Summarize the articles main points and connect them

Assignment Help Computer Engineering
Reference no: EM133649820

Discussion Post

Purpose

This discussion is intended to help you learn to solidify, reflect on, and find applications for the topics.

Overview

The discussion topic was personal security. It was pretty easy to understand and apply; in fact, most of us are already doing what should be done or at least aware of the best practices for individuals. In this module, we are changing our focus to organizational security. Watch the following video about Zero Trust Architecture, and also skim the guidance by NIST.

1. SANS Webcast - Zero Trust ArchitectureLinks to an external site.
2. NIST Special Publication 800-207 Zero Trust ArchitectureLinks to an external site.

Provide your opinions on Zero Trust Architecture. Can it be something that may achieve a hundred percent security?

Action Items

Read/watch the resources as indicated above. Post a 3 to 4 paragraph (375 to 500 words) discussion and reflection on the topics.

1) Consider this to be a mini "reflection paper" per most of your other course work. Talk about what was interesting, difficult, or surprising in what you read. Note any "ah-ha!" moments.

2) Find a current news article or journal article that highlights the topics. Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.

3) Connect the topics from the above resources back into prior coursework you have taken at Franklin or other institutions. Talk about where you first encountered the topics or concepts and whether or not this exposure to them enhanced or solidified your understanding.

Reference no: EM133649820

Questions Cloud

Economic crises and foreign policy : In the 1970s American politics faced challenges due to scandals, economic crises, and foreign policy.
Analyze the importance of technological innovation : Analyze the importance of technological innovation and the sources in which innovation arises. Evaluate the types of commonly used innovations in the industry.
How can organization or community space make space : How can organization or community space make a space that centers QBIPOC communities? How can these community organizers frame their work around abolition work
Do transnational corporations violate human rights : Do Transnational Corporations Violate Human Rights?
Summarize the articles main points and connect them : Summarize the article's main points, and connect them to the material you read/watched in the resources of the current module.
What is ranked choice voting : What is ranked choice voting (RCV)? Identify how the steps of RCV differ from the most common voting rules today.
Propaganda by anti-slavery movement : How might a narrative of slavery, similar to that of Frederick Douglass, have been used as propaganda by the Anti-Slavery movement?
Explain how economics emerged as a separate discipline : Explain how economics emerged as a separate discipline. Define the role Alfred Marshall played in establishing the field of modern economic.
Describe how the dd command is used in the lab : Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd