Answer the following questions in a 1/2-page Microsoft ® Word document titled CY
ID: 3910899 • Letter: A
Question
Answer the following questions in a 1/2-page Microsoft® Word document titled CYB100_F100:
Explain if it is necessary to log in to PhoenixConnect. Why or why not? What form of authentication does this represent?
Explain what PhoenixConnect is, its intended purpose, and its restrictions.
Explain how your profile was created. Include in this explanation the importance of reviewing and editing the profile content. Explain how this relates to the integrity of information.
Explain how PhoenixConnect content can be used for a secure and private cloud. Address access control and permissions, as well as cybersecurity provisions in the context of a private cloud application. From your experience with this asset, is this cloud hardened? Why or why not?
Explanation / Answer
Question 1
Yes it is necessary for the user to log into the PhoenixConnect.If the user has a valid accoung and also it is logged in then no need to login.But if the didnot signed in then he has to log into the PhoenixConnect.
The PhoenixConnect provide a single password authentication.
Question 2
PhoenixConnect is a type of social networking site which allows the the students of the Phoenix University to connect with each other and can share information with them.
The restriction which the PhoenixConnect has is that only students studying in the Phoenix University can only use it.
Question 3
The profile is created by talking some basic information.Information like the basic details ,courses which the student registerd has to be entered.Followed by the respective student have to make their username and password.After giving all the information it should bre reviewed.This is to check whether the information which is entered is correct or not.As all other students should be seeing the information so a correct information should be given.Suppose for example the course student registered is entered wrong.If any othere students they will be thinking of a particular stream and exchaange information which inturn is of no use.So that's why proper information is needed.
Question 4
PhoeneixCOnnect content can be used for a secure and private cloud.If a centralised server is used where all the information is store then it can be used to maintain the data.All it can be used as a backup plan in case of any disaster.
The administrator will be given the all priviledges to access the cloud.He will have the priviledge to modify the data their.The users which are there will be given only to update their data to the cloud.
This cloud storage can be hardened bu having firewalls,and a good monitoring about the heatlh of the cloud storage.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.