From the e-activity determine whether or not the rsa


1. From the e-Activity, determine whether or not the RSA customers should have depended on a third-party tool for access control. Suggest at least five ways that customers could have avoided this vulnerability. Determine how RSA could have been able to prevent this vulnerability.
*****E-activity Link- https://www.pcmag.com/article2/0,2817,2382970,00.asp *****

2. Suggest at least five ways to keep passwords secure. From the ways that you suggested, predict which one is most likely to be successful and explain why.

3. Determine whether you would recommend a host-based or stacked-based IDS and why. List at least five reasons for your selection.

4. Examine at least five advantages and five disadvantages of an IPS over an IDS. Recommend whether you would implement an IDS, IPS, or both. Justify your recommendation. 

Solution Preview :

Prepared by a verified Expert
Management Information Sys: From the e-activity determine whether or not the rsa
Reference No:- TGS01302488

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)