discussion question 1587
Incase you want to provide reference, the reference should be under each answer.
Q1.
Choose one of the following two topics.
- It is quite likely that many of us have experience with software firewall products. Discuss one software firewall product you have used or tried, and at least one good or bad thing you discovered about it.
- Briefly discuss the use of proxy servers and firewalls to secure a network. Many companies end up using both types of devices for network security, but proxy servers are typically more prone to compromises than firewalls. Discuss the benefits of using one over the other.
Q2.
Choose one of the following two topics and draft a 2-3 paragraph initial post. Include necessary references or any relevant personal experiences you may have that support your response.
- What would VPN access allow us to do with our home networks? For example, how might the ability to access our home computer from a remote location help us with data access to important files? What is one benefit? What is one risk?
- Most of us have likely seen a phishing e-mail. Briefly discuss methods you have used to identify whether or not an e-mail is legitimate. Compare that to best practices for dealing with potentially dangerous e-mail or websites.
Q3.
Choose one of the following two topics and draft a 2-3 paragraph initial post. Include necessary references or any relevant personal experiences you may have that support your response.
- What should and shouldn’t be allowed in an acceptable use policy? Give at least two examples to support your opinion.
- Discuss different security websites or network and security informational sites that you may already monitor and why. Limit the discussion to no more than three sites.
Q4.
Read the article,
“An unprecedented look at the Stuxnet, the world’s first digital weapon†(Links to an external site.). Provide your thoughts on why this incident is considered the tipping point of Cyber warfare.
Q5.
The Stuxnet worm was considered an Advanced Persistent threat. Read “Securing SCADA and Process Systems from Advanced Persistent Threats†(Links to an external site.) and provide your thoughts on how to detect and mitigate against such threats to SCADA systems.