Select two it infrastucture domains and discuss about them

Assignment Help Management Information Sys
Reference no: EM131990489

For the discussion this week you will we discussing vulnerabilities. For your main post you will select two IT Infrastucture domains which are below.

1) User domain

2) Workstation

3) LAN

4) LAN to WAN

5) WAN

6) Remote Access

For each of the domains selected research and report on 2-3 vulnerabilities per domain and what would be a control for each of the vulnerabilities identified. Show your research.

A minimum of two response posts are required.

Using the IT Infrastructure domains and research you did in the discussion prepare a short paper on the vulnerabilities you presented.

That is, If those vulnerabilities should be exploited do they affect Confidentiality, Integrity, and Availability of a system. Explain and support your rational. Paper should be 2-3 pages in length and references also.

Reference no: EM131990489

Questions Cloud

Determine the five-year equivalent annual annuity : Determine the five-year equivalent annual annuity of the following project if the appropriate discount rate is 16%
Define and explain the term diversity : Define and explain the term "diversity." Diversity in Teams Organizations use different types of teams. Diversity in teams can mean everything from skill sets.
Research specific data mining or classification technique : Research any specific data mining or classification technique and propose a suitable technique or model to determine any association.
Example of operating cash flow : The dominant currency used by subsidiary in day-to-day operations is known as its currency. Which of following is not example of operating cash flow?
Select two it infrastucture domains and discuss about them : Using the IT Infrastructure domains and research you did in the discussion prepare a short paper on the vulnerabilities you presented.
List four examples of black agency with name of the person : List four examples of black agency with name of the person and specific action. Black agency when African Americans act for themselves instead of being acted.
What does your choice say about your risk tolerance : Which investment would you choose? Why? What does your choice say about your risk tolerance?
Definition of social entrepreneurship : You will produce an information-rich PowerPoint Presentation on the state of Social Entrepreneurship in a country in either Asia, Latin America or Africa.
Describe the events and your experience : Reflective Journal Assignment - Write a reflection report discussing and analysing any two topics explored in this course

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine manner in which you would implement ip multicast

Determine the manner in which you would implement IP multicast in a campus network. In your response, provide two to three (2-3) reasons why you would choose to implement IP multicast as well as specific examples of Internet, Intranet, and multime..

  Advantages and disadvantages of cloud computing

Examine the major advantages and disadvantages of cloud computing for the two (2) selected organizations

  Discuss the kinds of data needed for such a system

Discuss the kinds of data needed for such a system (attributes), and the data types of these attributes.

  Analysis of the trends of technology for dect cordless

analysis of the trends of technology for dect cordless phoneswrite a short paper and include 2 scholarly references apa

  Determine the user interface which is the most efficient

From the second e-Activity, examine the ease of use and the pros and cons of three (3) types of user interfaces available to the user today. Determine the user interface which is the most efficient and user friendly. Provide a rationale for your r..

  Key action that senior health care leadership could take

Suggest a key action that senior health care leadership could take in the community in which you live to push the boundaries of information technology management. Next, speculate on the effect to the community as a result of the improvement to the..

  Objectives and goals about australian hardware

you have to do an introduction, objectives and goals about Australian Hardware according to the template - Analyze qualitative and quantitative data according to the template

  Describe the ediscovery tools used to determine the breach

Describe the eDiscovery tools used to determine and locate the breach; and analyze the actions the team took in response to the breach.

  Write essay on a special issue of a management journal

You have been asked to contribute an essay to special issue of a management journal. How corporate network management fits within commercial business operation

  Define the technology or business phenomenon

define the technology or business phenomenon, introduce the history and the present status, Introduce relevant key players

  What could be done to mitigate the risks and their impact

You will write a report on the project IT risks based on the scenario. What could be done to mitigate the risks and their impact on the system?

  Suggest reasonable values for the items in the risk register

Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd