Unit 3 part 2 Lab

  Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands. List and discuss two common SSH security risks. Describe how you would avoid and mitigate each of these risks. What do the events information, audit success, … Read more

internet

Write a reflection discussing how the internet is being used to wage a cyberwar that affects corporate privacy. Make sure to support your reflection with at least 2 scholarly resource

Discussion board

 Draw parallels between cyber operations components in defense sector and another section (e.g. finance, health, etc.). Argue why cyber operations should not be allowed in non-military sectors. 

Discussion board

  What are the implications of vehicle hacking for autonomous vehicles? Today’s vehicles have complex computer code and autonomous vehicles will have even more complex code. Do you think we will ever have widespread use of safe autonomous vehicles? Why or why not? One of the suggestions to improve vehicle security is for car manufacturers … Read more

network security layers

Assume you are a network administrator. You keep the internal network secure through a defense-in-depth strategy. Your company has many remote users, all of whom must adhere to a comprehensive VPN policy The policy states that only company-owned devices may connect to the internal network over a VPN connection. However, the company president, who is … Read more

network administration

Assume you are a network professional. Employees at your organization use a web-enabled application to do the bulk of their work. Going forward, most employees will be working remotely. You need to choose a VPN technology to support them whether they work from home or while traveling. Answer the following question(s): Should you implement an … Read more

network administration

Although VPNs are relatively secure by nature, endpoints are not. Data entering or leaving the VPN is at risk. An end-user computer could be infected by malicious code that can traverse the VPN link into the company LAN. Answer the following question(s): Consider employees who work from home and use personally owned computers to access … Read more