Easy Discussion Replies

Must be a minimum of 100 words each

1) Chapter 19: Are firewalls breakable?

What about Firewalls!

Your reading says that a firewalls are among the first lines of defense in a network. There are different types of firewalls, and they can be either stand-alone systems or included in devices such as routers or servers. You can find firewall solutions that are marketed as hardware only and others that are software only. Many firewalls, however, consist of add-in software that is available for servers or workstations.

Class, is a firewall breakable? Thoughts? Perspectives?



2) Chapter 19)

Securing Physical Documents


Lets talk about Securing Physical Documents/Passwords/Shredding!

The type and amount of information that can be gleaned from physical documents is amazing, even in the age when there is such a push to go paperless. Dumpster diving is a common problem that puts systems at risk. Companies normally generate a huge amount of paper, most of which eventually winds up in dumpsters or recycle bins. Dumpsters may contain information that is highly sensitive in nature (such as a password a user has written on a piece of paper because they haven’t memorized it yet). In high-security and government environments, sensitive papers should either be shredded or burned. Most businesses don’t do this. In addition, the advent of “green” companies has created an increase in the amount of recycled paper, which can often contain all kinds of juicy information about a company and its individual employees.

Class, what are some of the impacts to a company when they experience a breach in security?



3) Chi 19: Security Tips for Small Businesses


ets talk about security issues related to small businesses.

Watch this video.

Video Tutorial – Security Tips for Small Businesses – 4 Minutes:

https://www.youtube.com/watch?v=LnT9KCSWYFE

Class, is this video viable to concerns we should have today? Thoughts? Perspectives?



4) Pluralsight: Common Prevention Methods

Watched the tutorial, Securing SOHO Wireless and Wired Networks! Answer the following question.

Class, what were some of the common prevention methods discussed in the video tutorial?

Watched the tutorial, Securing SOHO Wireless and Wired Networks! Answer the following question.

Class, what were some of the common prevention methods discussed in the video tutorial?


5) Pluralsight: Email Spoofing:

The word “spoof” means “falsify.” A spoofed email is one in which the sender purposely alters parts of the email to look as though it was written by someone else. Typically, the sender’s name or email address and the body of the message are formatted to appear as though they are from a legitimate source such as a bank, a newspaper, or a legitimate company on the web. Sometimes, the spoofer makes the email appear to come from a private citizen. In many cases, the spoofed email is part of a phishing attack–a con. In other cases, a spoofed email is used to dishonestly market an online service or sell you a bogus product.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.