Question
Question 1: An Ethical Challenge You are a security consultant with the VIU Co. and have been asked to help investigate a recent security incident
Question 1: An Ethical Challenge
You are a security consultant with the VIU Co. and have been asked to help investigate a recent security incident that took place at the law firm, Frank, Charles and Champion. In your assignment you have been assigned to work with the vice president of IT.
The security incident that you are investigating appears to be a case of an intruder who broke into a company computer to remove and destroy information on an upcoming legal case. A forensic examination revealed that the incident was actually an inside job that was perpetrated by one of the new programmers, who is a relative of the VP of IT. When you wrote your findings and presented then to your client, the VP of IT has asked you to change the findings in your report to show that the perpetrator could not be found. The VP has promised future work for your company and a good recommendation for your work if you comply.
What will you do next? And explain your reason based on Ethic.
Question 2: Data Replication Products Survey
As a consultant with the VIU Risk Analysis Consulting Co., you have been asked to research data replication products for a manufacturing company, ABC Plastics.
ABC Plastics has decided to build its backup application servers in a distant city. In its headquarters and in the other location, the servers run Solaris (operating system) and Oracle (database), and the database series on a SAN system. ABC Plastics would like transactions on its headquarters servers to be transmitted over a wide-area connection to the Storage Area Network (NAS) in the other city.
Find some reviews and information from Internet about replication products. Some possible sources of information include:
Searchstorage.techtarget.com
Computerworld.com
Sun.com
Oracle.com
Make a comparison of all four replication products you have identified. Discuss the differences and similarities among the products and discuss their business value.
Question 3: Research Biometric Access controls
As a consultant with the VIU Risk Analysis Consulting Co., you have been asked to research biometric access controls for a Water treatment Plant.
A number of security incidents in the past year has prompted Water treatment Plant to consider using biometrics for its building access control system. Using online research, identify at least four biometric access control products that could be used. Consider systems that are based on behavior, fingerprint, iris scan, and handprint.
Question 4: Security Tools
As a consultant with the Waterfall Consulting Co., you have been assigned to a consulting project at the VIU Company, a small manufacturing company.
VIU is considering enacting a policy that will forbid all but security analysts to posses and use security tools such as scanning tools, password crackers, disassemblers, sniffers, and code analyzers.
Explain whether this policy a good idea?
Explain on how it can be enforced?
Create a report that includes your five recommendations.
Question 5: Wireless Network Survey
As a consultant with the VIU Consulting Co., you have been asked to perform a wireless access point survey at the local Software Company offices. Software Company is concerned that there may be rogue (unauthorized) Wi-Fi access points in use in their company.
Check on Internet and find at least three tools you will use to look for a rogue access points?
List at least two pros and two cons of using these tools?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started