1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
11

You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why

it is important for all company roles to assist in securing the company’s network. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in just 7 steps.
Include a discussion of each of the following in your response, being sure to emphasize the point(s) in the seven-layer OSI model where security is an issue, and listing specific security risks associated with each pain point:

Distributed vs. centralized computer systems and why your department chose to be distributed/centralized
Different network topologies and why your department chose the topology it did
Why standards bodies are essential in networking and how your department complies with standards
The importance of communication protocols and which one(s) your department chose
The differences between LAN, WAN, and wireless technologies, and how your department incorporated each
The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performance
Next, you plan to describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, you describe some strategies your department follows to ensure the availability of network access in switched and routed networks.
Then, you describe at least three characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
To reassure your audience of your network’s security, you list some strategies your department used to build security directly into the design of your company network.
Finally, malware has been in the news a lot lately, and you know you will be asked some questions about it. To answer them, you come up with a layperson-friendly definition of malware and identify at least two strategies your department has put into place for protecting your company’s network against malware.

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
6 0

Answer:

Please see attachment for differentiation.

You might be interested in
A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
drek231 [11]

Answer:

<u>Sock puppet</u>

Explanation:

A sock puppet, a reference to a puppet created by placing a sock over one's hand, is a misleading or fake online identity created to promote a particular point of view, often in praise of a firm, organization, product, or individual; to manipulate public opinion or to argue, bully or review products. Regardless of the purpose it was created for, sock puppets are rarely welcome in online communities and forums.

4 0
3 years ago
Software applications called _____ provide the means to record information that passes through a computer or router that is hand
Bezzdna [24]

Answer:

sniffer programs

Explanation:

Software applications called <u>sniffer programs</u>  provide the means to record information that passes through a computer or router that is handling Internet traffic.

3 0
3 years ago
After adding text to a shape, a user can make the text bold and change its color using options in the
lozanna [386]

Answer:

Top area of Word, the second segment.

Explanation:

To make it bold, press the "B" button and to change the colour press the "A" underlined with a colour (normally red).

6 0
3 years ago
I need help ASAP please and thank you!
hram777 [196]

Answer:

B) Sees failure as a way to get better.

Explanation:

Someone with a growth mindset sees failure as a way to get better. A growth mindset is one that typically do not see failure as a stunning block but rather as a way to get better and excel.

7 0
2 years ago
Describe the Order of Operations in Java programming.
cestrela7 [59]

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction. PEMDAS is often expanded to the mnemonic "Please Excuse My Dear Aunt Sally" in schools. Canada and New Zealand use BEDMAS, standing for Brackets, Exponents, Division/Multiplication, Addition/Subtraction.

5 0
2 years ago
Other questions:
  • Technological _____ is the term used to describe the merging of several technologies into a single device.
    13·1 answer
  • Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
    13·1 answer
  • Why should spain go to Africa ​
    15·1 answer
  • What is my credit card billing zip code??
    15·1 answer
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • In the accompanying figure, the split double arrow mouse pointer____.
    7·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • 1) Identify at least four examples and uses of application software.​
    5·2 answers
  • How many passes will it take to find the five in this list?
    14·2 answers
  • When we look for errors inside of our code on our own or with a partner , what is that called?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!