QuickHelper

(10)

$20/per page/

About QuickHelper

Levels Tought:
Elementary,High School,College,University,PHD

Expertise:
Accounting,Applied Sciences See all
Accounting,Applied Sciences,Business & Finance,Chemistry,Engineering,Health & Medical Hide all
Teaching Since: May 2017
Last Sign in: 352 Weeks Ago, 4 Days Ago
Questions Answered: 20103
Tutorials Posted: 20155

Education

  • MBA, PHD
    Phoniex
    Jul-2007 - Jun-2012

Experience

  • Corportae Manager
    ChevronTexaco Corporation
    Feb-2009 - Nov-2016

Category > Art & Design Posted 12 Aug 2017 My Price 9.00

Module 7 Mobile Security

Must be 150 words each and contain useful and meaningful content that furthers the discussion not just critiques of others posts.

 

1) Module 7 Mobile Security

Mobile devices, including both smartphones and tables, have become a favorite exploit point for hackers. What kinds of things to you do on your own mobile device to secure it and is there anything you avoid doing altogether on your device because you feel it is too risky?

 

2) Module 7 IOS Jailbreak

I was so surprised to read about the ios devices being jailbroke. I have a sister who only buy ios devices because she say they can't receive a virus because they are so well protected. I did read where they stated the devices are protected by apple until the are jailbroke. This is the first I have about keyraider. If apple is aware of this and people can make purchases without paying, Apple should prevent the phone from being jailbroke.

3) Module 8 Security barriers to cloud

Cloud Service can be an attractive alternative that many large and small companies are taking advantage of. Cost, scalability and speed of deployment are just some of the benefits that can be gained by moving processing to the cloud, but security remains a large barrier that needs to be addressed. If you were an executive of a large company considering cloud, what are some of the security concerns you would have when making your decision.

4) Module 8: Can cloud be more secure

That is an interesting comment you make regarding the cloud being a safer place, but not just than on our laptops and phones but safer than our own servers within our data centers. I staff cloud experts on my team and during interviews I ask the question on how a cloud can be more secure than a company data center. I get sever answers but one that does make sense is the IT staff at a cloud provider is dedicated to just supporting that infrastructure and should be better and faster at patching and configuring it than an internal IT staff that is covering a wide area, which is very common. That's probably the best argument I've heard as a plus for security in the cloud.

 

5) Module 9: Wireless attack vectors

 

There are many different vectors to attack a Wireless network and its client systems. Of these, choose a method of attack you think is the most serious. Briefly explain that method and why you think it is the one to pay attention to. Include how you would best defend against that type of attack in your network.

 

6) Discussion Question

Your company is considering moving from a physical to a cloud environment and needs to understand the security ramifications.

Discuss how cloud computing differs from computing on physical machines. Identify how these differences affect the methods companies use to secure their cloud environment

 

7) Module 7 Module 7

After reading thru this module it really made me think about just how vulnerable mobile devices are. I mean i knew that mobile devices presented a different security concern but there were a few things that got me thinking. Such as at begining it mentions that mobile devices do not limit internet connection so no Firewall. Something i found useful was the encrypting phone as well as SD card and the locking sim card. Locking the sim card is a good idea because most store a bit of data from previous device so when you insert it into a new device it can do a sort of back up of things like contacts. The encrypt SD card helps protect personal interest items like photos to files like spreadsheets.

 

8) Module 8 Secure Infrastructure

The security of the infrastructure is always going to be a concern in regards to cloud providers. Essentially you have a security blind spot where your data lives and we are forced to trust these 3rd party companies that they are keeping their infrastructure patched and up to data and following secure best practices in their configurations, etc. If you were evaluating such a cloud provider and deciding to use them, what kinds of things can you do to get some amount of confidence that they are doing things right?

Answers

(10)
Status NEW Posted 12 Aug 2017 06:08 AM My Price 9.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k Y-----------ou -----------for----------- us-----------ing----------- ou-----------r w-----------ebs-----------ite----------- an-----------d a-----------cqu-----------isi-----------tio-----------n o-----------f m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l

Not Rated(0)