Most compelling lessons from the course

Assignment Help Basic Computer Science
Reference no: EM132386456

DISCUSSION-1

1. Most Compelling Lessons from the Course

Physical data is essential in protection of sensitive data, confidential information, information systems and personnel from any malicious individuals. The course explored the various means that one can use to take advantage of physical security to protect their assets. It includes ensuring the security and safety of the personnel from threats such as terrorism, and vandalism among other physical security threats. One of the most compelling lessons taken one could take from the course is the ability to use the natural landscape in enhancing physical security in a facility. For instance, if the facility is located in a desert, it can use the enhanced visibility the desert provides to increase security of the facility.

2. Enhancement to Learning Ability from Participating in the Discussion Board

The discussion forums in the course provided an environment for collaborative learning in which the students as well as the instructor participated. It made learning an active process in which each student had to post an initial post to which others comment with insightful contributions or corrections. The discussion prompts served as a challenge that allowed the learners to engage with the peers in the active discussion, allowing them to synthesize the information they each contribute which was helpful compared to just memorizing it. IT allowed one to understand how their colleagues understood the course lessons as well as appreciate the diverse perspective on the various topics of the discussions.

3. Uncertainties Related to Physical Security

Physical security is a wide field that is easy to ignore as one focusses on implementing technical security measures to protect their assets. While the course covered a wide array of topics related to physical security in the protection of hardware, networks, facilities, and other secure spaces, some of the concepts covered in the course were not easy to understand. For instance, the use of natural physical features to enhance surveillance, adding visibility that gives any potential offender the illusion of increased sense of being observed (Ariel, Bland & Sutherland, 2017). However, one can also take advantage of this increased visibility and openness such as one provided by low fencing to conduct surveillance on their target, and invade the homes when the owners are not there. It is, therefore, not easy to understand whether increased visibility provides security, or should be understood as a vulnerability in physical security.

DISCUSSION-2

1. The thing which caught the attention in this course is the various ways of protecting organization data from being used by hackers and other cybercriminals. The course enables one to identify the effective methods which can be used to prevent various threats to an organization's data and ensure that there is the security of the data. In this regard, It can be denoted that the course has been helpful as it has equipped individuals with knowledge on how to fight cybercrimes.

2. The discussion board discussion has enhanced ones learning by enabling them to understand deeply the various ways which are used to prevent the attacks to the organization's data. The discussion board denoted that various physical features also can be effectively used to prevent the intruders from accessing the organization. The course, in fact, enables one to understand various steps that should be taken to ensure that information of an organization is secure.

3. The things which individuals are uncertain in regards to physical security is the design of an organization security system to ensure that any suspicious behavior is detected and any heinous activities are thwarted before it is carried out by criminals. In essence, it is apparent that the customers and the intruders of an organization are similar and thus sophisticated systems should be put in place to ensure that they are differentiated in order to maintain secure information in an organization.

Reference no: EM132386456

Questions Cloud

Strengths-weaknesses-opportunities and threats analysis : After reading the unit lesson, research a company of your choosing to create a strengths, weaknesses, opportunities and threats (SWOT) analysis.
What is the purpose of the algorithm : Define the Diffie-Hellman key exchange? How is this information relevant to you? What is the purpose of the algorithm? Be specific.
Choose area of information systems research : Choose an area of information systems research as we've discussed during the course and describe it briefly.
Describe the differences between law and policy : Describe the differences between law and policy. What are the associated benefits / drawbacks associated with each?
Most compelling lessons from the course : Most Compelling Lessons from the Course. Enhancement to Learning Ability from Participating in the Discussion Board
What are the smtp and mime standards : What are the SMTP and MIME standards? What is the difference between RFC 5321 and RFC 5322? Briefly explain base64 encoding.
334MAE Vehicle NVH Assignment Problem : 334MAE Vehicle NVH Assignment help and solution, Coventry University - Assessment help - Application of one and two degree of freedom models to solution
Calculate the theoretical ex rights price : An investor, Mr. Khan that owns 1000 shares is concerned that he will not be able to buy shares in the rights issue given that he feels.
What is her gross tax liability : Angelena files as a head of household. In 2019, she reported $53,450 of taxable income, including a $10,000 qualified dividend.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd