Questions! Due by 2am tonight! Please write question and include references!
- As the Information Systems Security Officer for your large health care company, you have been assigned the task of implementing Web security. Determine how you would implement security to eliminate single points of failure.
- Describe the implementation of Secure Sockets Layer (SSL) in support of Hypertext Transfer Protocol Secure (HTTPS). Assess how you are assured that your browser is secure. Determine if the user data truly is protected or this is a false sense of security. Give an example of SSL being compromised.
- Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn’t appropriately cover his / her tracks.
- From the e-Activity, explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.