Discussion

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

For this discussion, research the topic of network access control, and respond to the following questions:

  • What do you feel are the most critical aspects of good network access control, and what kind of damage can be done to an organization if network access control is circumvented?
  • Discuss how operating systems, databases, and Web applications are protected from unauthorized access in a network environment.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

Discussion

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

For this discussion, research the topic of Internet and Web security models, and respond to the following questions:

  • Select a model from your research. What do you feel are the most important areas of security provided by this model, and why are these areas of security important to an organization?
  • Discuss examples of how the model you selected provides strong security in specific areas of an organization’s Internet and Web infrastructure.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

discussion

For this discussion, research the topic of security infrastructure design principles, and respond to the following questions:

  • What do you think are some of the effects of compromised security in the key areas of security infrastructure design? Provide examples with your response.
  • Select 1 of the key areas of security infrastructure design, and discuss design measures that can be taken to ensure that this area of the system infrastructure is secure.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

discussion

Respond to at least 2 of your fellow classmates with at least a 100-word reply about his or her Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?

Please create two responses to the two posts below

First Post

For the most compelling topic, I would have to go with project management with respect to implementing security management. In looking at our project managers from the past, all they did was ask us what we need. We would come up with the plan and they would just “bless” it and pay for it. But we would do all the legwork and research. This include security. I believe a Project Manager best course of action would be to have their number two as a security expert they can lean on to get the correct information. As I learned more about the duties of a project manager though taking the classes I have at CTU, I’m now realizing how tasking the job can be. Even more so when a Project Manager is starting a project from scratch.

Having another point of view is great for learning. Many topics require straight definition. The topics requiring more than definition is where the different point of view aids in learning. Research yields different avenues base on the company you’re writing about. There are also students in the class which has first-hand knowledge on a topic. They post examples of what they been though. This gives a better idea of how best to attack a topic or understand a topic. Another aspect I really thought helped in learning Security Management is reviewing your fellow student individual project. This gives an insight on the progress you’re making on your individual project. It even helps with a re-read. When you write it, you know what it supposed to say that’s what you read. Second eyes may have a sentence structure to give your meaning more pop. Spell check doesn’t catch everything, so second set of eyes also helps with that.

One approach I would suggest going forward with all instructors is ensuringg all topics posted will be read. What I mean by that is, when you post the information you conducted your research on, you want it read by another student. We’ve all conducted research on a topic which was not easy to write about. Then to post it for review and see no one has read it, was not a good feeling. I would like for everyone to have their post reviewed. What I do is when choosing which post to reply is, see which post doesn’t have a reply. That’s the post I reply to. I’ve had post not read by any students. Then I would see post with multiple replies. If there is a way the Professor can see to it, every post gets a reply would yield additional valuable information. 

 

Second Post

Of the topics presented through this course, I found the security frameworks to be the most interesting.  There are so many frameworks to choose from that it’s possible to find one that fits just about any industry for a security manager to use.   Alternatively, there are several that can be easily tailored to an organization’s needs.  While these frameworks aren’t absolutely necessary, they can make a security manager’s tasks less of a burden.

            As is my standard claim, I do not like the discussion board’s response aspect.  I’m fully content and comfortable with publically posting a short paper, but most responses devolve into mere platitudes.  I do recognize the potential benefits, such as researching the topic itself, practising academic writing, reading another student’s simplification of the material, or even having a full discussion.  However, the response portion isn’t necessary for most of them and few students have the time or inclination for a back and forth discussion.  Then, there is the worst potential outcome.   That is, for a discussion to occur and a student to convince another student of an incorrect interpretation, and the best way to limit that possibility is for an unreasonable expectation of administration from an instructor.

Aside from my desire to see discussion board responses removed, I’m finding the 6-week format more daunting than my first-year online courses.  Condensing 15-week courses into 11-week courses, and then further into 6-week online courses puts a lot of information and effort into a short timeframe.  More importantly, it leaves little time to fully absorb the material.  The work is doable and some of the topics can be understood despite the rush, but I imagine a better comprehension with a closer to standard course duration.  This is intensified for those of us taking 1-2 other courses in tandem and/or with full-time jobs.  Altogether, I’m advocating for an 11-week version online, since we’re unable to take ground courses.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

discussion

Based on the attached paper, please do the following

 

Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:

  • What were the most compelling topics learned in this course?
  • How did participating in discussions help your understanding of the subject matter? Is anything still unclear that could be clarified?
  • What approaches could have yielded additional valuable information?
  • The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

Discussion

 

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

Discussion

Please review the attached file and give feedback per below instructions.

 

Review at least 1 other student’s Key Assignment Outline, and provide meaningful feedback. Refrain from general feedback, such as simply stating “good job.” Your feedback to other students is most helpful if you not only point out weak areas but also offer suggestions for improvement. The best feedback takes a three-stage approach to identify what was done well, weaknesses, and areas for improvement.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Posted in Uncategorized

Leave a Reply

Discussion

DISCUSSION QUESTION

Throughout the  New Shoes Simulation you will have to evaluate your previous decisions as well as other Market data and information in order to make an informed decision for the current period. The break even analysis is a tool that can assist in setting the price for your athletic shoe during the various decision periods. Based on the market data and information presented in the simulation determine the break even analysis for your New Shoes company  and the correlation to your shoe pricing strategy.  Keep in mind that to calculate the break even analysis you can use the following formula:

Break Even Price=variable cost (the unit cost of the product) + fixed expenses (marketing expenses and allocated product development expenses) /projected units.

Having calculated the Break Even Analysis what will you have to price your shoes in order to reach your target run? In addition, provide  an assessment of other elements that should be considered in addition to the break even analysis to the determine the price of your shoes.  Research and find an organization that has been challenged with setting prices for their products or services and share how they addressed the issues.

“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT”

Post your order to get it done from scratch by our writers today

ORDER NOW

Leave a Reply