ISSC_641 WK 1 Forum Word 400

profileDrAwesome

Week 1 Forum Question #1b: A) Pick two of these questions, restate each selected question, then in the next line, post your viewpoint/answer to it. Make sure you state your reasons or justification to your answer. Make sure also to include at least one reference and properly cite from the reference.  

  1. During the early computing era between1970s and 1980s, what would be considered a (give examples of each) 
    • A minicomputer? 
    • An operating system? 
  2. What is Client/Server computing? Which is what - give examples? 
  3. What is the difference between a physical network and a logical network? 
  4. Compare and contrast: Internet, Intranet, and Extranet. 
  5. How does an attack differ from a security risk? 
  6. What is a security control? 
  7. What is authentication and how does it differ from authorization? 
  8. What is steganography? How is it used in security technology? 
  9. Is a single network logon the same as a central system logon? 
  10. Why would there be a need for remote data access? 
  11. Discuss some of the corporate vulnerabilities in an organization - not necessarily computer related. 
  12. Describe the differences between trusted domains and trusting domains. 
  13. What are some of things you can do to deter intruders away from your computer?
    • 6 years ago
    • 10
    Answer(2)

    Purchase the answer to view it

    blurred-text
    • attachment
      ClientServerComputingAssignment.docx

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      order_45445_ISSC_641WK1ForumWord400.docx