Question 1
Goal: To make students aware of the availability of an array of solutions to secure computer networks
Nature: Exploratory
Deliverables:5 double spaced page
Research and study the available software and hardware techniques to deter, if not eliminate, computer systems attacks. Write a comparative discussion paper on five (5) such techniques.
Pay attention to the following:
- Encryption techniques (DNSSEC, IPSec, PGP, S/MIME)
- Techniques for fault detection, isolation and repair
- Intrusion Detection and Network Forensics
- Firewalls (DMZ)
- Secure network infrastructure services: DNS, NTP, SNMP
Question 2
Cyberattacks against major businesses, colleges, and the federal government have dramatically increased in recent years. In most cases, the cyberattack ended in massive breaches and leaks of personal information. Here are a few examples for you to review:
- Here’s What Happened to Your Target Data That Was Hacked
- Home Depot Hackers Exposed 53 Million Email Addresses
- U of Nebraska Data Breach Affects 650,000 Students
- Cybersecurity Resource Center
In each of these cases, the organization noted possible causes for its security breach. For your main post, select one of these examples, or find an example of your own noting the same type of security breach, and identify the most probable cause in security that allowed the breach. If you choose a different example, be sure you provide a link to the story at the end of your initial post.
In responses to your peers, examine their perspectives and comment accordingly or pose questions to advance the discussion. Do not simply state you agree or disagree or compliment the post. You are expected to make two additional substantive posts.