IT345 Week 8 A

Week 8 Discussion

2929 unread replies.2929 replies.

Welcome to Week 8

With any invention there will be trial and error. When it comes to technology, the errors can be extremely costly, more frequent, and sometimes deadly. Software applications are so in depth, that they are almost always released with bugs. On the opposite end of the spectrum, some technology has made our lives safer and even extended our life span. Put your proverbial “critical thinking” hats on for this week.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 200 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?
  • What technologies have inadvertently taken lives?

Search entries or author

computer architecture jan 24

Read the Moore’s law then summarize briefly the law, mainly address the following two questions :

  • What can we conclude from this law ?
  • How is this law can guide the computer evolution ?

Write your original post 

WK07152021

NOTE: **** post answers in separate documents for each Question

      **** Please follow the instructions to the point and pick relavant topics according to the subject

      **** Follow APA7 format

mod 4

 

Module 04 Content

  1. In this next part of your course project, your manager has asked you to work with the network security team to implement a zone-based firewall with a DMZ, stateful inspection, and ACL packet filtering based upon security level.

    During a PCS compliance audit, it was revealed that the Application Development team was operating on a public IP address range separate from the rest of the company. (Unknown to management, the application development team had convinced the previous network administrator that the public IP range was necessary for testing reasons when in fact it was because they didn’t want the company to monitor their downloading of pirated movies.)

    Your manager asked you to review the design and implementation process and asked for recommendations to be made concerning which security devices should be configured to use stateful inspection versus stateless packet inspection as well as next gen firewall technologies.

    Follow the process outlined in the Module 04 Course Project Template for your project and provide a response to the Body and Executive Summary sections of the template. Note: You should be working off the latest version of your Network Diagram from your previous project submission.

    the original network is attached make sure to use it for the updated network diagram in question number 1.

Disaster and recover planning

 

Review the Opening Case Scenario. What DR activities must be done at this point in order to prevent this disaster from becoming catastrophic, prohibiting the organization from ever conducting business again? Now, look around your home. What DR tasks should you perform to prevent a similar disaster from becoming catastrophic? 

Your submission should be between 800-1000 words with references and following APA writing standards. 

Practical Connection Reflection- Database Systems

 

Provide a reflection of at least 750 words (or 2.5 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

• Provide a 750 word (or 2.5 pages double spaced) minimum reflection.

• Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Must have all required APA components: cover sheet, references as needed, and others.

• Share a personal connection that identifies specific knowledge and theories from this course.

• Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

• You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Assignment

Read chapter 13 of your textbook (lecture slides under week 5), and review online library and reputable articles/journals/online resources and write 1 page paper and discuss:

How do you design a secure network. Discuss latest technologies to keep your network secure.

Please list your reference/sources

Cyber

I want a branding statement in cybersecurity for my LinkedIn profile

Security in the Enterprise

Consider an enterprise security organization. It will be a team of mixed skills and capabilities. Also, consider an adversary, such as a foreign government intending to digitally break into the company, and learn their business practices. Describe the teams involved in defending the company against this particular threat and their roles in the defense.

Parameters 

  • Posts should be 250 to 300 words in length
  • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
  • All sources should be used in the content of the post using APA format