CIS552 Weekly Discussions, computer science homework help
CIS552 Weekly Discussions, computer science homework help
Looking for a page per discussion
Week 4 Discussion 1
“Footprinting and the Wealth of Information” Please respond to the following:
- Explain what you believe is the greatest source of information for hackers in the footprinting stage, including where this information is commonly found and how a hacker is able to obtain it. Justify your response.
- Determine whether or not you believe a company could implement better practices to control its information that is in the public, such as those found through search engines. Formulate at least one best practice that could help protect information that would otherwise be made
Week 4 Discussion 2
“Port Scanning and Tools” Please respond to the following:
- Compare and contrast footprinting and port scanning. Determine which you believe is the more important step in the hacking process and explain why. Evaluate whether or not you believe these processes are more difficult for an enterprise. Justify your answer.
- From the e-Activity, discuss the tools’ primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether hackers and / or security personnel commonly use the tools. Compare and contrast the two selected tools and explain why you would consider utilizing one of these tools over the other.
Week 5 Discussion 1
“Stuxnet and Covering Tracks” Please respond to the following:
- Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn’t appropriately cover his / her tracks.
- From the e-Activity, explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.
Week 5 Discussion 2
“The Wireless Threat” Please respond to the following:
- Many say that once physical access is obtained by an intruder that all security is lost.
- Determine whether or not you believe this is a true statement. Explain in your opinion whether or not wireless networks have decreased the need for hackers to gain physical intrusion.
- Compare and contrast the security concerns between wired and wireless networks. Determine which you, as senior level management, would consider the greater area of risk and warrant greater security control expenditures. Justify your answer.
- Compare and contrast two common threats to wireless local area networks (WLANs) and the security controls that could be implemented to combat each. Imagine you are an Information Technology (IT) Security Director. Explain which of these threats would cause more concern for your organization and how you would justify the expenditures of the selected security concerns to upper management.
Week 6 Discussion 1
“Common Attacks and Hacktivism” Please respond to the following:
- Evaluate two different methods hackers presently use to vandalize Web servers. Determine which of these two methods would be more difficult for security personnel to defend against. From a risk management perspective, determine the method to which you, as a security manager, would allocate more resources. Justify your answer.
- From the first e-Activity, explain from your perspective why hacktivism is a growing concern for companies and security professionals. Determine whether or not you believe the threat landscape is trending more toward targeted attacks and away from the traditional untargeted, random attack.
Week 6 Discussion 2
“Databases and a Real-world Attack” Please respond to the following:
- Explain whether or not you believe databases are an attractive target for hackers and why. Analyze the common database challenges that exist for the enterprise that may not be relevant for small and medium-sized business (SMBs) and why these challenges exist. Justify your answer.
- From the second e-Activity, summarize the attack you researched. Determine why and how the attack was accomplished and how it circumvented the security controls of those attacked.
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


