Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Task: Cybersecurity power point presentation introduction, content, two justifications . please broader and detailed explanation of the the functionality and operation of security techniques and

Task: Cybersecurity power point presentation introduction, content, two justifications . please broader and detailed explanation of the the functionality and operation of security techniques and implement them as they apply to software, databases and data would be match appriciated.
*Explain the functionality and operation of security techniques and implement them as they apply to software, databases and data
For this part, you will need do "Lab 17.2.6 Attacking a mySQL Database"from Netacad and demonstrate the specific aspects that meet the requirements of explaining and implementing security techniques as they apply to databases. In this case, this means both explaining how an SQL attack works and what a defender needs to do to protect against it.
Then you will need to do "Lab 26.1.7 Snort and Firewall rules" from Netacad and demonstrate the specific operation of the security techniques of Snort and Firewall rules. You will need to clearly explain what Snort and
Firewalls are and how they function and help protect a network.
Your explanations will need to go beyond material that is in Netacad for both labs. Then you are to select a tool or technique that is not covered in-depth in Netacad and compare it to
Lab 26.1.7. In your comparison you should demonstrate with screenshots, where possible, what the tool or technique you have selected does, and how that differs from Lab 26.1.7 in how it works, but still achieves the same main objective of the tools in Lab 26.1.7.
For the justification part of the report, you are to focus on Lab 26.1.7 and compare it with the other tool or technique that you have discussed and then justify to the specific stakeholders ( another level 7 IT student & another industry employer who is interviwing you) which tool or technique is more appropriate for them.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DB2 11 The Ultimate Database For Cloud Analytics And Mobile

Authors: John Campbell, Chris Crone, Gareth Jones, Surekha Parekh, Jay Yothers

1st Edition

1583474013, 978-1583474013

More Books

Students also viewed these Databases questions