Public amid private keys

Question 1:

check the link and choose a topic to research.

https://youtu.be/ucRWyGKBVzo

Must be in APA and on an MS Word Document

Choose a topic
Identify a problem ex. Problem: Unsecured video surveillance systems
Provide a solution: ex. Encrypt transmission and hard drive using 256 bit
How would the solution be executed ex. public amid private keys, TLS,
Conclusion: ex. The data would need to be backed up an Array would help with data retention and SFTP data dumps on another server that only accepts transmission from the source IP and block all others.
References.

Question 2:

Discussion:

Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.

Task: How would you track, and remove the worm the network?

Areas to consider: What ports or port types will have unusual activity.

Refereneces.