Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

home / study / engineering / computer science / questions and answers / question 1: an ethical challenge you are a security ... Your question

home / study / engineering / computer science / questions and answers / question 1: an ethical challenge you are a security ...

Your question has been answered

Let us know if you got a helpful answer. Rate this answer

Question: Question 1: An Ethical Challenge You are a securit...

Bookmark

Question 1: An Ethical Challenge

You are a security consultant with the VIU Co. and have been asked to help investigate a recent security incident that took place at the law firm, Frank, Charles and Champion. In your assignment you have been assigned to work with the vice president of IT.

The security incident that you are investigating appears to be a case of an intruder who broke into a company computer to remove and destroy information on an upcoming legal case. A forensic examination revealed that the incident was actually an inside job that was perpetrated by one of the new programmers, who is a relative of the VP of IT.

When you wrote your findings and presented then to your client, the VP of IT has asked you to change the findings in your report to show that the perpetrator could not be found. The VP has promised future work for your company and a good recommendation for your work if you comply.

What will you do next? And explain your reason based on Ethic.

Question 2: Data Replication Products Survey

As a consultant with the VIU Risk Analysis Consulting Co., you have been asked to research data replication products for a manufacturing company, ABC Plastics.

ABC Plastics has decided to build its backup application servers in a distant city. In its headquarters and in the other location, the servers run Solaris (operating system) and Oracle (database), and the database series on a SAN system. ABC Plastics would like transactions on its headquarters servers to be transmitted over a wide-area connection to the Storage Area Network (NAS) in the other city.

Find some reviews and information from Internet about replication products. Some possible sources of information include:

Searchstorage.techtarget.com

Computerworld.com

Sun.com

Oracle.com

Make a comparison of all four replication products you have identified. Discuss the differences and similarities among the products and discuss their business value.

Question 3: Research Biometric Access controls

As a consultant with the VIU Risk Analysis Consulting Co., you have been asked to research biometric access controls for a Water treatment Plant.

A number of security incidents in the past year has prompted Water treatment Plant to consider using biometrics for its building access control system. Using online research, identify at least four biometric access control products that could be used. Consider systems that are based on behavior, fingerprint, iris scan, and handprint.

Please provide me atleast one page answer 900 words

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Excel As Your Database

Authors: Paul Cornell

1st Edition

1590597516, 978-1590597514

More Books

Students also viewed these Databases questions