IT-505-07 NETWORK AND DATABASE SYSTEM DESIGN

Question-1Identifying Threats and Attacks

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Task:a) Create a comprehensive list of computer security threats, including viruses, worms, bots, spam, keyloggers, phishing, and spyware.b) For each threat, describe the potential impact it could have on a computer network and the type of assets that could be compromised.

Question-1(A): Mitigating Threats and Defending Assets

Task:a) Choose three computer security threats from your list in Question 1 and propose specific countermeasures to defend against them. Explain how each countermeasure helps prevent or minimize the impact of the chosen threat.b) Discuss the importance of employee training and user awareness programs in maintaining a secure computing environment.

Question-1(b): Computer Security Trends and Future Challenges

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Task:a) Research and identify the latest computer security trends and emerging threats that organizations should be aware of.b) Analyze how technological advancements, such as artificial intelligence and Internet of Things (IoT), are influencing the landscape of computer and network security.

The assignment will be assessed based on the following criteria:

1. Comprehensive list of computer security threats and their potential impact on network assets for Question 1.2. Effective and well-reasoned countermeasures proposed for the chosen threats in Question 2.3. Critical analysis of the importance of employee training and user awareness programs in maintaining network security for Question 2b.4. Knowledge of current computer security trends and their implications for future challenges in Question 3.5. Integration of relevant research and real-world examples to support arguments and findings.

Note: Students should reference authoritative sources to support their responses. Additionally, all sources should be cited appropriately using the required citation style.

Question-2Discuss the distinction between top-down and bottom-up approaches in database design.

Helpful Tip: Students should avoid using phrases like, “In my opinion,” or “I think,” or “I believe.” To support your response post to the weekly discussion question.

Required: students are required to provide at least one supporting reference.

NOTE: I NEED MY ANSWERS ON TIME WITH APA FORMATION. PLADGRISM SHOULD BE LESS THAN 15%. I NEED MY ANSWERS WITHOUT AI. MOST IMPORTANT THING IN ASWER IS AI. DON’T FORGET TO PUT THE REFERNCES. I NEED 400 TO 600 WORDS PER QUESTION. PLEASE BE AWARE ABOUT AI AND PLADGRISM. DO NOT USE CHAT GPT FOR ANSWERS. YOU CAN USE INTERNET BUT MAKE ANSWERS IN YOUR WORDS PLEASE. DO NOT COPY AS IT IS FROM GOOGLE. MAKE IT BY YOURSELF. PLEASE CHECK AI IN TURNITIN. AND SEND ME THE REPORT AS WELL. And please send me the report of AI from turnitin. And please send me the answers in different files.

Still stressed with your coursework?
Get quality coursework help from an expert!