discussions

Week 1 discussion
DQ1 Vulnerabilities of Your Systems?
We’re spending some time this week coming up with a common
understanding of security terminology, and vulnerability is one of those
fundamental terms. While the word weakness seems to define it pretty well,
there are a number of ways that information systems can become vulnerable. Acts
of commission or omission can be equally responsible for a system
vulnerability. What about your systems, both at home and at work? In what ways
are they vulnerable?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

DQ2 Threats against Your Systems?
It’s a pretty rough world out there for data. While a large
percentage of information technology security budgets is devoted to reducing
the risk of malicious attacks, there are other ways in which systems or data
become damaged. What threats are you aware of when it comes to your personal
systems and the systems at your job?

Week 2 discussion
DQ1 Security Issues in Telecommunications
What are the advantages and disadvantages of virtual
offices, including telecommuting? What are the security and management issues
concerning virtual offices, especially hooked up into large virtual networks?
Please comment on the views of your fellow students here.

DQ2 What Access Controls Are in Use?
What are your organization’s assets? Are there any access
controls in place? How effective are they? How can you tell? What are the
weaknesses in the controls? Are any new or upgraded access controls being
considered? Let’s explore this substantial component of information security.

Week 3 discussion
DQ1 Cryptographic Products
As we are learning, there are a lot of uses for cryptography
in information technology, and there are a lot of different algorithms,
cryptographic processes, key lengths, implementation methods, and so on. Let’s
explore the world of cryptographic products. What’s available out there? What
kind of quality is found in free, open-source products? What types of hardware
devices? What types of software implementations? How are they used? What
problems do they solve? How effective are they? How can you tell? What are the
tradeoffs between security and business process efficiency?
Let’s start with everyone presenting one cryptographic
product (past, present, or future). No duplications, please, so be sure to read
all the previous posts. Then, respond to the posts of your classmates with
questions, additional information, and so forth.
DQ2 Cryptographic Standards
Ever since World War II and the ensuing Cold War,
cryptographic methods have been the source of much government angst. Protecting
the information of one’s own government and accessing the data of other
governments has been a preoccupation of many nations. With the growth of
civilian computer networks in the 1980s and the development of Internet-based
e-commerce in the 1990s, concerns about data security spread from governments
to the public sector. The tension between the government’s goal of control of
cryptographic methods and business’ need for internationally trustworthy
security resulted in skirmishes between the two.
Let’s discuss the modern history of cryptography in terms of
commercial-governmental tensions. What can you find out about this? What are
the considerations when determining how to standardize cryptographic methods?
How are cryptographic methods regulated? What are the different laws that
govern the use of cryptography? Are they reasonable? Whose interests are most
important when determining the extent to which cryptography should be
standardized, regulated, and mandated?
Do a little research and see what you can come up with in
one or more of these areas. And be sure to comment on the posts of your
classmates.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Week 4 discussion
DQ1 Network Services
Users are familiar with some network services such as HTTP
(Hypertext Transport Protocol) – the Web; and SMTP (Simple Mail Transport
Protocol) and POP (Post Office Protocol) – e-mail and instant messaging. But
there are others like DHCP (Dynamic Host Configuration Protocol), DNS (Domain
Name System), FTP (File Transport Protocol), NNTP (Network News Transport
Protocol), Telnet, SSH (Secure Shell), SSL-TLS (Secure Sockets Layer-Transport
Layer Security) and others that the average user may not have heard of.
Tell us more about these services. How do they figure into
organizational security? What are the most recent threats against them? What
are the risks associated with attacks against network services? What are
possible consequences? What are specific controls and general best practices to
mitigate risk?
Jump right in. Do a little research on some part of network
service security and share with us your findings as well as your experiences
and opinions. And, of course, please respond to your classmates’ posts with
ideas, questions, comments, other perspectives, and so forth.

DQ2 Security Architecture
Before responding to this forum, be sure to read the section
in this week’s lecture on security architecture.
Think about your organization’s security architecture. How
much do you know about it? How much do other workers know? How easy is it to
learn more? Does your perception of the organization’s security architecture
seem appropriate for the mission and goals of the organization? How much
management commitment to security do you sense?
Briefly describe your organization, but please DON’T reveal
any specific security details that would compromise your organization’s
security controls. Feel free to make up a name and even alter the products or
services the organization offers to maintain its anonymity as needed. What we
should discuss is the general nature of the business, your role, your view on
the organization’s security architecture, and what you think the ideal security
architecture should be for your organization.
As we get moving on this discussion, consider the ideas of
your classmates. Would they be appropriate for your organization? Even if you
don’t have much connection with the security activities in your company, what
do you THINK would be appropriate?
As always, post early, post often, and address the posts of
your classmates.

Week 5 discussion
DQ1 Case Study – Would You Hire Goli?
How would you respond if Goli (Case VIII, p. 707 in our
text) came to you describing a vulnerability in your system and offering to
help fix it? What would incline you to hire her? What would disincline you from
doing so? Please explain your answer and also reply to the comments of others.

DQ2 Privacy: Right or Privilege?
Privacy seems to mean different things to different people.
What does privacy mean to you? Is privacy a right or a privilege? How should
one’s privacy be legally protected or secured, especially when using the
Internet? Maybe this is not absolutely possible; protection may always be
viewed as a relative term. Why or why not? Please comment on the responses of
other students.

Week 6 discussion
DQ1 BC and DR
Business Continuity (BC) planning and Disaster Recovery (DR)
planning are key elements in organizational security architectures. What is the
difference between them and why is it important to know the difference when
representing security proposals to management?

DQ2 Meeting Regulations
With what federal, state, and/or organizational regulations
regarding information systems and data management must your organization
comply? How can you identify these regulations? How can you remain informed
about changes in these requirements? How can your organization or industry
influence these regulations?

Week 7 discussion
DQ1 Personal/Group Ethics
What is ethics? Is it a cultural standard or an individual
standard? Do managers have a responsibility to maintain an ethical standard
within a department? If so, how is the expected ethical standard established?
How is it documented? How is compliance measured? What happens when an
individual’s ethical standard conflicts with the group standard? How should members
of the group react? How should the individual react?

DQ2 Security Skills
What skills are needed by personnel working in information
security? List some job titles in the field and come up with some required
qualifications and some desirable qualifications. Take a look at some job
listings and resumes for ideas. After all, you may be applying for one of these
jobs soon!

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Essay Fountain
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Health Care
Thank you for getting this paper done in a timely manner
Customer 452641, February 20th, 2021
Education
Thank you so much!!! Will use this service again highly recommend this site!!!
Customer 452739, May 2nd, 2021
Communications
Thank you.
Customer 452723, April 22nd, 2021
History
Thank you
Customer 452919, October 17th, 2024
Nursing
n/a
Customer 452725, April 23rd, 2021
Business Studies
Thank you sincerely great paper and content
Customer 452793, June 22nd, 2021
Business Studies
This is fantastic! Thank you so much for your hard work!
Customer 453131, November 16th, 2022
Sociology
Thank you
Customer 452919, February 16th, 2024
Sociology
Thank you!
Customer 452919, April 5th, 2022
Logistics
The presentation slides were not narrated as asked per the instructions.
Customer 452623, September 28th, 2021
Psychology
Communication on the small delay was appreciated and final result was worth the wait. Thank you.
Customer 452665, March 18th, 2021
Sociology
Thank you!
Customer 452919, April 26th, 2022
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat