Internet for various computer security certifications


1. Search the Internet for various computer security certifications. List 4 security related certifications, the vendor, and some of the areas they cover. For example – Security+ by Comptia covers …….

2. Go to www.bls.gov and search for information pertaining to this course such as information security, cyber forensics, ethical hacking etc. Click on some of the links and make note of the job outlook, pay scales, and other pertinent information.

3. Still at www.bls.gov list some of the education requirements/suggestions a security professional should have.

4. Do a quick job search for anything information security related. What are some of the requirements jobs in our area are looking for? fairfieldcountyjobs.com indeed.com monster.com and even googling “What skills should an information security professional have?” can be helpful.

You dont need to write a disertation – just simply answer the questions. I’m not an English teacher and this isnt a writing class ?? (unless I specifically ask you for a well written answer)

List the 7 layers of the OSI model, briefly explain what each layer is responsible for, and then list 1-2 security concerns at each layer.
Bullet points are fine.

Layer 1:

Physical layer – Transmission of electrical signals. Wiring.

Security Concern – Broken wires, tapped wires, physical access to resources.

I dont mind if you use this paper and sumarize the layers:

https://www.giac.org/paper/gsec/3908/layered-security-model-osi-information-security/106272

Write a brief summary of Virtualization describing the hitsory and benefits.

Describe the relationship between cloud computing and virtualization.

Define the following: SAAS, PAAS, IAAS

List three major cloud computing service providers.

Based on your research into Virtualization and cloud computing, where do you see cloud computing in the next few years?

We had a brief discussion in class with regard to Anonymous and their hack of ISIS twitter accounts. We had good arguments for and against the hacks and really the conversation can go either way.

I want you to write two separate arguments. One for and the other against this type of behavior. The arguments should be clear, concise, and solid.

There is no limit or minimum requirement for this paper. It doesn’t have to be long. If you can get your point across in 1 page for both arguments then fine. If it takes more then that is fine too. I just dont want filler. I actually want you to think about it and present arguments as though you were debating and winning an election of some sort depended on your argument.

**Don’t mix arguments. This should be 2 separate and quick arguments.

This homework is opinion based. There are no wrong answers. I am more interested in how you structure your thoughts and defend your answer. There is no size requirement for this paper. Please do not ask “So uhh how long should it be?”. I don’t want filler that provides no substance to the paper. If you can write a solid one page paper then fine. If it takes you longer to defend your answer then that is fine too. Please do not take much time on this (but make sure you put senior level effort into it). It is not a final research project or a master’s thesis. If you find that this takes you more than an hour or two then walk away and come back later because thats too long.

Part A:

I recently interviewed with a government agency and one of the questions asked was “What are your thoughts on Edward Snowden?”.

My opinion is that the man has a lot of courage to have blown the whistle and uncover a lot of privacy concerns performed by our government. I’ll be the first to say that if I were in that situation I wouldn’t have been able to do it. He essentially lost his future wife, family, and any thought of a normal life for what he believed was the right thing to do. I think the world needs people like that. From a network security standpoint – This should have NEVER happened. There are just so many holes in the security measures in place that could have easily stopped a data leakage such as this. I mentioned one in class – Dual Key authentication. In a dual key situation you will need at least two people, and sometimes more, to enter two halves of the password. If someone is planning malicious behavior they will need to plan it together making theft much more difficult.

So what are your thoughts on Edward Snowden and privacy? I want you to come up with a well thought out argument defending your opinion.

There are a lot of points you can make:

– Is what he did illegal? Did it violate a company policy? Is that illegal?

– Do you think his sacrifice actually made a difference? How so?

– If you found what he found would you have acted in the same way? What would you have done differently?

– Do you see him as a hero or a coward?

– Do we need such monitoring in place to maintain the safety of our country?

– Anything else you want to discuss is fine.

This is an opinion so there are no wrong answers. I am looking to see how you structure your argument and how clear you can get your point across.

Part B:

Think about this from a network security standpoint. Take the government out of it and replace it with any other business or corporation. I want you to touch on Confidentiality, Integrity, and Availability. I mentioned in class that all data breaches are a result of one of these being violated. What was violated here? What safety measures can be put into place to ensure this doesn’t happen again. For instance – Could this have been avoided with encryption? What are your thoughts on the integrity of the files (both with the NSA and that he possesses)? Maybe you think logging and video monitoring could have caught this before it leaked. **Note: You do not need to answer the things I listed here. These are just examples. Write about whatever you want.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Internet for various computer security certifications
Reference No:- TGS01426210

Expected delivery within 24 Hours