Multiple IT Security Discussion Topics

Unit 5 Discussion (1-page)

Corporate E-Mail Security

Don't use plagiarized sources. Get Your Custom Essay on
Multiple IT Security Discussion Topics
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

Employees within an organization regularly use company e-mail for exchanging information with people both inside and outside the organization. Because these e-mail messages use the Internet, they render the network vulnerable to external threats. The organization should incorporate e-mail security measures to address these threats.
For this Discussion, explain two important risks facing an organization by its employees using corporate e-mail (Microsoft Exchange, for example). What privacy safeguards and countermeasures would you suggest to the organization to protect e-mails going outside the company, and address junk mail, phishing attacks, and malicious links and attachments in incoming e-mail? Justify your selections.

Unit 5 Learning Resources

This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit’s assigned Learning Resources.
In Unit 5, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.
Required Resources
Note: To access this week’s required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus.
Readings
• Stallings, W., & Brown, L. (2017). Computer security: Principles and practice (4th ed.). Upper Saddle River, NJ: Pearson.
o Chapter 9, “Firewalls and Intrusion Prevention Systems” (9.1–9.5)

In this chapter, you are introduced to the concepts of firewall and intrusion prevention. You will explore the roles and key characteristics of firewalls, the difference between firewalls and intrusion prevention systems, and the concept of unified threat management system.
o Chapter 22, “Internet Security Protocols and Standards” (22.1–22.3)

In this chapter, you are introduced to Internet security. You will examine the important Internet security protocols and standards.
o Chapter 23, “Internet Authentication Applications”

In this chapter, you will examine some authentication functions developed for network-based authentication and digital signatures. You will explore Kerberos, public-key infrastructure, and the need for a federated identity management system.
o Chapter 24, “Wireless Network Security”

In this chapter, you are introduced to wireless network security. You will examine the security threats for wireless networks and their countermeasures. You will also explore the IEEE 802.11 wireless LAN standard.
• Kissel, Z & Wang, J. (2015). Introduction to Network Security : Theory and Practice. John Wiley & Sons, Incorporated. Retrieved from https://ebookcentral.proquest.com/lib/waldenu/reader.action?docID=4040040&ppg=429#
• Chapter 5 Network Security Protocols in Practice
In this part, you are introduced to the concepts of computer security, ethical implications of security, network theory, and basic cryptography. You will explore security threat models, common mitigation methods, and certifications related to security.
• Chapter 6 Wireless Network Security
In this part you are introduced to the physical layer (first layer) of the OSI (Open Systems Interconnection) model. You will examine physical LAN and wireless networking.
• Chapter 7 Cloud Security
When carrying out computation and storing data on the clouds, the security of user data and computation lies in the control of the cloud providers.
• Chapter 8 Network Perimeter Security
Protecting an edge network against intruders, regardless of how well each individual computer is protected, is similar to protecting a city against intrusions in ancient times. In those days, a fortified wall was built around the city as a barrier separating the inside from the outside.

• Microsoft TechNet. (2006). How to protect e-mail confidentiality in regulated industries. Retrieved from http://technet.microsoft.com/en-us/library/cc875813.aspx

In this article, you come across an overview of how to protect confidentiality in e-mail systems for smaller and medium-sized industries by using S/MIME, which provides digital signatures and message encryption.

Unit 6 Discussion (1-page)

Protection of Intellectual Property

Many people download movies, music, and software to a computer. Streaming services for downloading such applications are common on personal computers and mobile devices. In many cases, peer-to-peer file sharing of copyrighted materials is illegal, yet this activity persists and is popular on the Internet. There are existing as well as proposed laws to combat such piracy; however, laws and regulations may apply in one jurisdiction and not in another, and not all cultures treat intellectual property (IP) the same. For this Discussion, evaluate the effectiveness of current countermeasures against theft of IP.
Consider the existing technologies and laws as countermeasures to IP theft in your country. Evaluate them based on their effectiveness to curtail digital content piracy. What modifications to these countermeasures would you suggest to make them more effective? Explain your reasoning.
Unit 6 Learning Resources

This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit’s assigned Learning Resources.
In Unit 6, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.
Required Resources
Readings
• Stallings, W., & Brown, L. (2017). Computer security: Principles and practice (4th ed.). Upper Saddle River, NJ: Pearson.
o Chapter 5, “Database and Data Center Security”

In this chapter, you are introduced to the concept of database security. You will learn about the security issues involved with database systems, approaches to database access control, use of encryption in a database system, and security issues related to cloud computing.
o Chapter 11, “Software Security”

In this chapter, you are introduced to code vulnerabilities in software development. You will learn about detailing potential points of vulnerability in an abstract view of a program, defensive programming, and security concerns from the interaction between programs and O/S components.
o Chapter 19, “Legal and Ethical Aspects” (19.1–19.2)

In this chapter, you are introduced to the significant legal and ethical issues associated with computer security. You will learn about computer crimes, intellectual property, and privacy issues.
• Chebyshev, V., Sinitsyn, F., Parinov, D., Liskin, A., & Kupreev, O. (2018). IT threat evolution Q1 2018. Statistics. Retrieved from https://securelist.com/it-threat-evolution-q1-2018-statistics/85541/

This webpage provides statistics regarding different categories of security violation outbreaks and web threats.
• Microsoft. (2012). Microsoft security development lifecycle. Retrieved from http://www.microsoft.com/security/sdl/default.aspx

This webpage provides a brief definition of Security Development Life Cycle and provides links to pages explaining each stage of the Security Development Life Cycle.

