Question: Task: Cybersecurity power point presentation introduction, content, two justifications. * Explain the functionality and operation of security techniques and implement them as they apply to

Task: Cybersecurity power point presentation introduction, content, two justifications.
*Explain the functionality and operation of security techniques and implement them as they apply to software, databases and data
For this part, you will need do "Lab 17.2.6 Attacking a mySQL Database"from Netacad and demonstrate the specific aspects that meet the requirements of explaining and implementing security techniques as they apply to databases. In this case, this means both explaining how an SQL attack works and what a defender needs to do to protect against it.Then you will need to do "Lab 26.1.7 Snort and Firewall rules" from Netacad and demonstrate the specific operation of the security techniques of Snort and Firewall rules. You will need to clearly explain what Snort and
Firewalls are and how they function and help protect a network.
Your explanations will need to go beyond material that is in Netacad for both labs. Then you are to select a tool or technique that is not covered in
-depth in Netacad and compare it to Lab 26.1.7.In your comparison you should demonstrate with screenshots, where possible, what the tool or technique you have selected does, and how that differs from Lab 26.1.7 in how it works, but still achieves the same main objective of the tools in Lab 26.1.7.For the justification part of the report, you are to focus on Lab 26.1.7and compare it with the other tool or technique that you have discussed and then justify to the specific stakeholders (another level 7 IT student & another industry employer who is interviwing you) which tool or technique is more appropriate for them.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!