Reference no: EM132012343
Question: The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.
At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.
The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.
The security of information asset is critical to any operational environment. The existence of (or the lack of) good security measures will determine the stability of the operating environment and the availability of resources. As a result of this fact, security should not be an afterthought in the network architectural design process. In any network environment, the most successful access control solution is one that was considered in the design process. Access control can be broken down into area, physical access control, and logical access control.
In 4-6 paragraphs, address the following:
• Describe physical access control.
• Discuss any form of physical access control, and reference a time when you have used this form of physical access control to provide security to an information asset.
• Describe logical access control.
• Discuss any form of logical access control you have used, and discuss a situation in which you have leveraged this form of logical access control to provide security protection for an information asset.
• Be specific in your response.
In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.
For assistance with your assignment, please use your text, Web resources, and all course materials.