Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please read the questions carefully. They are designed for you to apply your knowledge of SRA111 to answer them. 1. How do you believe as

Please read the questions carefully. They are designed for you to apply your knowledge of SRA111 to answer them.

1. How do you believe as a consumer you can protect your identity, your assets, and your data from would-be hackers?

2. As the CEO of a 5A1 company, (reference Dun & Bradstreet for meaning), you have instructed your Chief Financial Officer and your Network Administrator to restructure your log-in procedures for employees, who use computer devices within your company. You noticed there are gaps. Some employees use a multi-level and some use a single sign-in. Briefly outline a structure from top to bottom defining the Authentication-Authorization-Access Control for the different groupings within the business. (NOTE: I am referencing a 5A1 company)

3. Use the Additive (or shift) Cipher System to decode this message. OGSBK XENGV VEZUN GBKEU AOTSE IRGYY ZNOYY KSKYZKX Solve the following equation to acquire the additive key. 2y2 - 26y = -84 Solve for Y. Your additive key will be the integer result. Deciphered message: (Show decipher table for first 13 letters)

Plaintext a b c d e f g h i j k l M

position 1 2 3 4 5 6 7 8 9 10 11 12 13

Additive Key:

Position of cipher text

Cipher text

Plaintext N O P Q R S T U V W X Y Z

position 14 15 16 17 18 19 20 21 22 23 24 25 26

Additive Key:

Position of cipher text

Cipher text

4. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future use of this device on your network? What happens to the owner of the device, who is NOT employed at your company?

5. You as a small business owner have chosen NOT to comply with the Federal credit card standards set forth on October 1st. You use your smartphone for customer transactions. Your smartphone is hacked and at least 20 customer credit card/identification information is stolen. What should you as a small business owner have done to protect your customers?(The answer is NOT they should have complied with the standards).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DATABASE Administrator Make A Difference

Authors: Mohciine Elmourabit

1st Edition

B0CGM7XG75, 978-1722657802

More Books

Students also viewed these Databases questions