Which firewall security strategy would be the best solution for the scenario? Why?
Q: NumericAnalyzer will accept a list of 1 or more numbers as command line arguments. NOTE: Don’t promp...
A: NumericAnalyzer will accept a list of 1 or more numbers as command line arguments. NOTE: Don’t prom...
Q: TISBA to.3). Mosque Varaity Mall Library 10.8 10.4]- 10.4) 10.21 10.41 Oreat
A: A map to critically review, provide a large screenshot so it can be easily seen, and answer the fol...
Q: What is an abstract class?
A: abstract class: abstract class are that class which contains both abstract and non-abstract methods ...
Q: Question:: When does it make sense to break down large computer processes and programs into smaller ...
A: INTRODUCTION: We need to answer the following questions:
Q: Why are there so many different partitioning algorithms in use by operating systems, and why they so...
A: I have answered this question in step 2.
Q: gardless of how user level threads are implemented, if a programme has two or more user level thread...
A: Answer: The correct answer is True
Q: Question 3: Mention two features of any simulation software that supports DSS.
A: Answer: (a) It is a method of organizing information for use in decision-making. It encompasses the ...
Q: Two stacks of positive integers are needed, one containing elements with values less than or equal t...
A: We can solve this problem by using an integer array of size 200 (it is mentioned that at a given tim...
Q: Why are there so many different partitioning algorithms in use by operating systems, and why are the...
A: why are there so many different partitioning algorithm in use by operating system Ans;- Data and pr...
Q: You need to know how to add an item to an existing binary search tree
A: Insertion is used to add new value in a binary search tree at correct location. Insertion follow the...
Q: can you please answer number 4 for me 1. Create a class called Student, with the following attri...
A: Class declaration is given below: public class Student{private String studentName;private int studen...
Q: What Is SDLC?
A: SDLC:- Software Development Life Cycle (SDLC) is a process that is used by the software industry to...
Q: Do win-win situations really give a win to both parties
A: A win-win negotiation gives you both as much of what you want as possible by carefully exploring bot...
Q: Q1. Corporate university wants to maintain the information about participants scores in various modu...
A: Solution: The code for above question in C# language is provided below.
Q: List security vulnerabilities as per Open Web Application Security Project (OWASP).
A: Five of the major Open Web Application Security Project vulnerabilities are below:
Q: Hello, the code task below has to be written in python 3 and the HTTP must show the html file from t...
A: The answer is given below:-
Q: For this assignment, you will create a parallel fixed-length code decompressor using the tools we le...
A: #include <vector> #include <algorithm> #include <string> #include <new&...
Q: 2. Using Divide and Conquer technique, sort the given number using quick sort 9,1,3,5,2,6,4
A: #include <bits/stdc++.h>using namespace std; void swap(int* a, int* b){ int t = *a; *a = *b; *...
Q: n today's environment, big data has become an integral aspect of any organization's information tech...
A: Introduction: IT systems, which include computer programmes, software, databases, and related docume...
Q: What is a database?
A: According to the question the database is the container to contains the data in row fact and the co...
Q: In NumPy write a program to generate a list that contain 5 random integers in the range 1 to 100. Di...
A: Python NumPy to generate list of 5 random number of range 1to 100
Q: Please tell why the given Java code is not getting compiled and giving error? Also, remove the erro...
A: Find the errors in the given JAVA program and also remove the errors present in the code.
Q: What will be the impact of the internet of things (IoT) on our everyday lives? Justify your position...
A: Introduction: IoT is a network of networked, internet-connected devices that can gather and transmit...
Q: What is the systems development life cycle (SDLC)?
A: Here is the detailed explanation of the solution
Q: Pand Q are two processes that share a set of variables that is common. The variable includes: seq, t...
A: Process Synchronization is a strategy which is utilized to facilitate the cycle that utilization sha...
Q: Question:: In what cases would you advocate the use of assembly language code in the creation of app...
