Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Hi, I need help with essay on Week 4 discussion. Paper must be at least 500 words. Please, no plagiarized work!One important issue of consideration is the structure and approach of the competition. Th

Hi, I need help with essay on Week 4 discussion. Paper must be at least 500 words. Please, no plagiarized work!

One important issue of consideration is the structure and approach of the competition. There is need for adoption of a uniform structure throughout the exercise as this presents participants with a level playing ground. Any exercise must have certain objectives to be met and as such defining objectives is important in designing cyber competitions. The kinds of equipment to be used in terms of hardware and software as well as approach to be taken are important issues in cyber exercises. These are heavily dependent on the objectives set for the competition. it is very important to decide the overall topology over which the competition is run keeping in mind the available/chosen equipment for the exercise.

The next consideration after deciding on the topology is to formulate the exercise scenario, come up with rules to govern the competition and also define the metrics for evaluating the competition’s efficiency basing on the set objectives. There should also be a methodology with which to gather lessons learned from the simulation by both the participants and organizers. a very important consideration is defining the entities to make up the competition. generally, competitions on cyber security have two sides i.e. the attacking site & the defense side. Every side has systems which are managed by participating teams and each side should have at least a system to facilitate participation in the competition.

In order to protect any web application from vulnerabilities and threats of attack, a comprehensive understanding of every communication by the application is required. This is because the security solution/device must be able to see data in the same way as the application to be protected in so as to map out areas of threat. in other words, security devices must be in the position of performing complete deconstruction of HTML data play sessions and monitor all applications sessions in order to secure

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question