Need help with answering following 6 questions in following
topic areas:
Total pages: 2
Topic 1: "Cryptography" Please respond to the following:
Q 1.Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution. If you had to select one (1) of the two (2) encryption options over the other, justify the one that you would choose, and explain your reasoning.
Q 2.Read the article titled “2014: The Year of Encryption? ( http://www.infosecurity-magazine.com/news/2014-the-year-of-encryption/)”, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.
Topic 2: "Network Security" Please respond to the following:
Q 1. Using the internet, research one enterprise software or hardware firewall that is currently available on market and, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security. Select the two (2) most important and / or unique features of the chosen firewall, and explain the primary reasons why those features make the firewall a viable option in enterprises today. Justify your answer.
Q 2.Please read this article ( https://www4.symantec.com/mktginfo/whitepaper/SecuringtheCloudfortheEnterprise0511_cta51258.pdf) , discuss what you believe to be the two (2) most important security considerations related to cloud deployments, and explain the main reasons why you believe such considerations to be the most important.
Topic 3: "The Impact of Malware" Please respond to the following:
Q 1.Research the internet for resources that security professionals can use in order to find information about threats and/or malware active today to, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals.
Q 2.Read the article titled “Does the latest Mac malware attack show that Windows 8 is more secure than Mac OS X? ( http://blogs.computerworld.com/malware-and-vulnerabilities/21810/does-latest-mac-malware-attack-show-windows-8-more-secure-mac-os-x), explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end users and businesses.












Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.