Student Name: Lecturer Course A Plan of Setting up a Secure Home Network Computer networking classes generally teaches about OSI networking models and in the teachings it is acknowledged that everything in networking starts at the physical level. The same concept of physical security is carried into IT security fraternity as the overall strategy of securing devices. Setting up a home security incorporates connecting your devices such as smartphones tablet laptops desktop etc to the network. Mostly this is facilitated by setting up a Wireless Local Area Network or connecting to the outer network when the device is stolen find a way of letting the authorities know. References Ciampa Mark D. Comptia Security+ Guide To Network Security Fundamentals. Print. Nolan Daniel. "A CONSISTENT READING OF SYLVAN's BOX." The Philosophical Quarterly 57.229 (2007): 667-673. Web. Greenberger Martin et al. “Computer and Information Networks.” Science vol. 182 no. 4107 1973 pp. 29–35. JSTOR JSTOR jstor.org Van Horn Royal. “Prudent Computing.” The Phi Delta Kappan vol. 85 no. 3 2003 pp. 183–250. JSTOR JSTOR jstor.org Vincent Michael. “COMPUTER-MANAGED PERPETUAL TRUSTS.” Jurimetrics vol. 51 no. 4 2011 pp. 399–446. JSTOR JSTOR www.jstor.org/stable/41307136. [...]
Write a short paper ( double-spaced) addressing the 2 security scenarios described below. Please list your references. OBJECTIVE: Using information from Chapters 9, 10, and 11, please answer the following in detail: 1) Discuss how you would envision the devices you own working together and how that might be done in a secure manner. Also, in terms of mobile device security, give examples of loss or theft, lessons learned, and precautions you now take (2 pages minimum). 2) Examine a common business function and then explain whether there is appropriate separation of duties in the business function and whether introducing such a control would actually enhance security of the business function (1 page minimum).