Question: Cybersecurity task. a power point presentation. Explain the functionality and operation of security techniques and implement them as they apply to software, databases and data
Cybersecurity task.
a power point presentation.
Explain the functionality and operation of security techniques and implement
them as they apply to software, databases and data
For this part, you will need to do Lab attckiing MySQL Database" from Netacad and demonstrate the specific aspects that
meet the requirements of explaining and implementing security techniques as they apply to
databases. In this case, this means both explaining how an SQL attack works and what a defender
needs to do to protect against it
Then you will need to do "Lab Snort and Firewall rules" from Netacad and demonstrate the specific operation of the
security techniques of Snort and Firewall rules. You will need to clearly explain what Snort and
Firewalls are and how they function and help protect a network.
Your explanations will need to go beyond material that is in Netacad for both labs.
Then you are to select a tool or technique that is not covered indepth in Netacad and compare it to
Lab In your comparison you should demonstrate with screenshots, where possible, what the
tool or technique you have selected does, and how that differs from Lab in how it works, but
still achieves the same main objective of the tools in Lab
For the justification part of the report, you are to focus on Lab and compare it with the other
tool or technique that you have discussed and then justify to the specific stakeholder another level IT student and an industry employer who is interviewing you which tool or
technique is more appropriate for them.
Note: It is possible and acceptable that you may justify one system or method for one of the
stakeholders but justify the other system or method for the other stakeholder.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
