as

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

WEEK 4 ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the
appropriate assignment folder. Each response to a single essay question should
be about a half-page in length (about 150 words).

1. Communications within a computer network rely on numerous
components for data to traverse from the initial sender of a message or file
to the receiver at the distant end of the communication path. In addition to
the media that the data travels across, the devices that guide the data
packets through the network, and the protocols that establish end-to-end
connectivity and negotiate the communication, network services play a
critical role in providing the necessary addressing and name resolution
services. Describe the following services and their role in network
communications: ARP, DHCP, ICMP, SNMP, and DNS.

2. Modern organizations rely on the Internet for information and research
necessary to stay competitive but this access can come with significant risk
if they don’t take the necessary steps to safeguard their internal resources
from outside attackers. In this week’s reading, various types of firewalls and
firewall configurations were discussed. Describe the terms bastion host,
DMZ, dual-homed firewall, screened host, and screened subnet and their
roles in firewall architectures.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

3. Many organizations employ a mobile workforce and/or provide the option
of telework to their employees to allow them to work from home. In both
situations, a secure means of accessing the corporate network remotely
must be provided. Discuss the four main tunneling protocols used to
provide virtual private network access between remote users and their
corporate network.

WEEK 2 ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the

appropriate assignment folder. Each response to a single essay question should

be about a half-page in length (about 150 words).

1. Not all information has the same importance and value to a company. How

data is classified is an important factor used in determining the amounts of

funding and resources that should be applied to protecting each type of

data. Describe the data classification levels within commercial and military

organizations and provide examples of the types of information that would

be classified at each classification level.

2. It takes a team of individuals throughout the organization working together

to safeguard the integrity and confidentiality of data resources. Describe

the layers of responsibility within an organization when it comes to asset

security and data protection. For each role, discuss their responsibility

within the organization for asset security.

3. The architecture of a computer system is very important and comprises

many topics. The system must ensure that memory is properly segregated

and protected, ensure that only authorized subjects access objects, ensure

that untrusted processes cannot perform activities that would put other

processes at risk, control the flow of information, and define a domain of

resources for each subject. It also must ensure that if the computer

experiences any type of disruption, it will not result in an insecure state.

Many of these issues are dealt with in the system’s security policy, and the

security mode is built to support the requirements of this policy. Explain

the concept of a trusted computing base and describe how it is used to

enforce the system’s security policy. Provide examples of specific elements

(hardware, software or firmware) in the architecture of the computer

system could be used that provide security within the TCB.

WEEK 1 ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the

appropriate assignment folder. Each response to a single essay question should

be about a half-page in length (about 150 words).

1. In this week’s readings, you learned about two methods of risk analysis:

quantitative assessment and qualitative assessment. Explain the steps

taken to assess a risk from a quantitative perspective where monetary and

numeric values are assigned and discuss the formulas used to quantify risk.

Then, explain the methods used to assess risk from a qualitative

perspective where intangible values are evaluated such as the seriousness

of the risk or ramifications to the reputation of the company.

2. Domain 1 introduced numerous security terms that are used in assessing

risk. Please define the terms vulnerability, threat, threat agent, risk,

exposure and control. Then, describe the three different control types and

give examples for each.

3. After you’ve conducted your risk assessment and determined the amount

of total and residual risk, you must decide how to handle it. Describe the

four basic ways of handling risk.

WEEK 3 ESSAY QUESTIONS

Instructions: Answer all questions in a single document. Then submit to the
appropriate assignment folder. Each response to a single essay question should
be about a half-page in length (about 150 words).

1. Cryptographic algorithms provide the underlying tools to most security
protocols used in today’s infrastructures. The choice of which type of
algorithm depends on the goal that you are trying to accomplish, such as
encryption or data integrity. These algorithms fall into two main categories:
symmetric key and asymmetric key cryptography. In this essay, please
discuss the strengths and weaknesses of symmetric key cryptography and
give an example of where this type of cryptography is used. Then discuss
the strengths and weaknesses of asymmetric key cryptography and give an
example of where this type of cryptography is used.

2. Cryptography has been used in one form or another for over 4000 years
and attacks on cryptography have been occurring since its inception. The
type of people attempting to break the code could be malicious in their
intent or could just be trying to identify weaknesses in the security so that
improvements can be made. In your essay response, define cryptanalysis
and describe some of the common cryptanalytic techniques used in attacks.

3. Many people overlook the importance of physical security when addressing
security concerns of the organization. Complex cryptography methods,
stringent access control lists, and vigilant intrusion detection/prevention
software will be rendered useless if an attacker gains physical access to
your data center. Site and facility security planning is equally important to
the technical controls that you implement when minimizing the access a
criminal will have to your assets. In your essay response, define CPTED and
describe how following the CPTED discipline can provide a more aesthetic
alternative to classic target hardening approaches. Make sure that the
three CPTED strategies are covered in your response.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER