Wednesday, May 1, 2019

Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words - 2

Class student dicussions answers - Assignment ExampleYou also provided a simple what to do measures in order to eliminate the risk of vir employs affecting the computer. It is a good insight that you gave about training the freshly users on how to detect scam emails and not click on the provided unknown links, and also executing an anti-malware or anti-virus scan whenever accessing an external memory drive. You could have also added not auto-executing flash drive programs or executables. other thing that I feel should be a part of training for novices should be proper computeout of trusted sites for downloads security features available in the browsers.Brain, you defined what Kevin said. You explained how a honeypot is implemented outside the principal(prenominal) network and it sacrifices itself for the protection of the main, critical network. The best things that you told about the honeypot networks in general, are the disadvantages of implementing them. Cost was perpetually a default factor but yes it would take more toil on the system executive director to monitor and look after this networks resources. I would partially agree with the last chit chat you made on comparing advantages and disadvantages. For critical data organizations, we do need these honeypots but for smaller organizations, we cannot collapse to have such a high cost.You also specifically mentioned what intrusion detection systems and firewalls we can use for learning security. As opposed to Kevin, you have provided specific details on three main techniques of ensuring information security within the organization. You also made good points on differentiating how package and hardware security systems work in unison to provide maximum security to the organizational data. I completely agree that software establish security is either algorithmic or rule based but hardware based security is almost rule based. The explanation of how routers work

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.