ITMG381: Cyberlaw and Privacy in a Digital Age
ITMG381 Week 1 Assignment:
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source.
Assignments are due by 11:59 pm Eastern time on Sunday.
Instructions
- Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit
- Read the week 1 article on installation and deployment of Windows Server 2012 and list 5 concerns that could result in vulnerabilities during installation.
- Discuss three basic network components and how they are used today.
Submission Instructions: The report must be at least 300 words.
This assignment is a summative assessment for Course Objective 1
Assignment Rubric ( 100 Points)
Synthesis of Concepts
60
Writing Standards – APA format
20
Timeliness
20
ITMG381 Week 2 Assignment
Description
In order to complete Assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.
You work as a networking consultant for Secure Systems Solutions (SSS), specializing in wireless and mobile device security. American Package Service (APS) is an SSS client. To date, APS has been a regional package delivery firm that has traditionally concentrated its efforts in a few large metropolitan markets. However, the company recently received an infusion of millions of dollars in venture capital and now intends to compete nationwide with the largest parcel delivery outfits. APS knows the expansion will require substantial planning and investment in their communications capabilities, and the security of those communications. APS has asked SSS to make a presentation about potential mobility needs.
For this assignment, develop a list of at least 10 potential business applications for Mobile IP for APS. The company may already have some of these applications in place, while others may prove useful as the company expands. Include the following:
- Applications that might be useful in the APS home office or regional offices as well as for the actual delivery of packages in the field
- A description of these business applications in terms of features and benefits
- The security risks of each application
ITMG381 Week 3 Assignment
To complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. Please be sure to follow APA guidelines for citing and referencing source.
Read chapters 5 & 6. Answers the following question with at least 600 words.
- What is Public-Key Cryptography and why is it important?
ITMG381 Week 4 Assignment
In order to complete assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
RESEARCHING INTRUSION DETECTION SYSTEMS
Using the Internet and other print material, gather data about intrusion-detection systems (IDSs). Research 3-5 different vendor systems. Compare their list of features (active IDS, passive IDS, network-based, host-based, anomaly systems, etc.). Create a table that compares the features. Based on your research, which system would you recommend and why?
ITMG381 Week 5 Assignment
Instructions
In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a
Reviews
There are no reviews yet.