1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
4 years ago
10

Problem Overview You have just moved into a new home, and you have brought all your digital communications devices. After contac

ting your Internet Service Provider and getting connected, you now need to secure this home environment. Review the diagram below of all the devices, mobile and stationary. Problem Requirements 1. All devices must be protected against intrusion from other people 2. Devices must be secure against malware 3. People using the devices must be security aware 4. Internet access must be secure from unauthorized access and/or intrusion 5. All devices must be up-to-date and properly functioning 6. All critical data must be recoverable in the event of failure 7. The digital communications environment must be safe to use and defended Problem-Solving Process: Only do the Discover and Design Stages of problem-solving. Stage 1: Discover During this stage the problem is defined in detail. The scope of the problem is stated so that it is clear why this problem is important. The impact and risks of the problem are evaluated so that each risk is named with its likelihood of occurring and its level of severity. Actions are assigned to each risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a clear declaration of their level of involvement with the problem. Stage 2: Design In this design stage possible solutions are proposed and evaluated. Each alternative approach to solving the problem is identified and discussed. A method is defined to evaluate each alternative solution. Alternative solutions should be both creative and reasonable. The recommended solution is chosen and stated clearly explaining why this alternative is the best one. Questions to consider: Use these and other questions to develop and design your solution. These are not questions to answer directly in your submissions but only to help you solve the problem. 1. How will the security solution be used and by whom? 2. Are devices protected from unauthorized use and intrusion?​ 3. Are the people using the devices cyber-security aware? 4. Can the data on the devices be recovered? 5. Is the environment defended against malware? 6. What documentation and planning prepare for security problems? 7. Is the Internet use safe from intrusion? 8. Does your solution solve the whole problem for all the people involved? Write the problem solution in two sections, Discover and Design, addressing at minimum each of the items listed below. Use headers to clarify what part of the problem you are addressing. Consider using a table or spreadsheet for your risk analysis. 1. Discover Document a. Problem definition i. Full problem statement ii. Scope of problem iii. Impact and risks of problem giving at least five risks, their likelihood, and actions to reduce each risk. iv. People affected 2. Design Document a. Design statement i. Identify at least ten steps to take to secure this environment and all the devices ii. Explain the value and importance of each step you propose iii. Identify at least five security criteria and evaluate/score your solution by these criteria iv. State why your solution is effective and reasonable.
Computers and Technology
1 answer:
Serjik [45]4 years ago
5 0

Answer:

Hi mate ! I am from India.

You might be interested in
A company's computers monitor assembly lines and equipment using ________ communications.
mr_godi [17]

Answer:

Machine to machine communications

Explanation:

Machine to machine communication is a type of communication that exists among the technical devices. The communication is linked either with the help of wire or through wireless. The information is communicated and transmitted with this form of communication. Human involvement or intervention is not required during the transfer of data.

6 0
4 years ago
Which of the following is a set of short-range wireless technologies used to share information among devices within about two in
8_murik_8 [283]

Answer:

Option (c) NFC

Explanation:

  • The NFC Technology is a Wireless Technology which works in the range of 10 cm or less.
  • NFC stands for Near Field Communications.
  • The name itself indicates that it a communication mode with the near by objects.
  • The NFC technology is used in Access Cards, Payment Cards and Mobile Devices etc.
  • Option (a) IM - Instant Messaging is the instant text messaging technology sends and receives messages over the internet. It is used in Social Media where instant messaging is available. So, option (a) is not correct option.
  • Option (b) text messaging the technology is the technology in which the text messages are sent over the mobile networks ( in case of text messaging in mobile phones ) or over the internet ( emails, blogging etc). So, option (b) is not correct option.
  • Option (d) DES is not a short range wireless technology. So, option (d) is not correct.
  • Option (c) NFC is correct option.
3 0
3 years ago
Which of the following is not a function of an operating system?
Semmy [17]

Answer:

C:carries out a specific task for the user

Explanation:

4 0
2 years ago
How many slides are present in a blank presentation
Kobotan [32]
One, right? Because there's just the blank title slide that automatically pops up. 
8 0
3 years ago
Read 2 more answers
.To remove data from a table we use the DELETE verb? (true/false)
Andrew [12]

Answer:

The correct answer for the given question is "true".

Explanation:

Yes delete is a verb in a database table  because it perform the action it means it will delete the data or record from a database table .The SQL query of delete is

Delete from tablename ;

For example :delete name from student;

In this query name will deleted from student table this action will be performed by delete query so we conclude that delete is a verb.

5 0
3 years ago
Other questions:
  • Which of the following is a disadvantage of using solar energy? A.It reduces greenhouse gas emissions. B.It requires a high init
    12·2 answers
  • A collection of methods that can be used by any class, as long as the class provides a definition to override the collection's a
    5·1 answer
  • 4. How does distance affect the strength of the force of gravity?_
    5·1 answer
  • What does the line of red semicircles mean on a weather map
    11·1 answer
  • When photographing wildlife, what type of lighting should you use?
    15·2 answers
  • Which of the following should be performed to prove the value of a security awareness training program?
    8·1 answer
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • How can blockchain be used to support sustainable business practices?
    8·1 answer
  • URGENT!! thank you!!!!!
    9·1 answer
  • what new technology led to the chaos that spurred the establishment of the federal communications commission?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!