Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Defensive Technologies Responses

27/08/2020 Client: murali Deadline: 3 days

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


In order to prevent attackers from gaining access to your network, there are three control mechanisms that are used to work together to make sure that security is maintained (Oriyano, 2013). These three controls are administrative, technical and physical.


Administrative controls deal with the policies and procedures. This includes setting up restricted privileges. Server configuration, alerts, response and desktop configurations. Implicit deny is a setting that defaults any missed settings or configurations ill automatically default to not allow access. Least privilege is setting each access to be allowed to only what is absolutely needed and nothing more. Job rotation is used to ensure not one person has too much power in one area, this helps to hold accountability. Other tasks consist of separation of duties, mandatory vacation, and privilege management. All these tasks help contribute to a good mixture of security from attackers internally and externally.


Technical controls consist of things such as passwords, biometrics, access control software, antivirus and malware software. Using access control software to be able to enforce access of sharing information and applications. Anti-Malware software and passwords are one of the most common and most needed technical tools for protecting the security of an organization (Oriyano, 2013). Passwords are only useful if used properly though.


Physical controls are thing that you physically use to protect your systems such as cameras, locks, safes, any types of barriers that act as an extra barricade for an attacker. I think of it like a prison, there’s location, that’s in a strategic place, usually in the middle of nowhere. Fences, barricades, guards, alarms etc. all this can be used to protect your equipment and personnel.


All three of these controls are used in combination with each other to provide an organization security and help prevent from attackers. Each action performed makes it one more hurdle for an attacker to have to navigate through.


Amanda


RESPONSE 2:


There are three overall types of controls used to prevent attackers from gaining access to a network or specific data. The types are Administrative, Technical, and Physical and with the three layered in whatever ways are chosen by the security or IT person, they protect or at least slow the would-be attacker.


Administrative controls are the rules that are in place to dictate who receives what access, and one of my favorite methods of doing this and slowing attackers is through the Principle of Least Privilege. This only provides users with the bare minimum access to perform their job, nothing extra. (Oriyano, 2014) This would slow attackers down because they would then need to find a user with the proper accesses instead of just getting access from any user.


Technical controls are what most people think of when it comes to security and are things like antivirus and malware software but are also methods of users authenticating themselves. (Oriyano, 2014) Biometrics would make gaining access much harder for an attacker as they would need to either somehow obtain a user’s biometric information or obtain it from the database where that belongs.


Physical control is exactly what it sounds like, but location is one that can be a huge deterrent for attacks. Does the server or data get stored in one location? Or is the locations broken up into sections? It can be harder for an attacker either way if controls are present. With one central location a location can only worry about the security for one location, but if the data is spread out the job becomes more work to locate where the data the attacker wants is.


Ruston

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

7/2 strutt way noranda - Thin layer chromatography post lab questions - American idol case study - Lucky number program in python - Paper - Principles of comparative politics 3rd edition solutions - Meiosis animation mcgraw hill - Childcare 2ic job description - How to do an annotated outline - Cuda fortran programming guide - Privileged psychotherapy note example - SECURITY ARCHITECTURE AND DESIGN - Amortization schedule calculator bret whissel - Institute for learning qtls - Buffer solution ph 10 sds - Letter to school board from parent - Larkrise boarding cattery trowbridge - Internet of Things (IoT) - Relevant costing questions and answers - Abc sells 400 shares of its $23 par common stock for $27. the entry would entail credit(s) to - How does mccain view her role as human resource manager - 3 year old child observation report - Project cost and time management - Descriptive essay about a place using the five senses - Cover Letter Assistant - Research Proposal Draft - Public and private families an introduction 7th edition pdf - Jeff nippard squat form - I am a volunteer poem - Difference between forward and future price - Case study 2 collaboration systems at isuzu australia limited - Cash Flow and Financial Analysis - Howard gardner designing education for understanding essay - Light and plant growth virtual lab - 7-eleven case study analysis - Supernatural crossword clue 6 letters - Degree office management uitm - Practical Connections Assignment - Cloud Computing - Draw out the benetton supply chain - Peter senge 7 learning disabilities - Http www netmba com strategy matrix bcg - How starbucks growth destroyed brand value - Lens essay thesis example - Water can kill exploring effects of osmosis answer key - The kingdom of the dead odyssey - Www bloomberg com quote cur usd idr - Georg fischer hdpe catalogue - What planet is orange colored dot - Anarchy online test server - Qperational excellence week 8 - Wk4 DQ1 Discussion Question 1 – CLO 6 - 2 parts - Backstage department crossword clue - Bsnl ring back number - Why is potassium chromate yellow - Hp openview operations agent - Geomorphology - Calculate the molar mass of potassium hydrogen phthalate khc8h4o4 - Case Study: Ethical Consultation - Omni theatre showtimes fayetteville nc - Company overstepping ethical boundaries for stakeholder agendas - What deacon was responsible for taking the gospel to samaria - Marketing ethics product safety and pricing - Interactivity in the context of e-commerce provides which of the following functionalities? - Economics Essay - Why is mla format important yahoo answers - Good and honest iago - Pasatiempo diversión ratos libres trabajar - When mr pirzada came to dine character analysis - Sealink accommodation kangaroo island - Leasehold property depreciation rate - Intercultural communication presentation - Www globalissues org issues articles - Free printable flashcards with pictures - Time series homework solutions - Anichcha - Ibp conscientious eating - Otis elevator case study pdf - Extreme adjectives very bad - Ib language and literature guide - Daulia ltd v four millbank nominees ltd - 12 month photo banner kmart - Reply to Community Health Discussion on School Health Issues - Apple inc annual report 2014 - Gopro case study marketing - Work environment - Discussion Question 2 pages. No plagerism - Short circuit capacity 3871 type 2 - Http www biology arizona edu cell_bio tutorials pev page3 html - Techniques used in the book thief - Legal ethical and professional issues in information security book - Instructions for Capstone Project Part 3 - Stores material within the cell - ETCM DISCUSSION-1 - Evidence for cell phones in school - Dyson market oriented mission statement - The other wes moore essay outline - Unit6 assignment topic is potassium - How does accounting provide important data to internal users