning prepare for security problems? 7. Is the Internet use safe from intrusion? 8. Does your solution solve the whole problem for all the people involved? Write the problem solution in two sections, Discover and Design, addressing at minimum each of the items listed below. Use headers to clarify what part of the problem you are addressing. Consider using a table or spreadsheet for your risk analysis. 1. Discover Document a. Problem definition i. Full problem statement ii. Scope of problem iii. Impact and risks of problem giving at least five risks, their likelihood, and actions to reduce each risk. iv. People affected 2. Design Document a. Design statement i. Identify at least ten steps to take to secure this environment and all the devices ii. Explain the value and importance of each step you propose iii. Identify at least five security criteria and evaluate/score your solution by these criteria iv. State why your solution is effective and reasonable.
Computers and Technology
1 answer:
Serjik [45]4 years ago
5 0

Answer:

Hi mate ! I am from India.

You might be interested in
A ________ describes the data and relationships that will be stored in a database.
nevsk [136]
Your missing word is Data model.
8 0
3 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Select the correct answer.
ch4aika [34]

Answer: A. phones and computers

Explanation:

A tablet, is referred to as a mobile computing device which utilizes the touchscreen as the main input device that it has.

Tablets are usually bigger than a mobile phone but smaller than a computer. You can perform thesame function that you can do on your mobile phone or the computer on the tablet.

One can surf the net, play games and watch videos on the tablet.

7 0
3 years ago
True / False
blagie [28]

Answer: True

Explanation:

Variable length instructions generally implemented by CISC processors use memory more efficiently than fixed length instruction of RISC processors sets because CISC supports array whereas RISC does not. Also CISC uses more complex addressing modes which consumes less memory cycles and the the program is also reduces. In Fixed length instruction in RISC processor the simple instructions has to be used a number of time which leads to more memory cycles.

7 0
4 years ago
Other questions:
  • How many degrees of freedom does any unconstrained object have in 3-D modeling?
    6·1 answer
  • A network manager prevents users accessing certain websites. She does this by setting up:
    7·1 answer
  • If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
    7·1 answer
  • Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
    9·1 answer
  • Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)
    6·2 answers
  • Which model represents scenarios thatchange over time?
    8·1 answer
  • HELP ME FAST???
    15·1 answer
  • What is the largest computer file size, megabyte , gigabyte, terabyte
    15·2 answers
  • Get ready to be the Quizmaster! You are going to design your own Python game show in the style of a quiz.
    13·1 answer
  • How are the four characteristics of the db approach related to the four functions of a dbms?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!