Analyze the security features of linux

Assignment Help Computer Network Security
Reference no: EM131326222

Current Attack Vectors and Secure Network Design

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

6. Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.

7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

  • Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.
  • Explain and apply various hacking technologies and features that administrators deploy to protect their networks.
  • Review system (Linux and Mac OS X) and networking device hacking techniques and vulnerabilities.
  • Summarize wired and wireless networking devices and standards, including routers, cables, firewalls and access points, as well as the methods of hacking.
  • Explain physical security and its associated challenges.
  • Use technology and information resources to research issues in ethical hacking.
  • Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131326222

Questions Cloud

Develop a microsoft excel application : Develop a Microsoft Excel application that provides support for decision making. The application must be useful to someone, which means it needs to help someone analyze data and make appropriate decisions based on the data. Don't waste your time c..
Identify five major challenges a project manager faces : Identify the critical path and its activities for Rockfest. How long does the project take? Which activities have a slack time of 8 weeks or more? Identify five major challenges a project manager faces in events such as this one.
Single pasty farm in a large market : What price should they expect, being a single pasty farm in a large market? How many pasties in aggregate will be sold in the regional pasty market?
Function of every application of the computer system : Ensure that all hardware work together. Ensure that every function of every application of the computer system works and the system meets the functional requirements and the RFP specifications
Analyze the security features of linux : Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response
What is the standard error of the statistic between two mean : Exam: 250714RR- A random sample of males and females involved in rear-end accidents results in the following Minitab summary: What is the standard error of the statistic between the two means?
Show that f integrates to 1 and that it is a bimodal density : Compare those assessments with an on-line evaluation of the integral R f(x) d x based on the MCMC sample thus produced.
Discuss the difference between multicast and unicast routing : Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life
Examine the x-ray of a patient diagnosed with pneumonia : Examine the laboratory blood test results and arterial blood gases provided in "Discussion Question Resource: Laboratory Blood Test Results." What laboratory values are considered abnormal? Explain each abnormality and discuss the probable causes ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the importance of statistical data analysis?

What is the importance of statistical data analysis?

  Write a research paper about hids or antivirus systems

Write a Research Paper about HIDS or Antivirus Systems. The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems.

  Explain access control methods and attacks

Explain access control methods and attacks

  C structs and enums

Protect your header using #ifndef directive. Define a struct with tag Capacitor that holds the following information about a capacitor: Model number (e.g. 11-123U), capacitance (e.g. 1000 uf), voltage (e.g. 2.5 V), cost ($6.50)

  Cryptography problem

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret

  Present the project to the board of directors

Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quali..

  Describe the relationship between information security

1. research the sarbanes-oxley act. write a minimum of 500 wordsthis question only cite your sources using apa 6th

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Security controls based on anti-cybercrime techniques

Explain whether you believe adherence of regulations such as PCI are enough to protect a company from these types of breaches and why or why not and determine the types of monitoring that could be implemented to help quickly identify penetrations ..

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Relationships between a trusted and an untrusted network

Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd