1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
11

You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why

it is important for all company roles to assist in securing the company’s network. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in just 7 steps.
Include a discussion of each of the following in your response, being sure to emphasize the point(s) in the seven-layer OSI model where security is an issue, and listing specific security risks associated with each pain point:

Distributed vs. centralized computer systems and why your department chose to be distributed/centralized
Different network topologies and why your department chose the topology it did
Why standards bodies are essential in networking and how your department complies with standards
The importance of communication protocols and which one(s) your department chose
The differences between LAN, WAN, and wireless technologies, and how your department incorporated each
The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performance
Next, you plan to describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, you describe some strategies your department follows to ensure the availability of network access in switched and routed networks.
Then, you describe at least three characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
To reassure your audience of your network’s security, you list some strategies your department used to build security directly into the design of your company network.
Finally, malware has been in the news a lot lately, and you know you will be asked some questions about it. To answer them, you come up with a layperson-friendly definition of malware and identify at least two strategies your department has put into place for protecting your company’s network against malware.

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
6 0

Answer:

Please see attachment for differentiation.

You might be interested in
What is the final amount stored in value if the computer selects 17 as the
nadya68 [22]

Answer: -17

Explanation:

Our random number is 17. Let's go through line by line.

  1. value is a random number picked which is 17
  2. valueB = 17 / 2 = 8.5
  3. If value is greater than 0 AND value has a remainder of 1, we will set the value to value* -1.
  4. Value is now 17 * -1 = -17

Let's quickly calculate value mod 2. 17 % 2 = is 1. If you're wondering how we did that, the remainder after dividing 8 into 17 twice is 1, because 17 - 16 = 1.

We stop after line 4 because we stop the conditional statement after one condition is filled.

6 0
3 years ago
Which security option should be used to ensure the integrity and validity of an Access database?
Fynjy0 [20]

Answer:

The best security which could be used to ensure integrity and validity of Access database is:  

O. database password

Explanation:

Database password is the only option that best guarantee the integrity of an Access database due to the fact that, it limits the number of people who would be able to have access to it. This password is an administrative right given to those who are meant to access it and it is expected to be renewed every few months (probably every 3 months).

<em>Without the password, no other person can be able to login. Also, no two individual can be able to login in same time using same credential login details assigned (that is, in scenario of using the same Username and password)</em>

3 0
3 years ago
Read 2 more answers
Your employer gives you a list of all chemicals in the entire building and the location of the SDS collection, and he asks you t
Whitepunk [10]

Answer:

SDS interpretation  and PPE  needed for Work area.

Explanation:

SDS interpretation  is missing. Employee is new and he/she does not know how to interpret SDS. The employer must explain this to the employee.

The training for chemical handling in your area is given through SDS collection, Hence it is not required.

The PPE protected equipment needs to be provided definitely.

Physical and health hazard information for the chemicals in your work area is provided in SDS collection.

And remember SDS is safety data sheet. And PPE is personal protective equipment.

8 0
3 years ago
Read 2 more answers
What is an operating system
AfilCa [17]
The operating system is the most basic program of a computer which needs other program in order to function and run.

Hope this helps !

Photon
5 0
3 years ago
Can anyone talk to me?
Nina [5.8K]
Yes sure what’s up? You okay??
5 0
2 years ago
Read 2 more answers
Other questions:
  • When you see a blank pointer this means you can drag the row or column border to change height or width
    14·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the ​
    7·1 answer
  • Which of these might be an example of an advertisers target group
    9·1 answer
  • Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
    14·1 answer
  • Write a statement that declares a prototype for a function printArray, which has two parameters. The first parameter is an array
    10·1 answer
  • Given the following method definitions: void mystery(double a) { System.out.print("double! "); } void mystery(int a) { System.ou
    12·1 answer
  • What is a coverage map used for
    11·2 answers
  • class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
    15·1 answer
  • During his last performance review, Franco's boss urged him to set some short-term and long-term sales goals to help him perform
    6·2 answers
  • Firestick optimizing system storage and applications loop
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!