Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
6 Sources
Style:
MLA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Cloud-based Honeypots, Data Loss Prevention Products, Air Gaps, and Cyber-Attackers

Research Paper Instructions:

Follow the below directions and answer ALL questions. Make it in one word document
MLA style
Site all sources
Research cloud-based honeypots. What are their advantages? What are their disadvantages? When should they not be used? How could one be set up? Create a one-page paper of your research.
Research at least four data loss prevention (DLP) products from four different vendors. Create a table that compares at least six different functions and options. Based on your research, which would you choose? What features make this product the best? Why? Write a short paragraph that summarises your research.
Use the Internet to research how air gaps are used. In which environments are they used? What are some ways in which they have been circumvented? How would you air-gap a network? Write a one-page paper on your research.
Suppose you work for a company that has been the victim of a significant cyberattack that resulted in the loss of revenue and customers and generated ill will and a lack of trust in the organisation. An angry senior vice president says that the organisation should deploy an active defence, which includes tracking down the culprits and then retaliating against them. As support for her argument, she says that this is a common practice used by the government, and as long as there is no price to pay by the attackers, then these attacks will continue. Where do you stand? Should organisations be involved in retaliation? What are the advantages? What are the risks? Write a one-page memo about what you think should be done and why

Research Paper Sample Content Preview:
Student’s Name
Professor’s Name
Course
Date
Answers
Answer 1
Cloud-based honeypots are digital security systems that are used to trap potential hackers by mimicking false vulnerabilities such that cyber-attackers think that they can easily exploit the presented weaknesses (Siemons). The primary advantages of cloud-based honeypots are that they facilitate system recovery if hackers attack a system and can be deployed to any desired geographical location through cloud system configuration. In contrast, a disadvantage of this security mechanism is that it has a narrow field of view such that it cannot detect any activity not directed to it. Fingerprinting makes it easily detectable by hackers since cloud-based honeypots portray specific behaviors. Another demerit is that if a honeypot is attacked, it can be used to harm or infiltrate other systems (Ciampa 125). Cloud-based honeypots should not be used when hackers have already breached the system, but they should be deployed to help security experts know the threats and improve the system accordingly. They are set through system configuration in the cloud to detect different types of cyber-attacks to help a firm mitigate them.
Answer 2
Data loss prevention (DLP) products from different vendors

Symantec DLP

McAfee Total Protection DLP

Google Cloud DLP

CoSoSys Endpoint Protector

About Tool

Prevents data breach

Protects system against potential data loss

Monitors and secure sensitive data while at rest, in motion, or in use (BasuMallick)

Monitors and protect data

Platforms

Linux, Windows, and Mac

Mac, Windows, and Linux

Linux, Windows, and Mac

Linux, Windows, printers, and Mac

Best For

Enterprises

Small and big firms

Large enterprises

Mid-sized businesses

Deployment

On-premise and cloud-based (Cooper)

On-premise and cloud-based (Cooper)

On-premise and cloud-based (Cooper)

Cloud-hosted, virtual appliance, and cloud services

HIPAA, PCI DSS, and GDPR Approval

Compliant

Compliant

Compliant

Compliant

Data Encryption

Encryption protection

Simple data encryption

Complex data encryption

Complex data encryption

Table 1: Comparison of DLPs and their Functions and Options.
Based on my research, the best D...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These MLA Research Paper Samples: