module 5

profilelucych

Part 1: Answer the Module Review Questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.

  1. Describe the steps involved in defining the requirements for system safety and system security. What are the relationships between the two? Identify and briefly describe some of the tools that are utilized in helping to meet the objectives of safety and security in engineering.
  2. What is supportability analysis? What are the input requirements, and what is the expected output in terms of type of information and application?
  3. Define TQM. What is meant by SPC? Describe quality engineering. How does it relate to system engineering?
  4. What is meant by disposability engineering and environmental engineering? How do they relate to each other? How do they differ?

Part 2: Select a system of your choice and accomplish a life-cycle cost analysis (LCCA) in accordance with the steps identified in figure 3.38 and the process described in appendix B.

 

Part 3:  Discuss interoperability, its requirements, and give examples to some of the problems that may be encountered.

 

Part 4:  Click Here to go to the ERAU electronic database. Search the ERAU electronic databases for publications related to the application of quality management tools such as TQM, Six Sigma, etc. in system engineering. Find a publication pertaining to the subject, and write a 2 page APA format report, summarizing the paper. Make sure to include references. The last section of your paper should be titled “Author Reflection”, and it should reflect why you selected that particular publication and your critique of the publication examined.

 

Part 5: Answer the module review questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress. 

  1. List the five generations of firewall technology. Which generations are still in common use? 
  2. What is a VPN? What are some reasons why it is widely popular in many organizations?
  3. What is a content filter? Where is it placed in the network to gain the best result for the organization? 
  4. Describe mandatory access controls, discretionary access controls, non discretionary controls, and the concepts of identification, authentications, authorization, and accountability.
  5. How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server?

Part  6 - Using Internet Explorer, open Internet Options under the Tools Menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering, and b) protection from unwanted items like cookies?

 

Part 7: What architecture for deploying a firewall is most commonly used in business today? Why? Give examples. What are the reasons that VPN technology has become the dominant method for remote workers to connect to the organizational network?

 

Part 8: In this module, you will produce another key component of your security plan, the Access Control Policy.

Using the airport case we have established in module three, using what you have learned in this module, and using the Web for examples of Access Control Policies, create an Access Control Policy applicable to your airport project. You may use the Access Control Template (.docx) as a guide or modify it as applicable to write your Access Control Policy.

  • 10 years ago
  • 45
Answer(1)

Purchase the answer to view it

blurred-text
NOT RATED
  • attachment
    module_questions.doc
Bids(1)