Each answer should be preceded by its corresponding question and number. Answers should be about 2 to 3 paragraphs long. APA formatting will NOT apply, but be sure to spell-check before submitting your work. You may use the book or outside sources as PART of your answer, cite your sources, while also including your own thoughts and ideas.
Questions
1. A colleague asks for your assistance to further secure a department wireless network. Which of the following wireless security measures would you configure (WPA2-Enterprise, WEP, WPA-Personal, WPA2-Personal, and WPA-Enterprise) and why? Describe in detail the security configuration settings you would use. Also describe why you did NOT choose the others.
2. You have recently become the system administrator of a new database server. The requirements for the server are as follows: 7 x 24 operational access, an annual 99.99% system uptime, and data not being at risk of being viewed by unauthorized individuals. Describe in details which of the following security design goals ensure these requirements are met: confidentiality, integrity, availability, accountability?
3. If you are an enterprise security director, how would you go about choosing security best practices? Is it good security policy to always use a best practice? What are the advantages (or disadvantages) of using a best practice?
4. The rapid growth of the Internet is a contributing factor to the security threat of cyberspace. Discuss other contributing factors to the overall security threat of cyberspace.
Normal
0
false
false
false
EN-US
X-NONE
X-NONE
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:”Table Normal”;
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:””;
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:”Calibri”,sans-serif;
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-ansi-language:EN-US;
mso-fareast-language:EN-US;}
5. Your organization has just recovered from an intrusion, and as a proactive measure your CISO has mandated all vulnerabilities be located and remediated in the network. Describe in detail how you would go about doing this, ie, software, procedures, policies? Is it even possible?