Computer Science Homework Help

AUMC Chapter 20 Cryptography and Network Security Principles and Practice Discussion Post

 

After reading chapter 20, analyze how a VPN is used for telework and how it helps to keep data safe .  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other student in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Your responses to other students must be more than a simple “Good job” or “I agree with your post”. They must also not just be “Let me add to your post…” Instead, your responses to each other should do three things:

1. Acknowledge the other student’s post with some form of recognition about what they posted
2. Relate their posting to something you have learned or are familiar with
3. Add to the conversation by asking additional questions about their post, or discussing their topic further

POST 1

Virtual private network (VPN) is software that can be used to access data remotely and facilitates control over the data and allows people to work. it is an easy way to make the connection between management and employees. it can take place by connecting other networks with the use of the internet. It allows users to securely access and keeps private data security. VPNs are used to keep data safe. Some key points help to keep data secure. They can be explained as follows. It is used to create a tunnel for encrypted data. It is used for telework. It can be described as follows. Device control is one of the connections which is used in telework. In every organization it keeps its network secured (Buc?a, 2020).

It ensures that another to providing secure teleworking. It allows employees to access it. Access control is another component that is used by VPN in teleworking. Remote access to information can take place within the use of identity verification. It creates security along with the authentication factors which are used to make sure identity theft. Managing permissions and roles is another aspect of making use of access control. VPNs are used to make security to data. It keeps public internet connections secure. It can occur with the use of encrypting users’ information and it prevents by shielding user’s online activity. This activity is not possible to theft or any cybercrimes. It protects data from cybercriminals (Scarfone, Greene & Souppaya, 2020).

POST 2

Working from home is one of the bonuses that many companies provide to employees to help sweeten the deal. The recent coronavirus outbreak has only added to this, prompting many more companies to allow their staff to work from home. Remote access VPNs are used by businesses to create a secure connection between their network and the devices that remote workers utilize. Employees can access network resources as if their devices were physically plugged in at the office once they are connected. A remote access VPN connects an employee’s device to the company’s network via a virtual tunnel. The data transferred back and forth over this tunnel travels over the public internet, but it is secured by encryption and security procedures to help keep it private and secure. A network access server and VPN client software are the two basic components of this form of VPN. A dedicated network access server or a software application operating on a shared server can both be used as a network access server. To use a remote access VPN, users connect to the NAS over the internet. (Spadafora, 2020)

To access the servers securely and the data in your datacenter or your office is possible with the use of a properly built VPN. Many companies have either implemented or are in the process of implementing a work-from-home strategy to encourage employees to stay at home during the COVID-19 outbreak. An encrypted tunnel is an essential component of all VPN types. Encryption and tunneling protocols come in a variety of forms. A VPN also connects to a client, which requires the user to verify each time for security reasons. VPN further reduces the risk of data leaks by assigning each user and website a unique IP address, which is discovered using a DNS server. It establishes a secure connection from any location while also avoiding annoying adverts. VPNs are a useful tool, but they are not a cloak of anonymity. (Stornelli, 2020)

Computer Science Homework Help

HIT 301 Wilmington University Week 7 HIT in the Covid19 Pandemic Discussion

 

I’m working on a computer science question and need support to help me learn.

The novel corona virus disease has many people in the community
staying home and only going out to get essential items and for work. The
world came to a standstill to ensure disease control and prevention.
The severity and reach of the corona virus pandemic have drastically
changed our everyday lives. In the middle of all the chaos and confusion
the virus brought, information technology has played a crucial role in
maintaining a sense of normality or abnormality.

  • Discuss the role of public health informatics in ensuring healthy communities.
  • Where have you sought information to help your community: the
    internet, Facebook, twitter, Instagram or from the different news feed
    (CNN, MSNBC, FOX)?
  • Provide an example of information that you felt the need to “Fact check”.
  • What method did you use to fact check the information? Were you able to validate the information you received as accurate or inaccurate?
  • Did you then share your results and if so, where?

Computer Science Homework Help

CSI 31 Bronx Community College What Does the Following Code Print Questions

 

. What does the following code print? Explain and justify your answer.

D = {6:5, 9:2, 3:7, 2:9} k=0

t=0

while k < 9:

if k in D:

t = t + D[k]

k=k+3

print(“t = “, t)

print(“k = “, k)

2. What does the following code print? Explain and justify your answer.

def csi(x):

if x <= 0:

return 1

else:

return 10 + csi(x – 1)

print(csi(-5))

print(csi(3))

print(csi(50))

Computer Science Homework Help

Arab Open University Cyber Security Session Hijacking Discussion

 

I need help with a Cyber Security question. All explanations and answers will be used to help me learn.

Session hijacking is difficult and can only take place when certain factors are under the attacker’s control. What measures can security professionals take to minimize session hijacking? Discuss the steps needed to develop a session hijacking plan.

Computer Science Homework Help

Arab Open University Saudi Aramco Malicious Software Malware Attacks Discussion

 

I’m trying to study for my Cyber Security course and I need some help to understand this question.

Malicious software (malware)  attacks continue to be a major threat to systems and networks. Conduct  research on an attack that has occurred within the past 24 months. If  possible, this should be an attack that had an impact in Saudi Arabia or  the Middle East. Describe the following:

  • The type of malware, method of attack, and system vulnerability exploited. Determine if there is a CVE number associated with this exploit/vulnerability, if so what is it?
  • How many systems were affected and estimated cost impact?
  • How would a successful attack like this impact you or your organization?
  • What steps could have been taken to prevent this exploitation?

Computer Science Homework Help

Cisco Basic Switch Configuration on Packet Tracer Lab Report

 

Hello,

I need some help in this lab please

Please solve all questions as required and in questions that ask screenshots with name (Abdulla Alshamsi) this is my name between brackets.

Please use packet tracer to do this lab

1.Lab Report General Instructions

1.This lab is individual work.

2.Lab report should include your names and IDs.

3.Lab report should include answers to all questions highlighted in grey.

4.Lab report should include all required screenshots.

5.Screenshots should include your names at the command prompt.

6.Lab report should include answers to all reflection questions. This part is individual work even if the lab is group work. Pls use your own words to answer the questions. Copy answers will receive zero.

7.Reflection questions should be answered clearly with enough elaboration.

8.Save your name and ID in the user profile of the PKA file. Add your info in the user profile popup as soon as you open the file. A PKA file without your name and ID will receive Zero.

Computer Science Homework Help

George Mason University Week 6 FERPA Law Paper

 

INSTRUCTIONS:

As a student, this case study should be of interest to you.

Read the case study titled “Gonzaga University Student” You must chose a side in this case either that of the student or that of Gonzaga University.

Do you feel that the University was justified in releasing the student’s records? Why or Why not?

https://owl.english.purdue.edu/owl/resource/560/01/ (Links to an external site.) (Links to an external site.)
https://owl.english.purdue.edu/owl/resource/747/01/ (Links to an external site.) (Links to an external site.)
http://www.law.cornell.edu/supct/html/01-679.ZS.html (Links to an external site.) (Links to an external site.)

Computer Science Homework Help

University of the Cumberlands Bitcoin Digital Currency Research Paper

 

For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Computer Science Homework Help

University of the Cumberlands Contingency Planning Essay

 

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.