The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
These are discussion questions. Each answer should be about 200 words long. Please review and let me know.
Â
A.Under what conditions should you consider implementing a honeypot? And, under whatconditions should you not operate a honeypot?B.If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend?How would you make sure that the information stored on your systems is accurate and has notbeen tampered with?How would you limit the damage that one person could cause, by making sure that they haveaccess only to what they need?A.Discuss ways in which the use of strong authentication can be designed to be "userfriendly" without compromising its effectiveness.B.After users are authenticated, what measures can be employed in order to maintainsecurity when users are away from their computers?How can you make your database more hacker-proof? How do you ensure the security of anorganizations' distributed databases?What specific vulnerabilities affect Web enabled databases? What can be done to prevent themfrom happening?
Attachments: