Computer Science Homework Help

NEC Cyber Security Planning and Management & Network Security Essays

 

Hello , PLs answer below 3 questions in a separate WORD Doc

Sub: Cybersecurity Planning and Management

  1. In 500 words, Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

Use at least three sources. Use the(https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

Sub: Network Security

  1. In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS/IPS tools that are currently on the market. Use APA format and add 2-3 references at end

2) Task: Assignment

11.1 List and briefly define three classes of intruders.

11.2 What are two common techniques used to protect a password file?

11.3 What are three benefits that can be provided by an intrusion detection system?

11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?

11.5 What metrics are useful for profile-based intrusion detection?

11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?

11.7 What is a honeypot?

11.8 What is a salt in the context of UNIX password management?

11.9 List and briefly define four techniques used to avoid guessable passwords.