Amount of intellectual property

Assignment Help Basic Computer Science
Reference no: EM131166965

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

  1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
  2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause. 
  3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.
  4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.
  5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.
  6. Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.
  7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.
  8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 
  9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM131166965

Questions Cloud

Describe the life safety code : Describe the Life Safety Code, and include how it relates to egress and emergency evacuation.
What is their percentage rate of return : What is the percentage rate of return for these 298 dairies? The other two dairies have a cost structure that generates profits of $48 for every $400 invested. What is their percentage rate of return
Create an engaging and visually interesting underwater scene : This assignment should reveal your understanding of animating in After Effects. Create an engaging and visually interesting underwater scene. Include various sea life and a compelling coral reef in which your sea creatures will swim through.
Algorithm for finding a spanning tree in a simple graph : Illustrate how the two algorithms you described in part (a) can be used to find the spanning tree of a simple graph, using a graph of your choice with at least eight vertices and 15 edges.
Amount of intellectual property : A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential.
Boxes of lettuce should supermarket purchase tomorrow : The local supermarket buys lettuce each day to ensure really fresh produce. Each morning any lettuce that is left from the previous day is sold to a dealer that resells it to farmers who use it to feed their animals. This week the supermarket can buy..
Determine whether simple graph can be colored using n color : Show, with an example, how backtracking can be used to show that a graph with a chromatic number equal to 4 cannot be colored with three colors, but can be colored with four colors.
Write an essay reviewing what role have women played : Write an essay reviewing what role have women played in the development of Science/ Engineering and technology. How has technological change affected the roles of women and ideas of gender?
Session timeout and application timeout : What are Session Timeout and Application Timeout? Where we have to do this process?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining difficulties in managing information resources

Considering difficulties in managing information resources, explain in scholarly detail why risk management must involve in the following elements to include threats,

  How would you deallocate memory in a destructor

We can use the destructor to deallocate memory for an object. How would you deallocate memory in a destructor?

  Write difference between logical and physical modeling

What is the difference between logical and physical modeling? Give three reasons why logical models are superior for structuring business requirements.

  What are some factors or requirements

What are some factors or requirements when designing an Active Directory Infrastructure. How do you gather the requirements for the design? Please explain in approximately in two paragraphs.

  Analyze the different effects environmental challenges

Write a 350- to 700-word report in which you present and analyze the different effects environmental challenges have on an organization, real or fictional.

  Create a visual logic flow chart with four methods

Create a Visual Logic flow chart with four methods. Main method will create an array of 5 elements, then it will call a read method, a sort method and a print methodpassing the array to each.

  Write and explain the definition of composition in c++

Write and explain the definition of composition in C++ and how it is useful in writing object-oriented programming. Also, explain how it is different from inheritance and how both inheritance and composition are useful in developing object-oriente..

  What is the practical minimum number of entries

Explain the purpose of each entry. What is the practical minimum number of entries?

  Calculate the cache hit ratio

Calculate the cache Hit Ratio using the formula presented at the end of this chapter assuming that the total number of requests is 2056 and 1209 of those requests are found in the cache.

  How has it changed the landscape of desktops and servers

Discuss how performance optimizations for file systems might result in difficulties in maintaining the consistency of the systems in the event of computer crashes.

  Draw an er diagram

a. Draw an ER diagram. Make sure each entity type has at least one key attribute. Document any assumptions you make. Avoid diagrams with a single entity. b. If you think the description is incomplete, list other data the database should store. c. Adj..

  Determining the management information systems

Value chain analysis is useful at the business level to highlight specific activities in the business where information systems are most likely to have a strategic impact.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd