Question

In: Operations Management

D5/ISI: Please make sure the answer should be at least 30 sentences with your own words....

D5/ISI: Please make sure the answer should be at least 30 sentences with your own words. Research emerging enterprise network applications and describe 3 that you think are most interesting and briefly explain why you believe this.

Solutions

Expert Solution

1. Hardware authentication

The inadequacies of usernames and passwords are well known. Clearly, a more secure form of authentication is needed. One method is to bake authentication into a user’s hardware. Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. It can combine a variety of hardware-enhanced factors at the same time to validate a user's identity.

Intel has built on previous efforts to dedicate a portion of the chipset for security functions to make a device part of the authentication process. Good authentication requires three things from users: what they know, such as a password; who they are, such as a username; and what they have, such as a token. In the case of Authenticate, the device becomes the what-you-have.

2. User-behavior analytics

Once someone's username and password are compromised, whoever has them can waltz onto a network and engage in all kinds of malicious behavior. That behavior can trigger a red flag to system defenders if they're employing user behavior analytic(UBA). The technology uses big data analytics to identify anomalous behavior by a user. Visibility into activity that does not fit the norm of the legitimate user can close a blind spot in the middle of the attack chain. “If you think of the attack chain as initial penetration, lateral movement, and then compromise, theft, and exfiltration of sensitive data, the middle links in that attack chain have not been very visible to enterprise security pros, and that's why the interest in user behavior analytics today,".

In addition, UBA can be a valuable tool for training employees in better security practices. "One of the biggest problems in a company is employees not following company policy," Grossman said. "To be able to identify those people and mitigate that risk by training them properly is critical."

3. Data loss prevention

A key to data loss prevention is technologies such as encryption and tokenization. They can protect data down to field and subfield level, which can benefit an enterprise in a number of ways:

  • Cyber-attackers cannot monetize data in the event of a successful breach.
  • Data can be securely moved and used across the extended enterprise — business processes and analytics can be performed on the data in its protected form, dramatically reducing exposure and risk.
  • The enterprise can be greatly aided in compliance to data privacy and security regulations for protection of payment card information (PCI), personally identifiable information (PII) and protected health information (PHI).

4. The cloud

The cloud is going to have a transformative impact on the security technology industry generally. As more organizations use the cloud for what has traditionally been the domain of on-premises IT, more approaches to security that are born in and for the cloud will appear. On-premises techniques will be transitioned to the cloud. Things such as virtualized security hardware, virtualized firewalls, and virtualized intrusion detection and prevention systems. But that will be an intermediate stage.


Related Solutions

M4/ISI/Art sum: Please make sure your answer should be at least 80 sentences with your own...
M4/ISI/Art sum: Please make sure your answer should be at least 80 sentences with your own words. I would appreciate if you provide any references Managerial Issues of a Networked Organization.
MIS/D3: Please make sure the answer should be in your own words with at least 30...
MIS/D3: Please make sure the answer should be in your own words with at least 30 sentences. 1. What are the business costs or risks of poof data quality? Support your discussion with at least 3 references. 2. What is data mining? Support your discussion with at least 3 references. 3. What is text mining? Support your discussion with at least 3 references.
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if...
D4/MIS: Please make sure the answer should be in your won words. I would appreciate if you provide the articles Read four (4) academically reviewed articles on Net Neutrality and Summarize all four (4) articles in at least 30 sentences words or more.
Solve the below questions using your own words PLEASE!! Make sure to write by your own...
Solve the below questions using your own words PLEASE!! Make sure to write by your own words or paraphrase 1. What is the difference between Windows and Linux server 2. Give some advantages and disadvantages Windows and Linux Operating System
Please Explain in own words and IN FULL sentences (At least 3 sentences) 1) TRUE or...
Please Explain in own words and IN FULL sentences (At least 3 sentences) 1) TRUE or FALSE, then explain answer: In a fully observable, turn-taking, zero-sum game between two perfectly rational players, it does not help the first player to know what strategy the second player is using— that is, what move the second player will make, given the first player’s move. 2) TRUE or FALSE, then explain answer: In a partially observable, turn-taking, zero-sum game between two perfectly rational...
Revenue cycle management your answer should be in complete sentences of at least 250 words. Question...
Revenue cycle management your answer should be in complete sentences of at least 250 words. Question Describe all aspects in detail of the revenue cycle management including ambulatory outpatient and inpatient services.
Please explain in your own words at least five sentences 1 double fertilization in angiosperms. 2...
Please explain in your own words at least five sentences 1 double fertilization in angiosperms. 2 mechanism for opening and closing of guard cells.
In your words explain what is RACE. Please make sure not to limit your answer just...
In your words explain what is RACE. Please make sure not to limit your answer just to the physical features. I'm interested to read your opinion on how you think the concept have been utilized at the social, economic and government levels.
Please answer the questions below in your own opinion. Please make it a least 1 page...
Please answer the questions below in your own opinion. Please make it a least 1 page long. What does Managing Human Resources means to you and how can it enlightened you as a future manager/supervisor in the workplace today? For your information: This is my final paper assignment question that I am to answer in essay form: The final paper will address your indiviual expression of: "What Managing Human Resources means to you and how taking this course/module has enlightened...
Answer should be in complete sentences of at least 250 words. Question Describe in detail the...
Answer should be in complete sentences of at least 250 words. Question Describe in detail the process and forms used to submit claims for reimbursement (must address Patient registration , documentation , coding , charge capture , charge master ( GDM ), Technical and professional components , claim submission , medical necessity and working the accounts receivable (AR) .
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT