Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

PLEASE READ THE INSTRUCTIONS. This is Doctoral work!! Provide one response to EACH student’s POST. Each response should be 150 words. PLEASE KEEP IN ORDER; the responses must be relevant to the...

1 answer below »


Using the materials in GitLab, Firebase and the
vulnerability report. Please add security features where necessary and write in
a report of what changes were made.



Please use my login for writing the report (It is the same
as the Firebase login).



For the report add to the following link:



https://docs.google.com/document/d/1D2hGLLK2yR6DlvUSJ6OqeEUdG3hU7FOdb6ySKIcGWQc/edit?pli=1&tab=t.0#heading=h.8h0npxsghoww





To connect to the Firebase and GitLab you will need to
connect to the VPN first. Please be very thorough, it needs like I need to have
worked on this for weeks.





Use the following link to access Gitlab. You will have to
first be connected to the VPN



https://gitlab.cs.wwu.edu/users/sign_in



GitLab Login (Alumni Money)



XXXXXXXXXX



&pHjT&D8T*VdBi





Use the following link to connect to the firebase



https://accounts.google.com/InteractiveLogin/signinchooser?continue=https%3A%2F%2Ffirebase.google.com%2F_d%2Freturn%3Fcontinue%3Dhttps%253A%252F%252Ffirebase.google.com%252F&ifkv=AaSxoQyKgRPXvyvulAjae94-DKUd9-NjI8SYYLjXbQdU8rI4JnzumFHTlORJlT9htpNicpny__hE7w&ddm=0&flowName=GlifWebSignIn&flowEntry=ServiceLogin



Firebase Login



XXXXXXXXXX



C!nn@m0n!1998





Use the following link to download the vpn client



https://support.cs.wwu.edu/home/access/csci_vpn/index.html



OpenVPN Connect Login



XXXXXXXXXX



&pHjT&D8T*VdBi

Answered Same Day Nov 22, 2024

Solution

Shubham answered on Nov 22 2024
3 Votes
Response Post for Christine
The explanation of the Change Healthcare and AT&T
eaches highlights about the critical causes like phishing, outdated software and inadequate data retention policies. The focus on human e
or and the need for governance frameworks like NIST Cybersecurity Framework that is well-founded. This will help in addressing vulnerabilities and improving employee training. The provided suggestion aligns with cybersecurity practices with robust frameworks that describes the importance of proactive and systematic risk management. The potential factor contributing to the
each that is insufficient monitoring and detection of anomalous activities. Advanced threat actors often exploit gaps in real-time monitoring to infiltrate systems unnoticed for extended periods and this was evident for both
eaches (Korotka, 2024). Implementation of intrusion detection and prevention systems and conducting continuous network monitoring could help in detecting suspicious activities. This could minimize the scale of the attacks. This requires combining the approach with robust employee training and timely system updates....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here