Case Study: Select one of the areas of security operations. Provide a critique o
ID: 3741706 • Letter: C
Question
Case Study: Select one of the areas of security operations. Provide a critique of an existing process within an enterprise, and how it should be done as opposed to how it is done within an enterprise setting. This should be in the format of: •Before and after •Why the changes were made For example, if you were in charge of security, how would you change the process in place in your organization and why? •Click the Submit Assignment button below to upload your assignment to Turnitin •Due Sunday at 11:59 p.m. ET Plagiarism Three common types of plagiarism you need to be aware of as a student: •Recycling a paper; “double-dipping”; self-plagiarism: Reusing a paper you have written for a previous course •Copying directly from a source without proper quotations or paraphrasing: When you try to pass something off as your own work •Not using proper citations According to the Academic Integrity and Academic Dishonesty Handbook: Your paper should have at least 80% of your own original thought, not “borrowed, paraphrased [or] quoted” from material pulled from the Internet, articles, journals, books, etc. Your thoughts, not someone else’s! Please review the Handbook for more examples of plagiarism and how to avoid it.
Explanation / Answer
ANSWER:
Cyber safety is a safety that we give to the processor in arrange to defend it from third person or any interloper which harm you scheme without being an authorized being.
Cyber safety is very necessary require that we need now days in order to stay our scheme secluded from life form hack as of third user.
We know that present is more than a few types of attack in our system.
Let’s talk concerning some attack here for which we necessary defense of our scheme that’s cyber security. Active attack, in this type of attack a hateful person sniffs a data or information from one end of processor that is being sent to the other end of compute, and hackers will adjust that data on his own and send modified data to the other user and keep original.
In this way the system in an connection may get important and reduce the through put of the systems due to lacking of the data.
Passive assault is similarly like active attack, in this case the attacker only sniff the data and uses it for further connections.
See there can be several type of attack like mention above, so for that substance we require potent safety so that no one can harm computer though remotely or direct login.
Our motive is that to have strong qualifications while we turn on our computer.
We should forever keep verification is hash form which are not readably easily.
We should give incomplete admission to the other users who are in same organization.
Every 15 days or 1 month gap of time we should alter our login qualifications.
Every last days pop-up should make mechanically in order to change username and password.
Firewall should be well configured to every system so that computers may not get chance to access unacceptable or harm websites.
Each password be supposed to be imperceptible to every being not even in dotted notations.