IT545-3: Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies.
Purpose
The purpose of this assignment is for you to engage in defining a mitigation strategy for a web server attack from within a cloud-based WAN. You will apply biometrics or cryptography as part of the solution.
Assignment Instructions
You are a cybersecurity specialist working for an online retail organization that houses their network and all servers and data in the cloud. The CEO is concerned about the web servers being hacked since they are public facing, and if they are hacked, possible access gained to sensitive customer and employee data. Assume the attack to be similar to the one performed in your lab. For this assignment, make the following assumptions:
The organization has an outward facing website that allows customers to view and purchase their products. The web server housing this website is in the organization demilitarized zone (DMZ). The DMZ uses a single firewall system. Users place orders and pay using PayPal or a credit card.
Other servers on the cloud-based network house several databases. One holds all customer personal and sensitive information. The second database holds employee personal and sensitive information. There is some encryption of these databases for data at rest, but not for data in transit and data in use (while data is being processed).
Also, on the internal network are an email server, print servers, and application servers.
Discuss potential vulnerabilities in this system.
Discuss in more detail the following:
Biometric Authentication
Discuss biometric-based authentication types that are relevant in this cloud-based system
Select a type of biometric-based authentication you would recommend for this system and justify your recommendation
Addition of Encryption for data in transit and data in use (while processed)
Discuss why there is an emerging need for encrypting data in use in a cloud environment.
Provide a description of homomorphic encryption and provide a justification as to why it should be deployed in this scenario to protect data in use.
Conclusion Paragraph
Assignment Requirements
The paper should be 2–3 pages, use 12 pt. Times New Roman, and be in APA format.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Academiarank is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download