Unit 7 Discussion (1-page)

Mobile Security Measures
Mobile devices are extremely popular. Smart phones, palmtops, and tablet computers have flooded the market. They are being widely used all across the globe. Mobile devices offer many innovative features to enable mobile commerce; however, they also have led to a range of new security concerns.
For this Discussion, you will analyze mobile security threats and evaluate countermeasures.
Briefly describe your mobile device and another device currently on the market that uses a different OS. Explain the security vulnerabilities associated with each device. Explain the security solutions that would address the vulnerabilities. Finally, state which OS has more robust security and explain your reasoning.

Unit 7 Learning Resources

This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit’s assigned Learning Resources.
In Unit 7, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.
Required Resources
Readings
• Glynn, F. (2012). A CISO’s guide To application security – Part 1: Defining AppSec. Retrieved from https://threatpost.com/cisos-guide-application-security-part-1-defining-appsec-041012/76421/

In this article, the author prescribes different measures to combat mobile malware threats.
• Juniper Networks. (2012). Security intelligence center. Retrieved from http://www.juniper.net/us/en/security/

In this webpage, you come across small news reports about a few aspects of mobile threats.
• Lai, E. (2010, December 20). Forrester’s top 20 mobile device management best practices for enterprises. ZDNet. Retrieved from http://www.forbes.com/sites/sap/2010/12/20/forresters-top-20-mobile-device-management-best-practices-for-enterprises/

In this blog article, the author suggests some important prescriptive measures to combat against mobile threats.
• Lookout Mobile Security. (2011, August). Mobile threat report. Retrieved from https://www.lookout.com/resources/reports/mobile-threat-report

In this report, you are presented with a detailed analysis of different categories of current mobile threats and potential future trends.
• McAfee. (2018). McAfee Labs Threats Reports: Insights into malware, ransomware, and other cybersecurity threats from the McAfee threat research team. Retrieved from https://www.mcafee.com/enterprise/en-us/threat-center/mcafee-labs/reports.htm

Unit 8 Discussion (1-page)
Monitoring IT Usage of Employees
Employees can compromise an organization’s confidential information, deliberately or inadvertently, through their network and Internet usage. Such concerns prompt companies to introduce security monitoring of their employees. However, they have to consider its legal and ethical aspects before deciding to track and monitor employee activities.
In addition to concerns about employees in general, IT administrators have greater access than other employees to various systems, including security log servers, Active Directory management tools, e-mail servers, and storage systems. While they need that privilege to do their jobs effectively, they can also misuse it. For this Discussion, in addition to your assigned reading, conduct some research through the Walden Library and the Internet on monitoring IT usage of employees.
Briefly describe the main ethical and legal issues that organizations face in relation to security monitoring of network and Internet usage of employees. Provide your opinion about whether or not an organization should have different security monitoring policies for employees of different types and roles. Justify your opinion. In addition, explain how auditing and logging management procedures can help monitoring network and Internet usage of employees. Describe the concerns the auditing and logging management procedures would need to address in order to monitor all employees, including those with administrative access.

Unit 8 Learning Resources
This page contains the Learning Resources for this unit. Be sure to scroll down the page to see all of this unit’s assigned Learning Resources.
In Unit 8, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.
Required Resources
Readings
• Stallings, W., & Brown, L. (2017). Computer security: Principles and practice (4th ed.). Upper Saddle River, NJ: Pearson.
o Chapter 8, “Intrusion Detection”

In this chapter, you are introduced to the concept of “Intrusion”: the act of trespassing into a system. You will examine the intruders and the different intrusion detection principles and methods.
o Chapter 9, “Firewalls and Intrusion Prevention Systems” (9.6–9.9)

In this chapter, you are introduced to the concept of firewalls. You will explore the need for firewalls, their characteristics, and their functions as security solutions.
o Chapter 18, “Security Auditing”

In this chapter, you are introduced to the concept of security auditing. You will examine security audit architecture, security audit trails, and considerations when implementing security logging.
• Global Justice Information Sharing Initiative Security Working Group. (2004). Applying security practices to justice information sharing. Retrieved from https://it.ojp.gov/documents/200404_ApplyingSecurityPractices_v_2.0.pdf
o Chapter 2, “Security Disciplines” (Objective 3: Detection and Recovery)

In this article, the author discusses in detail the concepts of Intrusion Detection Systems, Critical Incident Response, Security Auditing, and Disaster Recovery.
• Sayana, S. A. (2003). Approach to auditing network security. Information Systems Audit and Control Association, 5.

In this article, the author provides an overview of network vulnerabilities, control mechanisms, important considerations for auditing network security, and evaluation of protection mechanisms.

The Homework Market
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure all papers are plagiarism-free and do not share them with third parties.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.

Admissions

Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.