Question
Please read the questions carefully. They are designed for you to apply your knowledge of SRA111 to answer them. 1. How do you believe as
Please read the questions carefully. They are designed for you to apply your knowledge of SRA111 to answer them.
1. How do you believe as a consumer you can protect your identity, your assets, and your data from would-be hackers?
2. As the CEO of a 5A1 company, (reference Dun & Bradstreet for meaning), you have instructed your Chief Financial Officer and your Network Administrator to restructure your log-in procedures for employees, who use computer devices within your company. You noticed there are gaps. Some employees use a multi-level and some use a single sign-in. Briefly outline a structure from top to bottom defining the Authentication-Authorization-Access Control for the different groupings within the business. (NOTE: I am referencing a 5A1 company)
3. Use the Additive (or shift) Cipher System to decode this message. OGSBK XENGV VEZUN GBKEU AOTSE IRGYY ZNOYY KSKYZKX Solve the following equation to acquire the additive key. 2y2 - 26y = -84 Solve for Y. Your additive key will be the integer result. Deciphered message: (Show decipher table for first 13 letters)
Plaintext a b c d e f g h i j k l M
position 1 2 3 4 5 6 7 8 9 10 11 12 13
Additive Key:
Position of cipher text
Cipher text
Plaintext N O P Q R S T U V W X Y Z
position 14 15 16 17 18 19 20 21 22 23 24 25 26
Additive Key:
Position of cipher text
Cipher text
4. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future use of this device on your network? What happens to the owner of the device, who is NOT employed at your company?
5. You as a small business owner have chosen NOT to comply with the Federal credit card standards set forth on October 1st. You use your smartphone for customer transactions. Your smartphone is hacked and at least 20 customer credit card/identification information is stolen. What should you as a small business owner have done to protect your customers?(The answer is NOT they should have complied with the standards).
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started