Saturday, 3 March 2018

CIS 560 WEEK 8 DISCUSSION

CIS 560 WEEK 8 DISCUSSION




Access Control and VPN " Please respond to the 2 of the following IN YOUR OWN WORDS:

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why? 
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?
Access Control and VPN " Please respond to the 2 of the following IN YOUR OWN WORDS:


























  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why? 
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

CIS 560 WEEK 8 DISCUSSION

Access Control and VPN " Please respond to the 2 of the following IN YOUR OWN WORDS:

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why? 
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?
Access Control and VPN " Please respond to the 2 of the following IN YOUR OWN WORDS:

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why? 
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...