#Sales Offer!| Get upto 25% Off:

Question 1 (20 marks)

Use the Internet to research defenses against injection attacks.

  1. a) What are the defenses to protect against SQL injection attacks, XML injection attacks, and XSS?
  1. b) How difficult are they to implement?
  2. c) Why are these defenses not used extensively? Write a two-page research to answer these questions1.

 

Question 2 (20 marks)

Data loss prevention (DLP) is a system for monitoring how critical data is accessed. a)   Use the Internet to identify three DLP products.

  1. b) Make a list of their features, architecture, strengths, weaknesses, and so on.
  2. c) Then determine  if  each  of  these  products  could  be  used  by  an  attacker  to  identify vulnerabilities in an organization’s data protection.

Create a table comparing the products and write an analysis of your research2.

 

Question 3 (20 marks)

Hypertext  Transport  Protocol  over  Secure  Sockets  Layer  (HTTPS)  is  becoming  increasingly  more popular  as  a  security  protocol  for  Web  traffic.  Some  sites  automatically  use  HTTPS  for  all transactions (like Google Gmail), while others require that the user must configure it in their settings (such as Facebook).

  1. a) What are the advantages of HTTPS?
  2. b) What are its disadvantages?
  3. c) How is it different from HTTP?
  4. d) How must the server be set up for HTTPS transactions?
  5. e) How would it protect you using a public Wi-Fi connection at a local coffee shop?
  6. f) Should all Web traffic be required to use HTTPS? Why or why not? Fully argument your answers3.

 

Question 4 (20 marks)

As  cloud  computing  increases  in  popularity,  enhanced  features  are  being  added.  Amazon  Web Services (AWS) now supports a Virtual Private Cloud infrastructure through which organizations can create a network topology in the AWS cloud that closely resembles their own physical data center, including public, private, and demilitarized zones (DMZs).

  1. a) Research AWS’s Virtual Private Cloud or another cloud vendor’s similar offering. What are your impressions?
  2. b) Would this be something that an organization should consider?
  3. c) What are its technical limitations? Write a two-page summary of your research4.

 

Question 5 (20 marks)

  1. a) Interview a network administrator or an IT professional. Ask questions to find out how is cyber security approached in his/her line of work.
  2. b) Write a summary of the interview (provide the transcript as an appendix).
  3. c) Using critical thinking and considering the knowledge gained from this subject, what have you learned about e-security from this professional?

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!