Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

Instructions

1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing network to connect to the Internet and to perform some online banking. Describe the steps you plan to go through to ensure this system remains as secure as possible. Be sure to discuss the details of firewall settings you plan to implement within your operating system, browser privacy settings, and recommended software (e.g., Anti-virus and others) you will install. Also, describe your password strength policy you plan to adopt, and what you envision to do to ensure your online banking site is encrypted and using the proper certificates. Discussion of operating system patches and application updates should also be included. As you discuss these steps, be sure to justify your decisions bringing in possible issues if these steps are not followed. You can discuss this for a specific type of computer (e.g. MAC or PC) to make the scenario more appropriate for your environment.

2. Your son, who just turned 13, wants to join Facebook and post his picture and contact information on the site. Assuming, you are willing to allow him to have a Facebook account, describe what types of guidelines you would discuss with him to ensure his privacy and security are protected. Be sure to justify your decisions by describing possible issues if your guidelines are not followed.

• Prepare a well-written APA style paper, no more than 10 pages in length, addressing each of the above scenarios. Be sure to clearly separate the scenarios into separate sections of the paper. Only one paper is needed to address both scenarios.

Submission requirements:

Your completed assignment should be saved as a Word document and submitted to your LEO assignments area no later than the due date listed in the syllabus. Your document should be neat, well-written with minimal grammatical and spelling errors. Your name should be clearly listed on the first page along with the class/section, professor and due date. Your document should contain page numbers at the bottom of each page. Single or double space line formatting is acceptable.

Simple Guide for the final project.
Introduction

• Introduction
• Threats and Vulnerabilities

• What is threat?, malware are threats to computers.
• What is vulnerability? What makes a system vulnerable?.
• Threats compromise systems that have vulnerabilities

• Malware - define

• Virus - define
• Worms - define
• Trojans
• Phishing
• Spyware

• Web browser security.

• Social media
• Secure browsing
• Cookies
• Browser privacy

• Security Measures (you can list and discuss or define few of them).

• Firewall - helps block threat from outside and protect you from malicious sites
• Anti-virus software - this helps to mitigate malware threats and minimizes malware exploitation of known vulnerabilities
• Spyware protection
• SSL and Certification
• Apply proven patch management system
• Hiding SSID for wireless router so that hackers do not know its existence.
• Other security measures

• Authentication and Authorization

• Username to enter
• Password creation and criteria (strong vs weak password)

• Conclusion

• Facebook

- Background
- Rules to follow

- What is uploaded stays there
- Don't post what will compromise your dignity
- Privacy Security settings
- Who to befriend
- Scamming
- Phishing
-

• Conclusion

- In conclusion, make sure you don't introduce any new topic or information not discussed in the paper

• References.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92079684
  • Price:- $90

Priced at Now at $90, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Fiona told her friend that she is very fortunate as the

Fiona told her friend that she is very fortunate as the slow-down in the economy has not decreased sales in her grocery store by much compared to sales of new cars in his car dealership. Explain what Fiona meant using th ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As