Question

In: Computer Science

There are a lot of strategies for setting up network defense systems. Physical restrictions can be...

There are a lot of strategies for setting up network defense systems. Physical restrictions can be put in place, such as separating hardware, or using switches and cabling to do so. One can also use virtualized segmentation in the form of VLANs, and virtual networks (including switches). What strategy do you feel is best suited to defend against modern cybersecurity threats? State your opinion concerning which technologies you would deploy if you were positioned to protect a university campus from cybersecurity threats. use any type of security, just need to know what is a strategy you would use that will defend against cybersecurity threats, and why? What is the best technology to use if I was to deploy one for a university?

Solutions

Expert Solution

Answer)
A cyber threat in cybersecurity is a possible danger scenario where a vulnerability might be exploited and the security can be breached. In today's internet-connected world, we are going through the Internet-related activities every day and we are using the Internet in many operations of day to day lives such as securing a campus network. Thus for a company for which the security systems and encryption systems were breached, we need to adopt a certain number of steps to make the company information system secure against similar outsider and insider threats. Thus Cybersecurity is very important in the digital and connected world.
Cybersecurity was much less of a drama and requirement in the early areas of the Internet when the Internet was major used by limited people and much used in the research purposes in the 1980s and 1990s. But however the needs of today are different, in the ages of cloud computing and IoT, and internet-enabled computers, mobile phones, even TVs and household appliances are there. Thus cybersecurity has to be taken more seriously than before.
There are many strategies which can be used to secure a university campus from cybersecurity threats such as:
a) Installing and maintaining the firewall
b) Keeping the security patches and hotfixes updated
c) Installing and monitoring systems with virus and spyware protection
d) Backing up the hard drives and other important data
e) Monitoring security bulletins to secure operating system and applications
f) The closing of certain ports on the servers and computers
g) Using strong encryption policies
h) Using VLAN to segregate different departments and types of users
The best technology among all these and most necessary should be the firewall implementation and encryptions along with keeping the security patches and hotfixes updated.


Related Solutions

A security analyst is interested in setting up an IDS to monitor the company network. The...
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation? A. Network tap B. Honeypot C. Aggregation D. Port mirror
Consider a small sized company that is interested in setting up a network for their business....
Consider a small sized company that is interested in setting up a network for their business. The company has a total of 350 employees: 250 employees are located on five floors of the HQ building based in Chicago, and the other 100 employees are located on two floors in a building in Seattle. The two sites are connected using a WAN link. Each employee has a desktop and an IP phone on their desk. In each office (building), there are...
Summarize the equipment needed, and explain in detail the procedure for setting up a home network,...
Summarize the equipment needed, and explain in detail the procedure for setting up a home network, and connecting to the internet.
Johnson Entertainment Systems is setting up to manufacture a new line of video game consoles. The...
Johnson Entertainment Systems is setting up to manufacture a new line of video game consoles. The cost of the manufacturing equipment is $1,773,750. Expected cash flows over the next four years are $350,000, $828,000, $1,230,000, and $1,350,000. Given the company's required rate of return of 11 percent, what is the NPV of this project? Group of answer choices $300,672.27 $400,896.36 $1,102,465.00 $1,002,240.91 Question 8 TeleNyckel, Inc, has a beta of –0.29 and is trying to calculate its cost of equity...
How can I identify the PUN (Pull Up Network) and PDN (Pull Down Network), if shown...
How can I identify the PUN (Pull Up Network) and PDN (Pull Down Network), if shown a schematic diagram of each.
Can you please answer the following questions 1. A university is setting up new courses and...
Can you please answer the following questions 1. A university is setting up new courses and hoping to attract international students. What issues need to be considered in developing a suitable international services distribution system? 2.The development of a services marketing campaign needs a totally different approach to that of a physical goods-based campaign. Discuss this concept and justify your answer in 500 words with 2 references supported 3. You are responsible for training a group of people who will...
Please how can hard and soft supply chain & network managements practices influences d systems support...
Please how can hard and soft supply chain & network managements practices influences d systems support of an organization. Would appreciate your help a lot. Thanks in advance
Please how can hard and soft supply chain & network managements practices influences d systems support...
Please how can hard and soft supply chain & network managements practices influences d systems support of an organization. Would appreciate your help a lot. Thanks in advance
Please how can hard and soft supply chain & network managements practices influences d systems support...
Please how can hard and soft supply chain & network managements practices influences d systems support of an organization. Would appreciate your help a lot. Thanks in advance
One way a business can speed up collections is Lock Box Systems or Regional Collection Centers....
One way a business can speed up collections is Lock Box Systems or Regional Collection Centers. Explain how these can be used to speed up collections.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT