Reference no: EM132600602
Question 1.
Both a firewall and a honeypot can function as an IDS. While the firewall's main purpose is typically to establish a barrier between two networks to control traffic, the honeypot is a unique type of IDS providing other functionality. One of your clients has asked you if they need to install both, or will one of them alone provide adequate protection for their network?
Briefly analyze and discuss the benefits and drawbacks of each of the possible configurations (for example, firewall only, honeypot only, both firewall and honeypot) and answer your client's question on the need for both.
Question 2:
Methodology Mind-Set and Management Processes" Please respond to the following:
1. According to Kerzner, "The importance of a good methodology cannot be understated." In your own words, examine the significance of this statement as it relates to integrative information technology solutions within an organization. Provide one (1) example of an integrative information technology solution to justify your response.
2. As a Chief Information Officer (CIO) for a large organization, compare and contrast three (3) of the five (5) main management processes described in Chapter 5 of Kerzner's text. Suggest one (1) strategy to apply the business value of each selected management process to your current or future organization.