Highlights
Question 1:
It can be said that the security requirements for Spyon technologies are very high as it is able to block the hackers or third parties from getting into the system of the company and stealing the necessary information that could hamper the company’s business.
Security parameter
In order to manage the parameters of network security, there is a need for enlarging the policies of security and also the methods for maintaining the firewalls. Firewall plays a vital role in restricting the uncontrolled flow of network traffic with the help of significant system. This will hence identify the suspicious external systems and hence blocks their entry.
Securing the WAN links
In this case, I would like to implement IP sec encryption with the help of AES, 3DES and DES. For securing the connection of WAN, I would like to have the assistance of AES. This will help me in applying encryption module on the basis of IPsec technique. Moreover, I can also take the help of 3DES and DES method of encryption.
Digital encryption of communication
PGP would be the best solution for encrypting communication among the employees in the company. This is a software module focusing on receiving and sending of encryption messaged along with the name that is stored. This system takes the help of cryptographic algorithms.
Fault tolerance
This is used within the system for encompassing the storage platform with respect to the data from SSD to NAS. The issue in the context of this used for providing the protection on the basis of complex ideas often used within the system.
Implementing adequate measure for protecting from cyber security aspects
I recommend using Firewall UTM in this case. This will help the user in extending their measures of security in order to reduce the complexity within the system.
Protection against DOS and DDOS related cyber threat
Using proper network monitoring strategy and implementation of DOS and DDOS attack test checking policy helps to mitigate the negative impact of DOS and DDOS attack on the network traffic. Increasing network bandwidth and configure network hardware against DDOS attack helps to improve the cyber security protection process of the system.
Question 2:
With the help of qualitative risk assessment method, Sypon Technologies is able to identify the risk. It is further important to calculate the effect of threat occurring in the company and along with that, the likelihood of the threats is also measured.
This IT/Computer Science Assignment has been solved by our IT/Computer Science Experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.