Telecommunications Academic Essay

Telecommunications

Q1

1. Why are security policies important? What happens without a security policy? What are the elements that a good security policy should contain?

2. Explain information security confidentiality, integrity, and availability. Summarize one common attack (e.g., Denial of Service) and state whether the attack compromises confidentiality, integrity, and/or availability. Be sure to explain why or how the attack compromises one, two, or three of the pillars of information security. Note: You can also discuss authenticity and non-repudiation, if you want to.

Q2.During week 6, we will be diving deeper into network planning and design. For this week’s conference discussion, answer and discuss one of the following sets of questions:
1. Interoperability of hardware and software is an important consideration when conducting network planning. Why is interoperability important in network planning?

2. When choosing network hardware, why would it be recommended to standardize at least some types of hardware? What are some disadvantages to hardware standardization? When would you recommend hardware standardization or would you recommend it at all?

Q3.The physical architecture for your telecommunications network will need to be planned, installed, maintained, and diagnosed for any issues that may arise. As we have discussed, a telecommunications network consists of highly complex technologies, and trial and error alone may be insufficient to diagnose a communications and network problem. Rather, specialized tools are required to ascertain the network’s health and identify any problems. In addition to maintaining the functionality of the network, you will need to track key performance indicators and metrics to ensure that the network is running at its optimal performance level. Capacity management will be critical in ensuring that the network continues to grow as business requirements continue to change.

Post your response to one of the following topics:
1. Continuous monitoring is a security framework that the federal government has directed each of its agencies to comply with by reporting its vulnerability assessment and security posture on a regular basis. How can this be achieved? What are things that are important to monitor? What are the best methods for reporting the results of monitoring?

2. Patching systems is an important aspects of the maintenance phase. What are the best ways to patch systems? What are the risk involved with patching systems?

3. Email is a powerful communications medium, but is also one of the top methods for introducing malware into a network. Why (and how)?

Q4.What concept in the course did you find the most interesting? Why? Which do you think is the most important? Why? Were there any preconceived notions that you had about any of the material that were changed as a result of this course? If so, please explain.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT :)

Is this question part of your assignment?

Place order