The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 407 Weeks Ago, 5 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Security defenses should be based on five fundamental security principles: layering, limiting, diversity, obscurity, and simplicity. Analyze these layers for 3 computers that you currently use (at school, your place of employment, home, a friendAc€?cs house, etc.).
In either a Word document or Rich Text Format (RTF) file, create a table like the following example. Enter the security element of each layer for each of the computers (leave blank any box for which that security layer does not exist).
| Â |
Layering |
Limiting |
Diversity |
Obscurity |
Simplicity |
|
Computer 1 (Home) |
 |  |  |  |  |
|
Computer 2 (Work) |
 |  |  |  |  |
|
Computer 3 (School) |
 |  |  |  |  |
Below your table, provide an analysis of your findings in 2-3 paragraphs. What can you say regarding the security of these computers? For each of the elements that you think is inadequate or missing, add what you believe would improve security.
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll