1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
4 years ago
10

Problem Overview You have just moved into a new home, and you have brought all your digital communications devices. After contac

ting your Internet Service Provider and getting connected, you now need to secure this home environment. Review the diagram below of all the devices, mobile and stationary. Problem Requirements 1. All devices must be protected against intrusion from other people 2. Devices must be secure against malware 3. People using the devices must be security aware 4. Internet access must be secure from unauthorized access and/or intrusion 5. All devices must be up-to-date and properly functioning 6. All critical data must be recoverable in the event of failure 7. The digital communications environment must be safe to use and defended Problem-Solving Process: Only do the Discover and Design Stages of problem-solving. Stage 1: Discover During this stage the problem is defined in detail. The scope of the problem is stated so that it is clear why this problem is important. The impact and risks of the problem are evaluated so that each risk is named with its likelihood of occurring and its level of severity. Actions are assigned to each risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a clear declaration of their level of involvement with the problem. Stage 2: Design In this design stage possible solutions are proposed and evaluated. Each alternative approach to solving the problem is identified and discussed. A method is defined to evaluate each alternative solution. Alternative solutions should be both creative and reasonable. The recommended solution is chosen and stated clearly explaining why this alternative is the best one. Questions to consider: Use these and other questions to develop and design your solution. These are not questions to answer directly in your submissions but only to help you solve the problem. 1. How will the security solution be used and by whom? 2. Are devices protected from unauthorized use and intrusion?​ 3. Are the people using the devices cyber-security aware? 4. Can the data on the devices be recovered? 5. Is the environment defended against malware? 6. What documentation and planning prepare for security problems? 7. Is the Internet use safe from intrusion? 8. Does your solution solve the whole problem for all the people involved? Write the problem solution in two sections, Discover and Design, addressing at minimum each of the items listed below. Use headers to clarify what part of the problem you are addressing. Consider using a table or spreadsheet for your risk analysis. 1. Discover Document a. Problem definition i. Full problem statement ii. Scope of problem iii. Impact and risks of problem giving at least five risks, their likelihood, and actions to reduce each risk. iv. People affected 2. Design Document a. Design statement i. Identify at least ten steps to take to secure this environment and all the devices ii. Explain the value and importance of each step you propose iii. Identify at least five security criteria and evaluate/score your solution by these criteria iv. State why your solution is effective and reasonable.
Computers and Technology
1 answer:
Serjik [45]4 years ago
5 0

Answer:

Hi mate ! I am from India.

You might be interested in
Given the availability of an ifstream object named input, write the other statements necessary to read an integer into a variabl
tatiyna

Answer:

input.open("rawdata");

input>>datum;

input.close();

Explanation:

ifstream objects maintain a filebuf object as their internal stream buffer, and perform operations like input/output on the available associated files.

In above statements.

                            input.open("rawdata");

  • The associated file named rawdata is opened.

                            input>>datum;

  • The integer from the file is read into already declared variable datum.

                             input.close();

  • Input stream is closed.
4 0
3 years ago
What are the five generations of computer software​
Lerok [7]

Answer:

1st gen: Vacuum Tubes(1940–1956)

2nd gen: Transistors(1956–1963)

3rd gen: Integrated Circuits: (1964–1971)

4th gen: Microprocessors (1971–PRESENT)

5th gen: Artificial Intelligence (present)

Explanation:

8 0
2 years ago
What is wrong with each of the following?
ankoles [38]

Answer:

The answer to this question is given below in the explanation section

Explanation:

shoNum + shoNum2 = shoTotal

in this code statement,  the order of operation is wrong because the calculation in programming always done at the right side of dependent variables.  so the correct statement of code is

<em> shoTotal = shoNum + shoNum2;</em>

shoNum = 10 * 4

This statement is programmatically correct, because the ShoNum value becomes 40 after performing the multiplication operation on its assigned value  (10 multiply by 4). However, it is noted that the empty space mostly ignored by the compiler. So, the correct is <em>shoNum = 10*4;</em>

Dim decPrice As Decimal = "$4.99"

The dollar sign is appeared in along with its value. So, if you assign value to a decimal variable, you need to assign only digit value (do not mix value with symbol or text) and also do not put quotation marks around value, if you put quotation marks around value then this value will be consider as a text value.

So, the correct statement is :

<em>Dim decPrice As Decimal = 4.99;</em>

shoCube= (shoSide)3

In this statement, cube is calculated of shoSide variable, mathematically it is right, but programmatically it is incorrect. Because, you missed the multiplication operation (*) between the operand shoSide and 3. it should

be as  shoSide raise to power 3.

the correct statement is : shoCube = (shoSide * shoSide *shoSide);

4 0
4 years ago
which of the following peripheral does not belong to a group: A) Monitor B) Printer C) Hardware D) Keyboard​
nikdorinn [45]
C hardware is the correct answer
5 0
3 years ago
If your computer freezes on a regular basis and you checked your hard drive and you have insufficient space you've not installed
lina2011 [118]

First, check that your drivers are up to date. The lag could be caused by outdated drivers that are essential in running your system smoothly. New updates will fix bugs, known errors and will make programs work better and faster. Next, run your anti-virus software to check if malware, spyware, and adware that could be putting your computer at risk by installing hidden files, downloading stuff from the internet and uploading sensitive information from your computer. These unauthorized activities could be eating up your RAM in the background without you knowing and thus making your computer run slowly.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A software program that enables users to find and display information stored as html pages on the internet is a(n) ____.
    5·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • Where should Nolan go to change the font size of his message before printing it? A.the Paper tab in the Define Styles dialog box
    14·1 answer
  • Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
    11·1 answer
  • Where can you find gradpoint answers
    13·2 answers
  • If you have two redo log groups with four members each, what’s the optimal number of disks you need to provide appropriate prote
    5·1 answer
  • What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in a
    6·1 answer
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • Time
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!