Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

  Home Study tools  My courses  My books Career Life 

home / study / engineering / computer science / computer science questions and answers...
Find solutions for your homework

Question: He Faculty Remarks Part (Quality of Service) (LO3- 5 marks) There are four key parameters that de...

Show transcribed image text

Expert Answer

Anonymous
answered this

Security requirement for Smart Tech are


:  

Authentication and password management.

Authorization and role management.

Audit logging and analysis.

Network and data security.

Code integrity and validation testing.

Cryptography and key management

Data validation and sanitization.

  Potential Security Threats


:  The threats include fire, unstable
power supply, humidity in the rooms
housing  the
hardware, etc. External: These threats include Lightning,
floods, earthquakes, etc. Human:
These threats include theft,
vandalism of the infrastructure and/or hardware, disruption,
accidental or
intentional errors .

Network Security Software for Smart Tech


:

FireEye robust software for advanced threat


detection and response. This software is best suitable for
Smart
Tech .  

Brief Description about FireEye :


  FireEye is a privately held cybersecurity
software .It has been involved in
the detection and prevention of
major cyber attacks. It provides hardware, software, and services
to
investigate cybersecurity attacks, protect against malicious
software, and analyze IT security risks .

How FireEye useful to detect threats : FireEye


as a Service is a managed detection, investigation and
response service that minimizes the potential business
impact of increasingly sophisticated and targeted
cyber attacks
.

Security Feature :  FireEye Endpoint


Security protects your organization with intelligence led
protection,
detection and response.

Time taken to Detect Threat : The latest


report from FireEye cites dwell time as 146 days on average
globally, and a whopping 469 days for the EMEA region. It
totally depends on your company server load

Suitability Of Software For Smart Tech :

Minimizes risk of costly cyber breaches .

Modular and scalable security architecture .

Visibility into encrypted traffic .

Multi-vector correlation with Email and Content Security .

Conclusion : Cyber security threats is one of


the most important aspects of the fast-paced growing digital
world.
The threats of it are hard to deny, so it is
crucial to learn how to defend from them and teach others
how to do
it too.

Please like my answer ;;

Thankyou ::

0 Comment

Was this answer helpful? 0

Questions viewed by other students

only I need solutions for 5 to 7.


See answer 100% (1 rating)

This table is used by Mighty Paws


Veterinary Clinic. Inspect this table and answer questions below
and answer the following 4 questions:
PetId
PetName
OwnerName
OwnerPhone
PetType
Legs
CanFly
Favorite food
100
Fluffy
Mary Smith
614-897-5496
Cat
4
No
MeowMix,
FancyCatTM
101
Casper
Mary Smith
614-897-5496
Cat
4
No
MeowMix
10...
See answer 100% (4 ratings)

Show more 

COMPANY LEGAL & POLICIES CHEGG PRODUCTS AND SERVICES CHEGG NETWORK CUSTOMER SERVICE
About Chegg Advertising Choices Cheap Textbooks Mobile Apps EasyBib Customer Service
Chegg For Good Cookie Notice Chegg Coupon Sell Textbooks Internships.com Give Us Feedback
College Marketing General Policies Chegg Play Solutions Manual Thinkful Help with eTextbooks
Corporate Development Intellectual Property Rights Chegg Study Help Study 101 Help to use EasyBib Plus
Investor Relations Terms of Use College Textbooks Textbook Rental Manage Chegg Study
Jobs Global Privacy Policy eTextbooks Used Textbooks Subscription
Join Our Affiliate Program DO NOT SELL MY INFO Flashcards Digital Access Codes Return Your Books
Media Center Honor Code Learn Chegg Money Textbook Return Policy
Site Map Honor Shield Chegg Math Solver

© 2003-2021 Chegg Inc. All rights reserved.

You might also like