Categories
Information Assurance

Title: “Data Link Protection for Remote Work: SSL vs IPsec – A CISO’s Recommendation” a. Arguments in favor of SSL: – SSL (Secure Sockets Layer) is a widely used and trusted protocol for securing data transmission

You are the CISO for Amalgamated Widget.  The company wants to protect the data link when employees visit the company website to work from home. Alice argues for using SSL and Tina argues for using IPsec.
a.  List arguments Alice might use in favor of SSL.
b.  List arguments Tina might use in favor of IPsec.
c.  Make a recommendation to the CIO.

Categories
Information Assurance

Title: The Transfer of IANA Stewardship to the United Nations: Implications for Internet Services and Security

In 2016, the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to the United Nations.  Discuss the role or the IANA and how this move might impact internet services and security. 

Categories
Information Assurance

Title: The Transfer of IANA Stewardship to the United Nations: Implications for Internet Services and Security

In 2016, the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to the United Nations.  Discuss the role or the IANA and how this move might impact internet services and security. 

Categories
Information Assurance

Title: Understanding ARP, IP Addresses, and NAT in Network Security

Explain the role of ARP and how it works. How might this be a security issue?
What is the difference between a global IP address and a private IP address?
Describe how a gateway converts a private IP address into a global IP address using NAT.  How this important to us in today’s information technology environment?

Categories
Information Assurance

Title: Understanding ARP, IP Addresses, and NAT in Network Security

Explain the role of ARP and how it works. How might this be a security issue?
What is the difference between a global IP address and a private IP address?
Describe how a gateway converts a private IP address into a global IP address using NAT.  How this important to us in today’s information technology environment?

Categories
Information Assurance

Title: “Evolution of Encryption: A History of RC4 and its Impact on Network Security”

Briefly summarize the history of RC4 and what it tells us about the development of secure encryption algorithms.
For each of the six types of attacks, give an example of how the attack occurs on a network.  
Summarize and compare the three techniques for transmitting information on communications networks.

Categories
Information Assurance

“The Impact of Evolving Technology on Our Lives and Security Concerns”

Information technology has evolved significantly from the early days of just a few hardwired system.  This has impacted the way live, work and do business.  Research an evolving technology and discuss how it might impact our lives and associated security concerns.