Question 1 (20 marks)Use the Internet to research defenses against injection attacks.a) What are the defenses to protect against SQL injection attacks, XML injection attacks, and XSS?b) How difficult are they to implement?c) Why are these defenses not used extensively? Write a two-page research to answer these questions1.Question 2 (20 marks)Data loss prevention (DLP) is a system for monitoring how critical data is accessed.a) Use the Internet to identify three DLP products.b) Make a list of their features, architecture, strengths, weaknesses, and so on.c) Then determine if each of these products could be used by an attacker to identify vulnerabilities in an organization’s data protection. Create a table comparing the products and write an analysis of your research2.1 Based on Ciampa, M. (2015). Security + Guide to Network Security Fundamentals. Boston (Cengage Learning)p. 1332 Based on same, p. 177Page 2 of 2Question 3 (20 marks)Hypertext Transport Protocol over Secure Sockets Layer (HTTPS) is becoming increasingly more popular as a security protocol for Web traffic. Some sites automatically use HTTPS for all transactions (like Google Gmail), while others require that the user must configure it in their settings(such as Facebook).a) What are the advantages of HTTPS?b) What are its disadvantages?c) How is it different from HTTP?d) How must the server be set up for HTTPS transactions?e) How would it protect you using a public Wi-Fi connection at a local coffee shop?f) Should all Web traffic be required to use HTTPS? Why or why not? Fully argument your answers3.Question 4 (20 marks)As cloud computing increases in popularity, enhanced features are being added. Amazon Web Services (AWS) now supports a Virtual Private Cloud infrastructure through which organizations can create a network topology in the AWS cloud that closely resembles their own physical data center, including public, private, and demilitarized zones (DMZs).a) Research AWS’s Virtual Private Cloud or another cloud vendor’s similar offering. What are your impressions?b) Would this be something that an organization should consider?c) What are its technical limitations?Write a two-page summary of your research 4.Question 5 (20 marks)a) Interview a network administrator or an IT professional. Ask questions to find out how is cyber security approached in his/her line of work.b) Write a summary of the interview (provide the transcript as an appendix).c) Using critical thinking and considering the knowledge gained from this subject, what have you learned about e-security from this professional?
The post CP5603 Advanced E-Security appeared first on Homework Aider.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"