1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
11

You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why

it is important for all company roles to assist in securing the company’s network. You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in just 7 steps.
Include a discussion of each of the following in your response, being sure to emphasize the point(s) in the seven-layer OSI model where security is an issue, and listing specific security risks associated with each pain point:

Distributed vs. centralized computer systems and why your department chose to be distributed/centralized
Different network topologies and why your department chose the topology it did
Why standards bodies are essential in networking and how your department complies with standards
The importance of communication protocols and which one(s) your department chose
The differences between LAN, WAN, and wireless technologies, and how your department incorporated each
The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performance
Next, you plan to describe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, you describe some strategies your department follows to ensure the availability of network access in switched and routed networks.
Then, you describe at least three characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.
To reassure your audience of your network’s security, you list some strategies your department used to build security directly into the design of your company network.
Finally, malware has been in the news a lot lately, and you know you will be asked some questions about it. To answer them, you come up with a layperson-friendly definition of malware and identify at least two strategies your department has put into place for protecting your company’s network against malware.

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
6 0

Answer:

Please see attachment for differentiation.

You might be interested in
Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
pantera1 [17]

Answer:

a. Clock Speed of Processor = 0.5 GHz

b. Cycles per Instruction (CPI) = 1 Clock per Instruction

c. Throughput = 1 billion Instruction per Second

Explanation

Given Data

Time Take to complete the single Cycle = 2000ps = 2000 x 10⁻¹²

To Find

a. Clock Speed of Processor = ?

b. Cycles per Instruction (CPI) = ?

c. Throughput = ?

Solution:

a. Clock Speed of Processor = ?

Clock Speed = 1/Time to complete the cycle

                      = 1/2000 x 10⁻¹²  Hz

                      =  0.0005 x 10¹²  Hz

                      =  0.5 x 10⁹  Hz                             as   10⁹ = 1 Giga   so,

                      = 0.5 GHz

b. Cycles per Instruction (CPI) = ?

It is mentioned that, each instruction should start at the start of the new cycle and completely processed at the end of that cycle so, we can say that Cycles per Instruction (CPI) = 1

for above mentioned processor.

c. Throughput = ?

Throughput = CPI x Clock Speed

where

CPI = 1 cycle per instruction

Clock Speed = 1 billion Instructions per Second

as

Clock Speed = 1 billion Cycles per Second

Throughput = 1 cycle per instruction x 1 billion Cycles per Second

Throughput = 1 billion Instruction per Second

                         

6 0
3 years ago
The ____ command is used to disconnect a datatable object from the database. (
lisabon 2012 [21]
The delete from command I think
7 0
3 years ago
Read 2 more answers
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
3 years ago
What are the five generations of computers?​
inysia [295]

Answer:

First Generation, Second Generation, Third Generation, Fourth Generation, Fifth Generation

Explanation:

First Generation- Vacuum Tubes

Second Generation- Transistors

Third Generation- Integrated Circuits

Fourth Generation- Microprocessors

Fifth Generation- Artificial Intelligence

4 0
3 years ago
Why do networks need standards?
svetoff [14.1K]

Answer:

4. Standards are what guarantee that the different pieces of network are configured to communicate with one another

Explanation:

Networking standards ensure the interoperability of networking technologies by defining the rules of communication among networked devices. Networking standards exist to help ensure products of different vendors are able to work together in a network without risk of incompatibility

Hope it will help you...

3 0
3 years ago
Other questions:
  • "Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
    10·1 answer
  • "the file that specifies how netbeans builds and deploys the application when you run the application is called the ____________
    8·1 answer
  • Janis is preparing a financial document. She needs to use the dollar symbol placed above the number key 4. Which key will Janis
    12·2 answers
  • Drag each storage device to its category.
    7·1 answer
  • Markup is best defined as
    11·1 answer
  • 50 POINTS!!!!
    8·1 answer
  • When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
    5·1 answer
  • A ________ is a question you ask about data stored in a database
    9·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • Compare and contrast the leadership and leadership and management style of apple and Samsung ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!