How would you secure the workspaces within your building


Assignment: IT Security and Policies

Question One

An enterprise diffuses the following onlinejob offer:

For our site XYZ, we are looking for an Experienced Hybrid Mobile Application Developer (Male / Female) to strengthen our website development team and applications for mobile terminals / tablets. Your mission consists in: - Develop cross-platform websites and mobile applications - Design solutions and propose hybrid software architectures - Write and validate project technical documentation - Apply development quality rules based on internal tools (software forge, continuous integration, reporting tool ...). - Participate in costing and pre-sales. You must also be able to explain the various technical choices and present the chosen software architecture.

Required Qualifications

Bachelor's Degree in Computer Science, or a related degree

You have several experiences in the web and mobile field and especially in hybrid environments.

You have skills in: Technology: Angular, HTML5, CSS3, JavaScript, RWD, Ionic, Cordova

Mobile Culture: Technical Knowledge iOS, Android, Xamarin, Windows, Native Script English.

a) What information should be removed from this job description to avoid security problem?
b) Rewrite this job offerto meet the required job description.

Question Two

Assume that you own a building that includes workspaces such as offices, rooms and facilities:

a) How would you secure the workspaces within your building?

b) It is not enough to physically secure an area; you must also consider physical entry and exit controls. How can you identify authorized personnel entering your building?

Question Three

a) Assume that you are working in a company and your company's assets have been attacked by hybrid malware. What is hybrid malware?

b) How can malware be controlled? List two examples for each control.

Question four

Company A and company B need to communicate in a secure way.

For each of the following scenarios, you need to identify and justify which of the following four states has been achieved:

1- Confidentiality. 2- Integrity. 3- Authenticity. 4- Non-repudiation.

A. ScenarioA:

Company A sends an encrypted message to Company B using a shared key. (Assumption: Both companies maintain the secrecy of the shared key.)

B. ScenarioB:

Company A encrypts a hashed message using its own private key.

C. ScenarioC:

Company A hashes a message and sends the hash and the message through two channels. Company B receives the message and hashes it using the same hash function. After comparing the received hash to the generated hash, they find an exact match.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: How would you secure the workspaces within your building
Reference No:- TGS02957919

Now Priced at $35 (50% Discount)

Recommended (97%)

Rated (4.9/5)