Amount of intellectual property

Assignment Help Basic Computer Science
Reference no: EM131168407

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

  1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
  2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause. 
  3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.
  4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.
  5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.
  6. Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.
  7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.
  8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 
  9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM131168407

Questions Cloud

State or federal public health agency : Can you do this assignment for me? Find at least two examples where a legal duty exists to report health data to a state or federal public health agency. Consider those relevant examples that have recently been reported in the news.
How confident are you in the analysis : How confident are you in the analysis - How might you address any concerns affect your confidence level?
Solve setup and hold violations in vlsi : What are the steps required to solve setup and Hold violations in VLSI?
Write a personal response essay on the lessons in life : Write a personal response essay on the 'lessons in life' that you have gathered through your reading of the novel " Lord of the Flies' by William Golding
Amount of intellectual property : A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems in..
Discuss process of working memory including areas of brain : Discuss the process of working memory including the areas of the brain associated with short-term memory and encoding.
Explain swot analysis in the context of product and process : a. Explain SWOT Analysis in the context of product and process innovation. b. Mention and explain FIVE (5) benefits of entrepreneurship. c. Discuss the impact of Technology Innovation and Society course in your career.
Do you think that quote is true : Do you think that quote is true?  Can you find any reference material to support one way or another whether or not that may be true?  How does that statement relate to database redesign?
Why do constraints : Why do constraints? What harmful actions does a referential integrity constraint prevent? The benefits of the CONSTRAINT constraintname CHECK are usually obvious; why is the CHECK constraint no longer enforced in the CREATE TABLE? Where are ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the public interface of the counter class

what is the public interface of the counter class in section instance variables and encapsulation? How does it differ from the implementation of the class?

  Use appropriate classes, fields, methods, objects

The summary information required by the University is the number of students and guests at each ceremony the total number of students and guests at all three ceremonies the ratio of students to guests at each of the three ceremonies.

  Creating presentation to law school class on digital crime

You have been asked to present a presentation to law school class on digital crime. After presentation, a student asks why so few people are really prosecuted for computer crime.

  What is a hash value

What is a hash value, and why do you think it is important?

  A static structure mechanical system

How do you construct a 3D degenerate model on A static structure mechanical system

  Continuations in place of exceptions

In addition to continuations that represent the "normal" continued execution of a program, we can use continuations in place of exceptions. For example, consider the following function f that raises an exception when the argument x is too small:

  Estimate the final dbm value for a radio

Estimate the final dBm value for a radio if the radio has .1 Watt of power, if there is a 4:1 amplifier before transmission, and if there is attenuation to 1/8 the original signal strength between the sender and receiver.

  Consumerization of information technology

Analyze how the consumerization of Information Technology (IT) is creating challenges for both forensics departments and IT security in general. Describe some of the safeguards, both technical and administrative, that you would put in place in you..

  Write a script to help users calculate compressed file size

Write a script to help users calculate compressed file size. Prompt the user to enter the original size of a file (inbytes) from the keyboard.

  Primary key in the supplier table

Using a subquery, check to make sure each product supplier ID (foreign key) is also listed as a primary key in the Supplier table. (This is a referential integrity check).

  How tcp is supposed to respond if a fin or an rst arrives

Consider both when the sequence number is within the receive window and when it is not.

  Facilitate data exchange functionality in a cloud service en

Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications. For each method you have ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd