Project #53805 - Information system Security Discussion Questions

NO PLAGERISM!!!!

 

#1Answer DQ1 is 200 words minimum.  

DQ 1: What are some of the challenges facing companies when trying to implement wireless security? How does this affect their security frameworks?

 

#2 Respond to classmate answer to DQ1 in 200 words minimum.  

Wireless network has many advantages due to the increase access to information resources. The network configuration is easy and less expensive. However, there are challenges facing company during and after implementation. One of the challenges is the risk of interception, because communication takes place through the air using radio frequencies. If the message or data is not properly encrypted, or if the encryption came with weak algorithm, it can be attacked and the company's confidentiality will be compromised.

 

Accidental association is another threat facing companies. This is unauthorized access to company wireless network, which can come from accidental association. This happens when a user turns on a computer and latches on to a wireless access point from a neighboring company's overlapping network, this may not be noticed.  This affects the security framework by exposing the proprietary information of the company and could cause a link from one company to the other.

 

Ad-hoc network is one of the challenges facing companies in the implementation of security.  According to Kelley, D. (2003) ad-hoc networks are defined as peer-to-peer networks between wireless computers that do not have an access point in between them.

 

Reference

http://www.bcs.org/upload/pdf/ewic_paper2.pdf

 

#3 Respond to Instructor statement to classmates response to DQ1

Israel, thanks for your post and analysis. Your discussion of the issues involved with wireless networks is good - both from a home-based and a commercial perspective.

 

What instances of possible wireless security concerns have you run into recently? How would you imagine the security groups responsible for those wireless networks is dealing with the possible vulnerabilities

 

Open to all!

 

 

 

 

#4 Answer DQ2 in 200 words minimum.  

DQ2: Discuss the principles and challenges associated with continuous data protection. Does your organization have a CDP plan? Why or why not?

 

#5 Respond to Instructor Statement in 200 words. 

Wikipedia has a good jumping-off point to discuss this topic. Here is the link

http://en.wikipedia.org/wiki/Continuous_data_protection

 

"Continuous data protection (CDP), also called continuous backup or real-time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time. The technique was patented by British entrepreneur Pete Malcolm in 1989.

CDP runs as a service that captures changes to data to a separate storage location. There are multiple methods for capturing the continuous changes involving different technologies that serve different needs. CDP-based solutions can provide fine granularities of restorable objects ranging from crash-consistent images to logical objects such as files, mail boxes, messages, and database files and logs."

 

My workplace has a large-scale CDP implementation of sorts that involves data mirroring between several data centers in geographically diverse locations. The costs alone are multi-millions, but so is the revenue that is supported (and protected) by this use of CDP. 

 

What are some ways we can use CDP for our personal 'data bases'? How scalable would those solutions be for small businesses and organizations?

 

Open to all!

 

#6 Respond to classmates response to the statement above.  in 200 words

 

For small businesses the solution seems to be running the software version of CDP. Software version is more common in most cases because of the expense. According to Computer Weekly, "the software is installed and configured on a host server and uses storage resources currently available in the data center." Computer Weekly also states that one limitation is the requirement of manning a person to operate and maintain CDP. This would be an additional long term cost.

 

Subject Computer
Due By (Pacific Time) 01/17/2015 09:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy