Suppose you started working as a network manager at a medium-sized firm with an Internet presence, and discovered that the previous network manager had done a terrible job of network security. Which four security controls would be your first priority? …

Which four security controls would be your first priority? Why? Read more »

There are many different organizations working on their vision of a high-speed Internet. Is this a good or bad? Would we be better off just having one organization working on this and coordination the work? Please discuss with your classmates. …

There are many different organizations working on their vision of a high-speed Internet. Is this a good or bad? Read more »

What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. What would the “killer app” for PKI sales look like? Though a temporary drop has been observed in the acceptance of PKI solutions, …

What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. Read more »

A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Many vendors have created enhancements to IDS systems to make them into IPSs. Look into current developments in this area.  What did you find of interest?  …

A recent topic of interest in the industry is the Intrusion Prevention System (IPS). Read more »

Which architecture for deploying a firewall is most commonly used in businesses today? Why? In depends on some variables. For example what is the objective of the established network, the actual capacity of the firm that would be developing and …

Which architecture for deploying a firewall is most commonly used in businesses today? Why? Read more »

Why is it so important for companies to have policies when it comes to information security? How can a company develop some policies if they do not have any? Where can they go to gather information? It is extremely important …

Why is it so important for companies to have policies when it comes to information security? Read more »

Privacy is a hot-button topic for most people. Discuss how the definition of privacy that is commonly used (freedom from observation) may differ from the definition of privacy from the information security perspective (freedom from unsanctioned intrusion). Privacy as used …

Privacy is a hot-button topic for most people. Discuss how the definition of privacy that is commonly used Read more »

Compile a list of ethical dilemmas you might face when you are on the job.  Why did you select these dilemmas?  How would you overcome them?  When I am at work, there are many situations where I have to make …

Compile a list of ethical dilemmas you might face when you are on the job. Why did you select these dilemmas? Read more »