Find Jobs
Hire Freelancers

Technological changes

$30-250 USD

Peruutettu
Julkaistu noin 13 vuotta sitten

$30-250 USD

Maksettu toimituksen yhteydessä
Projects I. Risk Assessment. Conduct a risk assessment of the information systems in your workplace (or other facility that you may access - i.e., a local library). You must describe the information system as well as providing the assessment. The student will use the NIST framework to perform the Risk Assessment. II. Security Issues with Emerging Technologies: Students will choose from a number of emerging technologies and prepare a paper that discusses security. I will offer several topics, but you are also free to chose your own (with instructors approval). 4 pages not including title and references. Suggestions: A Honeynet Project white papers. You can access the papers here [login to view URL] Select one of the papers and write about what you discovered from reading the paper. There are papers here that explain the concept of "Know Your Enemy." The "hacker" community operates a lot like warfare; defending against them requires an understanding of how they operate. This site is a great place to gather that type of information. B Cryptography. This paper can be on an algorithm, protocol or a white paper on Cryptography. At a minimum your paper should describe the following: history, security considerations (i.e.,: has it been hacked, cracked, or is it a concept), where is it being applied, or planned to be applied. C Digital Millenium Copyright Act (DMCA). The DMCA has made quite an impact on Internet Security. Your paper should at a minimum contain the following: Introduce the DMCA; When can a program be reverse engineered; IAW the DMCA security considerations with respect to the DMCA, ie: how does it affect an organization today? Comments: DMCA fair? Why or why not? How would you change it given the opportunity? D Mobile Code. Mobile Code is something that security professionals have to deal with on a daily basis. Your paper should address the following: Definition of Mobile Code; types of Mobile Code; security considerations with respect to allowing Mobile Code into your internal network; comments: Mobile Code friend or foe? E Intrusion-Detection Methods. Research the various types of intrusion-detection systems that are available to organizations. Discuss the various types and describe the circumstances in which each type should be used. Feel free to use specific examples and products to provide the reader with a complete understanding of the subject.
Projektin tunnus (ID): 947213

Tietoa projektista

2 ehdotukset
Etäprojekti
Aktiivinen 13 vuotta sitten

Haluatko ansaita rahaa?

Freelancerin tarjouskilpailun edut

Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
2 freelancerit tarjoavat keskimäärin $98 USD tätä projektia
Käyttäjän avatar
I am certain I can do this, lets start.
$75 USD 5 päivässä
4,7 (141 arvostelua)
6,6
6,6

Tietoja asiakkaasta

Maan UNITED STATES lippu
Columbia, United States
3,9
3
Liittynyt huhtik. 4, 2010

Asiakkaan vahvistus

Kiitos! Olemme lähettäneet sinulle sähköpostitse linkin, jolla voit lunastaa ilmaisen krediittisi.
Jotain meni pieleen lähetettäessä sähköpostiasi. Yritä uudelleen.
Rekisteröitynyttä käyttäjää Ilmoitettua työtä yhteensä
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Ladataan esikatselua
Lupa myönnetty Geolocation.
Kirjautumisistuntosi on vanhentunut ja sinut on kirjattu ulos. Kirjaudu uudelleen sisään.