CYB225 University of Phoenix Protecting Information on a Linux System

Create a Microsoft® PowerPoint® presentation containing 10 to 12 slides, including Introduction, Conclusion, and Reference slides. Includedetailedspeaker notes with each slide.

Scenario: You are onsite at Large Data, Inc., and ready to perform a security assessment. The client is very sensitive to how the media will react to a data breach. The client’s customers have already been calling requesting information on how their personal and private data is protected. Due to this, the client wants to avoid any future data breaches from all sources. As part of your job, you will be collecting sensitive information about the client. The client asks you to prepare a PowerPoint® presentation describing your security tools and protocols and how you are going to protect their information during and after the security assessment. Your task is to:

  • Review the Linux system security and encryption features and built-in capabilities from the discussion this week.
    • •Completely defines the tools and commands for data encryption in Linux with exceptional clarity. • Compares more than three methods of encryption. • Identifies industry standard encryption technology available in Kali Linux.
  • Thoroughly define the tools and commands required to implement a data encryption solution on Linux
  • Compare three different methods to encrypt and protect data on Linux systems
  • Identify the encryption technology available natively in Kali Linux.
  • Logically explain the tools used for hardening the Linux system, and compare two different tools, listing at least one advantage and one disadvantage for each
    • •Logically explains hardening tools with exceptional clarity • Compares more than two different hardening tools. • Lists more than one advantage and more than one disadvantage for each hardening tool. • Identifies how to set up filesystem partitions in Kali Linux with exceptional clarity.
  • Briefly explain how to setup filesystem partitions to segment data
  • Accurately define a Python script, and provide one sample of a working Python script used in penetration testing
    • • Describes the use of Python scripts and is clearly in command of the Python language and its use in penetration testing. • Explains how to use Python to perform live system ping sweeps and capture network packets with exceptional clarity.
  • Thoroughly explain how to use Python to perform live system ping sweeps and capture network packets

All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. • Exceptionally concise presentation of findings. • Presentation is free of mechanical errors. • Correct sentence structure and audience-appropriate language are used. • Writer is clearly in command of standard, written, academic English.

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now