Summarize the articles main points and connect them

Assignment Help Computer Engineering
Reference no: EM133649820

Discussion Post

Purpose

This discussion is intended to help you learn to solidify, reflect on, and find applications for the topics.

Overview

The discussion topic was personal security. It was pretty easy to understand and apply; in fact, most of us are already doing what should be done or at least aware of the best practices for individuals. In this module, we are changing our focus to organizational security. Watch the following video about Zero Trust Architecture, and also skim the guidance by NIST.

1. SANS Webcast - Zero Trust ArchitectureLinks to an external site.
2. NIST Special Publication 800-207 Zero Trust ArchitectureLinks to an external site.

Provide your opinions on Zero Trust Architecture. Can it be something that may achieve a hundred percent security?

Action Items

Read/watch the resources as indicated above. Post a 3 to 4 paragraph (375 to 500 words) discussion and reflection on the topics.

1) Consider this to be a mini "reflection paper" per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read. Note any "ah-ha!" moments.

2) Find a current news article or journal article that highlights the topics. Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.

3) Connect the topics from the above resources back into prior coursework you have taken at Franklin or other institutions. Talk about where you first encountered the topics or concepts and whether or not this exposure to them enhanced or solidified your understanding.

Reference no: EM133649820

Questions Cloud

Economic crises and foreign policy : In the 1970s American politics faced challenges due to scandals, economic crises, and foreign policy.
Analyze the importance of technological innovation : Analyze the importance of technological innovation and the sources in which innovation arises. Evaluate the types of commonly used innovations in the industry.
How can organization or community space make space : How can organization or community space make a space that centers QBIPOC communities? How can these community organizers frame their work around abolition work
Do transnational corporations violate human rights : Do Transnational Corporations Violate Human Rights?
Summarize the articles main points and connect them : Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.
What is ranked choice voting : What is ranked choice voting (RCV)? Identify how the steps of RCV differ from the most common voting rules today.
Propaganda by anti-slavery movement : How might a narrative of slavery, similar to that of Frederick Douglass, have been used as propaganda by the Anti-Slavery movement?
Explain how economics emerged as a separate discipline : Explain how economics emerged as a separate discipline. Define the role Alfred Marshall played in establishing the field of modern economic.
Describe how the dd command is used in the lab : Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the representation of the exponent

What is the representation of the Sign? What is the representation of the Exponent? What is the representation of the Significant?

  Dma has been around for a long time and when it was

write a 200- to 300-word short-answer response to the followingdma has been around for a long time and when it was

  Display the sum and average of the numbers

Write a Java program that inserts 25 random integers ranging from 0 to 100 into an ArrayList in ascending order.

  Print the maturity amount after specified tenure

Print the maturity amount after specified tenure in the format - Provide an estimation of amount of time required to complete the project - identify two groups of people such that a person in one group must not be a friend to any other in the same g..

  What is the old and new status of the work array

CMIS 412- Proceed by describe algorithm, step by step; for each step, mention test performed, which process was chosen, what is old and new status of Work array

  What solution would you propose for the company

What solution would you propose for this company? Discuss the role that data modeling would play in a project to solve this problem.

  What is the danger of using the best predictive model

What is the danger of using the best predictive model that you found? Explain why the best-fitting model and the best predictive models are same or different.

  What is a good strategy for penetration testing using

What is a good strategy for penetration testing using Metasploit to improve data center security? Please add your sources.

  Write a program that displays an animation

Write a program that displays an animation of a horizontal line segment moving across the screen, eventually passing across a vertical line.

  Discuss about the different hardware topologies

Organizations must protect data in a variety of ways. In Chapter 11, you read about different methodologies on securing data in the enterprise.

  How does asymmetric encryption work?

How does Asymmetric Encryption work? (What Is Asymmetric Encryption & How Does It Work?, 2020)

  What would the destination address of the arp query be

Suppose a node is on the same LAN as 97.39.39.166 needs 97.39.39.166's MAC address. What would the destination address of the ARP query be (link layer)?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd