1A)Explain the function of these devices within information technology a)Servers b)Mobile devices c)Workstations d)Printers e)IoT devices f)Peripheral devices 1B) How are these items in 1A interconnected in a trust environment and discuss ways in which these devices could create vulnerabilities in an existing enterprise network. 2) Describe four hardware components of modern computing environments and discuss the individual functions of each component. Explain which would be the easiest to secure and why. 3) Write a 250-500-word report and include a title page, table of contents, overview, required screenshots, and a summary of the following a)what are the principles of access control?Identify vulnerabilities and risks to an organization’s critical infrastructure if access control is not implemented. b)Describe why each principle of access control is important to security and how it enables the development of security mechanisms that can implement desired security policies, as it relates to Active Directory. c)Analyze two common security failures and identify specific design principles that have been violated. d)Describe the basic security implications of modern computing environments. e)Identify the design principles involved or needed in the creation of user accounts while ensuring principles of least privilege. f)Explain how virtualization is different in the Windows and Linux operating systems. 4) Basic computer hardware is often overlooked yet remains a core requirement for any operation in the computing world. At its core, a system should be able to complete assigned tasks with only a 10-20% overage. Research and provide a link for a laptop you would recommend as a standard for your organization. Identify the following components, explain their functionality, and explain the advantages and disadvantages your system offers for the price: RAM, Processor, Graphics,Motherboard, External connectivity capability (USB, CD, HDMI, VGA, etc.), Audio capability, Wifi/Ethernet connection 5) a) Explain what patching is and the different types of patching. b) Explain when manual patching is primarily used and discuss two risks associated with this practice. c) Assume you are the director of an organization and construct a short letter of intent to your directors describing when you would permit manual patching. Discuss whether you agree or disagree with peers on their manual patching policy communication and justify your stance with specific reasons, facts, and examples. 6)Provide an example of an occurrence where a patch could not be installed on all enterprise systems. Describe the compensating controls you would recommend to protect your systems given that the patch would not be used on your production network. Research zero-day patching and explain when this would be utilized in a production network. 7) Explain why it is important to install patches and updates as an operating system administrator. Explain the significance of configuring appropriate authentication policies as part of managing system services and user accounts. Explain the interaction between security and system usability and the importance of minimizing the effects of security mechanisms. 8) Kubernetes is programmed to be used within the Windows Server environment in your company. write a chronological guide manual on how you will configure this structure. Explain your approach to enable Kubernetes and maintain server hardening. Explain if this hardening approaches will be effective against cyberattacks. Justify your ideas with specific examples. 9) Explain why the average search time to find a record in a file is less for an indexed sequential file than for a sequential file. 10) Describe the typical access rights that may be granted or denied to a user for a particular file. 11) Explain why performing backups and having the ability to restore files is an essential function for cybersecurity professionals. 12) Data loss prevention has become ever more prevalent in the technology world with the rise of ransomware attacks. However, simply providing storage space to an existing system is not enough to protect systems from the various threat actors and internal complexities an enterprise network faces. Create a presentation with no more than 8-10 slides that address the following: Describe the similarities and differences between the file system structure of a Windows operating system and a Linux operating system. Explain why you would prefer one system over the other from the business perspective. Compare at least two storage solutions in an enterprise network. From a Christian perspective, identify the ethical considerations of utilizing storage devices in an enterprise network when cost considerations are prevalent. Explain the role ethics would play in your decision-making process. 13) Your organization has decided to place smart devices throughout its newly renovated corporate offices. You have been tasked to ensure network security of the building. Explain which principles of cybersecurity you would use to ensure the security of your network given the minimal security inherent with IoT devices and justify your selections. 14) one of your security technicians discovered a massive spike in the amount of data leaving your corporate network. After careful examination, it was discovered that three systems were sending data to an unrecognized IP address in China. Describe which security principles you would use to immediately correct the issue. Explain your reasoning in detail. 15) Cybersecurity principles of IT focus on a set of practices intended to keep a corporate infrastructure secure. These practices include, but are not limited to, system, data, internal, external, and physical security. The principles are designed to prevent unauthorized access or alterations of a corporate environment. By understanding how cybersecurity principles are defined, they can be used to develop a comprehensive, corporate-specific, security policy. Using the format of your choice, create a chart related to the cybersecurity principles listed below: Separation (of domains/duties) Isolation Encapsulation Modularity Simplicity of design (economy of mechanism) Minimization of implementation (least common mechanism) Open design Complete mediation Least privilege Fail-safe defaults/Fail secure Least astonishment (psychological acceptability) Minimize trust surface (reluctance to trust) Usability Trust relationships For each of the principles listed, include the following: Definition (1-2 sentences written in your own words) Explanation of why each principle is important to security and how it enables the development of security mechanisms to implement desired security policies 16) Choose one of the following principles of cybersecurity: Encapsulation Modularity Simplicity of design (economy of mechanism) Minimization of implementation (least common mechanism) Open design Complete mediation Least privilege Fail-safe defaults/Fail secure Least astonishment (psychological acceptability) Minimize trust surface (reluctance to trust) Usability Trust relationships Imagine you are the department head for a local business and your director has asked you to explain in simplistic terms the core concepts of the selected principle. Provide a clear and precise definition and example of the concept and how it is used in your systems for the organization where you work. 17) Cloud services are becoming a major concern in cybersecurity. Discuss how redefined policies will create terms of service with all cloud service providers to ensure that company information and activities are protected with the same degree of security a company would intend to provide on its own.