cybersecurity strategies.

IT545-3: Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies.

Purpose

The purpose of this assignment is for you to engage in defining a mitigation strategy for a web server attack from within a cloud-based WAN. You will apply biometrics or cryptography as part of the solution.

Assignment Instructions

  1. You are a cybersecurity specialist working for an online retail organization that houses their network and all servers and data in the cloud. The CEO is concerned about the web servers being hacked since they are public facing, and if they are hacked, possible access gained to sensitive customer and employee data. Assume the attack to be similar to the one performed in your lab. For this assignment, make the following assumptions:
    • The organization has an outward facing website that allows customers to view and purchase their products. The web server housing this website is in the organization’s demilitarized zone (DMZ). The DMZ uses a single firewall system. Users place orders and pay using PayPal or a credit card.
    • Other servers on the cloud-based network house several databases. One holds all customer personal and sensitive information. The second database holds employee personal and sensitive information. There is some encryption of these databases for data at rest, but not for data in transit and data in use (while data is being processed).
    • Also, on the internal network are an email server, print servers, and application servers.
  2. Discuss potential vulnerabilities in this system.
  3. Discuss in more detail the following:
    • Biometric Authentication
      • Discuss biometric-based authentication types that are relevant in this cloud-based system
      • Select a type of biometric-based authentication you would recommend for this system and justify your recommendation
    • Addition of Encryption for data in transit and data in use (while processed)
      • Discuss why there is an emerging need for encrypting data in use in a cloud environment.
      • Provide a description of homomorphic encryption and provide a justification as to why it should be deployed in this scenario to protect data in use.
  4. Conclusion Paragraph

Assignment Requirements

The paper should be 2–3 pages, use 12 pt. Times New Roman, and be in APA format.

Help with any types of dissertations

Undergraduate dissertation

Choose from hundreds of experts who can assist you in completing your undergraduate dissertation! Prices start at $10 per page, with potential discounts for longer orders or extended deadlines

Master’s dissertation

 

If you are in the process of completing a Master’s degree, we can provide you with an experienced writer to finish your dissertation. We strive to offer a quick turnaround on tailored papers at an affordable price, starting at $10.30 per page.

Ph.D. or doctoral dissertation

 

Hire from among our most skilled experts to save your time and ease your workload. Prices for Ph.D. assistance start at $10.60 per page.

Dissertation Writing Help
Need Our Services?
Thesis Writing Help
Editing & Proofreading Services
Need Help, Whatsapp Us Now