Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Fill in the missing words 1 . Professor Andrew Calhoun is an expert at cyber security . 2 . The first thing Dr . McIver

Fill in the missing words
1. Professor Andrew Calhoun is an expert at
cyber
security
.
2. The first thing Dr. McIver learned in his most recent Security job is that there is no
honor
in being a
dishonest
professional.
3. The missing artifacts that organizations/firms should have is there
firewalls
,
intrusion detection systems
,
anti-virus software
,
encryption
, and
backups
.
4.
Two
,
(2)
administrators are enough to
secure
a network?
5. Professor Calhoun says that you have to devote
time
,
money
, and
resources
to cybersecurity.
6. A letter to the
editor
is the assignment that Professor Calhoun gives his students to perfect their professional
writing
.
7. According to Dr. McIver, this is a good assignment because
degree
holders are in
leadership
roles and
written
communications are incredibly important.
8. According to Professor Calhoun, a Cyber Defender is an
individual
whose sole goal is to
protect
assets they are trying to safeguard on a network.
9. According to Dr. McIver, cybersecurity is like having a good
alarm
system, response system,
firewall
, and passive personnel.
security
is the
physical
protection of a person, place, or a thing.
10. A 3-4 person
team
is a good size for a
Cyber
Defense team.
11.
Host-based
Analysts and
Network
Analysts are the 2 cyber defense roles that Professor Calhoun mentions. One is
focused
focused on the hosts and the other is
focused
focused on the big
picture
of the overall
network
.
12.
Snort
is the cyber defense tool that was recommended to Dr. McIver.
13. According to Dr. McIver,
Tor
Onion is like Kali
Linux
on the Blue side.
14.
Firewalls
,
Intrusion Detection Systems
,
Anti-Virus Software
are some Cyber Defense tools that Professor Calhoun mentions.
15. A cyber defender's goal is to
prevent
,
detect
,
respond
, and limit Data Loss.
16. Defensive
measures
are used for limiting the chances that an
attacker
has at getting what they want.
17.
Attackers
want
access
,
control
, and
information
on your network.
18. Dr. McIver mentions that Cyber Defender's additional roles are to
monitor
,
analyze
, and remove.
19. Some of the tools that remove attackers are
blacklisting
ties to an IP address,
removing
files that aren't supposed to be on your network.
20. A defender would not remove an attacker if they wanted to
trace
the
malicious
activity.
21. According to Dr. McIver, the two biggest things in cybersecurity that can be used to defend against
threats
are
encryption
and Cyber
access control
.
22. Cyber Hygiene is
digital devices
,
systems clean
,
up-to-date
, and
secure
.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Describe the appropriate use of supplementary parts of a letter.

Answered: 1 week ago