Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Fill in the missing words 1 . Professor Andrew Calhoun is an expert at cyber security . 2 . The first thing Dr . McIver
Fill in the missing words
Professor Andrew Calhoun is an expert at
cyber
security
The first thing Dr McIver learned in his most recent Security job is that there is no
honor
in being a
dishonest
professional.
The missing artifacts that organizationsfirms should have is there
firewalls
intrusion detection systems
antivirus software
encryption
and
backups
Two
administrators are enough to
secure
a network?
Professor Calhoun says that you have to devote
time
money
and
resources
to cybersecurity.
A letter to the
editor
is the assignment that Professor Calhoun gives his students to perfect their professional
writing
According to Dr McIver, this is a good assignment because
degree
holders are in
leadership
roles and
written
communications are incredibly important.
According to Professor Calhoun, a Cyber Defender is an
individual
whose sole goal is to
protect
assets they are trying to safeguard on a network.
According to Dr McIver, cybersecurity is like having a good
alarm
system, response system,
firewall
and passive personnel.
security
is the
physical
protection of a person, place, or a thing.
A person
team
is a good size for a
Cyber
Defense team.
Hostbased
Analysts and
Network
Analysts are the cyber defense roles that Professor Calhoun mentions. One is
focused
focused on the hosts and the other is
focused
focused on the big
picture
of the overall
network
Snort
is the cyber defense tool that was recommended to Dr McIver.
According to Dr McIver,
Tor
Onion is like Kali
Linux
on the Blue side.
Firewalls
Intrusion Detection Systems
AntiVirus Software
are some Cyber Defense tools that Professor Calhoun mentions.
A cyber defender's goal is to
prevent
detect
respond
and limit Data Loss.
Defensive
measures
are used for limiting the chances that an
attacker
has at getting what they want.
Attackers
want
access
control
and
information
on your network.
Dr McIver mentions that Cyber Defender's additional roles are to
monitor
analyze
and remove.
Some of the tools that remove attackers are
blacklisting
ties to an IP address,
removing
files that aren't supposed to be on your network.
A defender would not remove an attacker if they wanted to
trace
the
malicious
activity.
According to Dr McIver, the two biggest things in cybersecurity that can be used to defend against
threats
are
encryption
and Cyber
access control
Cyber Hygiene is
digital devices
systems clean
uptodate
and
secure
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started