Preview

BTC200 HW2

Satisfactory Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BTC200 HW2
Homework Assignment #2 (B Plug-in 6)

1) How could an organization benefit from attending one of the courses offered at the Intense School?

By attending of the course offered at the school an organization would gain valuable knowledge on how to protect their system from hackers. If the organization were heavily dependent on the smooth operation of their IT system this would be essentially important. The amount of knowledge that would be gained from the courses, they can facilitate the creation of a better security system.

2) What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?

The two primary lines of security defense are through people first and technology second. The courses will enlighten the employees how easy it is for hackers to deploy social engineering to gain private information from them. Employees can use the information taught at the school to draft an information security plan that details how an organization will implement the information security policies. The school will most likely teach many of the tricks to social engineering and hacking, which the employees can use to create the detailed information security policies.

3) Determine the differences between the two primary courses offered at the Intense School, “Professional Hacking Boot Camp” and “Social Engineering in Two Days.” Which course is more important for organizational employees to attend?

The two main differences is that one covers the Technology of the security defense line and the other covers issues with the People. The course Social Engineering in Two Days is more important for organizational employees to attend because it would be easiest for hackers to gain access through employees giving away passwords, leaving password lying around, etc. So by attending this course they can protect themselves from being a victim of social engineering.

4) If

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Final Acc 340

    • 1422 Words
    • 4 Pages

    For each of the following course objectives, explain in 200-400 words what you learned in this course and how you could apply your learning of this course objective to your personal life or career. Refer to the syllabus to assist you in understanding what material was covered under each objective.…

    • 1422 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Develop a brief (300-350 word) response discussing your goals for this course. Consider the following questions in your response:…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Risky Situation

    • 1497 Words
    • 6 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1497 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Living with Art

    • 284 Words
    • 2 Pages

    9. What strengths (academic and/or personal/professional) do you feel will assist you in the successful completion of this course?…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Due to the ever changing landscape of the business world many employers often send their employees to attend trainings and seminars. Though this specialized training sessions are costly the return a company gets from it is worth the investment. A company that constantly sends its employees to school to acquire a fresh and new ideas has a greater advantage than a company that do not offer such benefit.…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Better Essays

    As the training manager for super safe security (SSS) regarding Carl Smiths concerns in response to the cost of conducting a second or refresher training, I would reassure him that this training benefits our organization goals and mission. I would also like to reassure Mr. Smith that proper training within the area of security affects us since many companies today “are in business to make money, and every business function is under pressure to show how it contributes to business success or face spending cuts and outsourcing. To help contribute to this success, training activities should help the company achieve…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Computer Engineering Ethics

    • 4012 Words
    • 17 Pages

    At the end of this class the course participant should be able to:  Identify some contributors to social and professional issues and relate their achievements to the knowledge area  Contrast between ethical and legal issues  Contrast between a patent, a trademark, and a copyright  Identify some ways of credentialing a person to practice computer engineering  Describe issues that contrast risk issues with safety issues  Identify some issues in computer engineering that address privacy  Describe whistle blowing and the conflicts between ethics and practice that may result from doing so  Describe how computer engineering uses or benefits from social and professional issues. 2.2 Reasons for Studying Social and Professional Issues…

    • 4012 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Organizational Behavior

    • 435 Words
    • 2 Pages

    3. How does a course in organizational behavior differ from courses in fields such as accounting, finance, or marketing?…

    • 435 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Industrial Attachment

    • 582 Words
    • 3 Pages

    2.2 Second week: On the second week, I was initially introduced to the importance of `security to the IT firm and how to implement it efficiently to help sustained the existence of an organization by…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Narrative Report for Ojt

    • 419 Words
    • 2 Pages

    The company created a good service to their clients and gave the besttraining for the students. The students must have a good company that wouldgive them a good training ground and would enhance their knowledge andcapabilities. The school must have the good coordination for some companiesthat offer an annual On the Job Training inside their company. The school shouldprovide more budgets given to the OJT coordinators to have the best monitoringof the training the students are taking. One of the best ways of training is theprovincial trainings that would give different experiences to the trainees. An out of town training would give more self esteem to the students. The mechanicalengineering students have their training every 4th year and second semester of the year. It is more efficient if they will take it 5th year of their last semester. Insome cases having…

    • 419 Words
    • 2 Pages
    Good Essays