One page for each. Link to source(s) at bottom of pages
Case Project 10-2: Secrets Management Systems
Cloud computing providers typically offer their own proprietary secrets management systems, and there are several third-party systems available. Identify two proprietary secrets management systems from cloud providers and two third-party systems. Research each and then create a document outlining how they are used, their strengths, and their weaknesses.
Case Project 10-5: IPv6
Use the Internet to research the security enhancements of IPv6. Write a one-page paper on how IPv6 is more secure than IPv4.
- Discuss if you agree, disagree, or partially agree with the claims made by the researcher(s), suggest improvement of the research method, provide future direction for the research, etc.
- Explain the importance of adding a fitness center (Gym) to a work office building (Call Center).
- Explain what you would suggest to make the requirement stronger, while maintaining a requirement that most users could meet.
- Identify how it is used, its strengths and weaknesses, and how widely implemented it is.
- Write a one-page paper on how IPv6 is more secure than IPv4.
- What was the relationship between TLS and SSL?
- What are the benefits of implementing lean and agile management methods to CPM?
- Explain how you might overcome the barriers you identified.
- Explain why crime is at an all-time high in the City of Crimetown, USA.
- Explain how adversarial AI attacks can be defended against?