Assignment Content
- Resources:
- The “Sample PowerPoint” posted in the Tutorials & Guides section of the Center for Writing Excellence website
- Create a Microsoft® PowerPoint® presentation containing 10 to 12 slides, including Introduction, Conclusion, and Reference slides. Includedetailedspeaker notes with each slide.
Scenario: You are onsite at Large Data, Inc., and ready to perform a security assessment. The client is very sensitive to how the media will react to a data breach. The client’s customers have already been calling requesting information on how their personal and private data is protected. Due to this, the client wants to avoid any future data breaches from all sources. As part of your job, you will be collecting sensitive information about the client. The client asks you to prepare a PowerPoint® presentation describing your security tools and protocols and how you are going to protect their information during and after the security assessment. Your task is to:
- Review the Linux system security and encryption features and built-in capabilities from the discussion this week.
- Thoroughly define the tools and commands required to implement a data encryption solution on Linux
- Compare three different methods to encrypt and protect data on Linux systems
- Identify the encryption technology available natively in Kali Linux.
- Logically explain the tools used for hardening the Linux system, and compare two different tools, listing at least one advantage and one disadvantage for each
- Briefly explain how to setup filesystem partitions to segment data
- Accurately define a Python script, and provide one sample of a working Python script used in penetration testing
- Thoroughly explain how to use Python to perform live system ping sweeps and capture network packets
- All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.
Sample Solution
In today’s digital age, protecting sensitive information is crucial for businesses. It is even more important for those who collect customer data, like Large Data, Inc., to ensure that their data is protected from breaches. This PowerPoint presentation will describe the security tools and protocols used during a security assessment to protect Large Data, Inc.’s information, and the Linux system security and encryption features and built-in capabilities. It will also cover data encryption solutions, three different methods to encrypt and protect data on Linux systems, encryption technology available natively in Kali Linux, tools used for hardening the Linux system, setting up filesystem partitions to segment data, Python scripts used in penetration testing, and how to use Python to perform live system ping sweeps and capture network packets.
Linux System Security and Encryption Features
Linux is an open-source operating system that is known for its security and stability. It is designed with built-in security features and encryption capabilities to protect sensitive information from unauthorized access. Some of the security features of Linux include:
- Access Control Lists (ACLs) – Enables…order customized answer
- Confidentiality & Authenticity Guaranteed
- Plagiarism Free Content Guarantee
- APPROVEDSCHOLARS Guarantee Timely Delivery of All Papers
- Quality & Reliability
- Papers Written from Scratch and to Your Instructions
- Qualified Writers Only
- APPROVEDSCHOLARS Allow Direct Contact With Your Writer
- Using APPROVEDSCHOLARS.COM Means Keeping Your Personal Information Secure
- 24/7 Customer Support