A: Introduction: Assembly language employs mnemonic codes, which are equivalent to English words. Altho...
Q: What is the concept of AWS?
A: The full form of AWS is Amazon Web Services. It is a platform that offers flexible, reliable, scalab...
Q: USING VIVADO Write and simulate
A: The answer is as follows.The testbench Verilog code for the ALU is also provided for simulation Veri...
Q: use pl/sql to make a program Create a metric distant conversion program.. Ask user three...
A: Solution: First of all convert the input to mm and then convert them to the output. if fr='mm' then...
Q: A COMPUTER HAS 32-BIT INSTRUCTIONS AND 12-BIT ADDRESSES. HOW MANY TWO-ADDRESS INSTRUCTIONS THIS COMP...
A: Below is the answer to above question. I hope this will be helpful for you...
Q: Identify the difference between STACK and ARRAY.
A: Given To know the difference between STACK and ARRAY.
Q: What programming language (HTML, Jave, Python etc.) is used in translation applications and software...
A: Introduction: We are asked, which programming language is used in the translation applications and s...
Q: There were a lot of things in the first electronic digital computer.
A: Introduction: ENIAC was the first programmable general-purpose electronic digital computer, develope...
Q: Please provide two scenarios where asymmetric and symmetric would be used. What advantages does asym...
A: Uses of asymmetirc ecryption - NIST suggested the digital signatures standard, which is described ...
Q: What is the distinction between a White Hat and a Black Hat Hacker?
A: Introduction: While white hat hackers look for and solve security flaws in a system, black hat hacke...
Q: Exercise I: #CLO4 # SO3 Determine whether the following statements are True or False: 1. Type checki...
A: the answer is given below:- by bartleby guidelines i am able to do only one question.
Q: non:: P and Q are two processes that share a set of variables that is common. The variable includes:...
A: Text:Q1: tB Q2: seq = tB; seqt 2; P1: tA = seq + 1; P2: seq %3D = tA;
Q: Please explain both parts in detail Question four Bob and Alice are connected to their mail server b...
A: Bob is sending an e-mail to a receiver named Alice.
Q: Who are the people involved in the phases of Waterfall Model
A: Who are the people involved in the phases of the Waterfall Model?
Q: What exactly does the term "reduced" mean in the context of a computer with a limited instruction se...
A: Introduction: Because RISC computers had a smaller instruction set than CISC computers, the term "re...
Q: If you wanted to know the position of the letter v (i.e. return 2) in the String str containing the ...
A: Ans: If you wanted to know the position of the letter v (i.e. return 2) in the String str containing...
Q: name the three processor modes of xv6, and briefly describe each (when and why is the processor in ...
A: The answer is given below:-
Q: Write a JAVA Program to get the k largest elements in an user entered array.
A: // Java code for k largest elements in an array import java.util.Arrays; import java.util.Collectio...
Q: Following the reopening of educational institutions, taking precautions cannot be ignored, so it bec...
A: context diagram The actors are student, teacher ,staff and admin admin is responsible for managing a...
Q: 12. In the JAVA language write a program to input the elements of two integer arrays A1, A2 of size ...
A: In the JAVA language write a program to input the elements of two integer arrays A1, A2 of size 10 a...
Q: In what cases would you advocate the use of assembly language code in the creation of application so...
A: Introduction: Mnemonic codes, analogous to English words, are used in assembly language. Although de...
Q: Write a Java program that inputs size of array N and N numbers in the array. It should use Selection...
A: In the code, two methods are created sort() and search() for performing the selection sort and ...
Q: Write a java program that read a line of input as a string and prints only the uppercase letters in ...
A: Given: Write a java program that read a line of input as a string and prints only the uppercase le...
Q: Write a multithreaded program that calculates various statistical values for a list of numbers. This...
A: The answer is given below:-
Q: Question:: Why are there so many different partitioning algorithms in use by operating systems, and ...
A: Answer: Memory partitioning is a method of dividing a computer's memory into sections that may be ac...
Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is granted. The integrity of data is the top priority.
You are considering security through obscurity, defense in depth, and diversity of defense.
Answer the following question(s):
- Which firewall security strategy would be the best solution for the scenario? Why? (Cite your sources)
Introduction:
Here we are required to provide the best security strategy that would be best for the scenario given in the question.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
- First, argue for the best information security practice, whether a block cipher or stream cipher should be used to encrypt a video data file sent through the internet as part of a major, successful entertainment service. The entertainment company has a large market share, and ample resources. Secondly, argue for the most secure choice of which kind of cipher should be used for the authentication exchange between the user and the entertainment service web portal. The entertainment service is expensive to the customer, and users are wary of the misuse of their accounts. Consider the nature of the traffic and its pattern, and the nature of the keys to use.Take into consideration the various types of access control mentioned below, and choose some example scenarios. This is an example. • Discretionary Access Control (DAC), • Mandatory Access Control (MAC), • Role-Based Access Control (RBAC), • Attribute-Based Access Control (ABAC), • Rule-Based Access Control (RBAC), • Risk-Adaptive Access Control (RAC), • Identity-Based Access Control (IBAC), • Organization-Based Access Control (OBAC), •SCENARIO 1: You have just completed a routine security audit on the company’s information systems, and you found several areas of vulnerability. For example, file permissions have not been updated in some time, no comprehensive password policy exists, and network traffic is not fully encrypted. You noted these areas, among others, in a report to your supervisor. The report included specific recommendations to fix the problems. Your supervisor responded by saying that budgets are tight right now, and she could not approve your requests to resolve these issues. As an IT professional, you are very uncomfortable with the risk level, but you have been unable to sway your supervisor. When you discussed the situation with a colleague, he said, “Why worry about it? If it’s good enough for her, it should be good enough for you.” What do you think of your colleague’s advice, and why? Is this an ethical question? If you are still is uncomfortable, what are your options? SCENARIO 2: You work for a…
- In your view, what kinds of precautions must to be taken in order to ensure the safety of data both while it is being stored and while it is being transferred? Which of the following strategies is the most effective in terms of maintaining the data's integrity while also authenticating users?Do you believe that unauthorised individuals were responsible for the most recent security breach that included access control and authentication and was reported in the news? Is there any indication that it has had any kind of an impact on the way that day-to-day activities are carried out? How much cash has been squandered by the company?Assume you've been named Chief Security Officer (CSO) of a company that deals with highly sensitive and classified information. Because the materials are so sensitive, only authorised people should have access to this facility. Unauthorized access could pose a serious threat to national security. This facility is very new, and there is currently no automated information technology-based authentication mechanism in place. The first assignment you were given after being appointed as CSO was to build an IT-based identification system that checks a person's identity when he or she wishes to use the facility. Propose and describe an authentication system that can be used to verify employees and allow only those personnel with proper access rights to access classified resources. Please keep in mind that single factor authentication may not be sufficient.
- Take into consideration the recently found flaw in the system that handles authentication and access control. If this is the case, then what impact did it have on the activities that took place on a daily basis? Is there a record of the amount of money that has been lost by the company?What is the difference between authorization and integrity in terms of security?To what extent do you feel that the security of data while it is being stored and while it is being transferred should be guaranteed? Which of the following strategies has shown to be the most effective in maintaining the data's integrity while also authenticating users?
- What steps, in your view, should be done to ensure the safety of data both while it is in transit and while it is stored? Which of the following approaches is the most effective in terms of maintaining data integrity and user authentication?It would be fascinating to investigate a recent incident involving the exploitation of a security flaw in authentication or access control. This investigation would be intriguing because it would be timely. Does this result in a transformation in the commercial practises of the company? I was intrigued as to whether I could inquire about the company's loss history and, if so, what those losses entailed.With the use of authentication, can we achieve any of our objectives?We'll compare the advantages and disadvantages of different forms of authentication in this section.