StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Answer the three discussion questions - Assignment Example

Cite this document
Summary
In many third world countries, cities are becoming an encampment of armed groups, which seek to victimize citizens. In many cases, crime has become a bottleneck limit the growth…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Answer the three discussion questions
Read Text Preview

Extract of sample "Answer the three discussion questions"

work Question Crime in urban areas is not a characteristic of western nations, but third world countries, as well. In many third world countries, cities are becoming an encampment of armed groups, which seek to victimize citizens. In many cases, crime has become a bottleneck limit the growth of cities as people tend to avoid crime prone areas. The impact of such polarization has been a common phenomenon across third world countries. As compared to other social ills such as prostitution, most of the third world countries witness organized crime and crimes against property.

Despite the rising level of crime, there are several impediment that block efforts to reduce crime. First, poverty is a significant force that curtails efforts to reduce crime. in some third world countries, poverty motivates citizens into engaging in crime. Second, corruption is another ill that allows criminals to roam in the open as they bribe police enforcement agencies from arresting them. Lastly, poor reforms and infrastructure are reasons that have contributed to lack of adequate measures to combat crime in many third world countries.

Increased crime rates have significant political impact in third world countries. With high crime rates, governments have to build more prisons, increase sentencing structures and execute police reforms (Clear, Cole & Reisig, 2010). These efforts are critical in containing rising crime, but it also draws significant amount of taxpayers’ money. Increased crime is therefore, a force that has a severe political implication in third world countries.Question 2 Virtual private networks offer organizations with security over public infrastructures that are unsecure.

In a virtual private network, organizations use tunneling and security procedures to protect user data from hackers during transport. When organization uses the internet as a medium of connecting their systems, they face security risks such as eavesdropping (Whitman, & Mattord, 2012). However, a virtual private network use unsecured network to provide organizations with encryption that protects their data from hackers. An implementation of VPN, secures data transfers between remote locations.

Organization networks play a significant role, but lack of security policies can lead to network breaches. In most cases, some organizations lack appropriate policies that govern how users utilize network infrastructure. As the e-Activity outlines, lack of proper regulations on the use of network infrastructure allowed the attack on the network. In the future, the use of network security, which would implement firewalls, could help reduce the impact of network attacks. Question 3 The OSI layer is a robust representation of network services that allow communication between network systems, but some layers are vulnerable to attacks.

At the Network Layer, which focuses on delivery of data through the LAN, hackers can tap on network cables and eavesdrop on information being transferred. This can be a security risk since hackers can steal information from an organization. For instance, hacker can tap into a network and use spoof known MAC address before eavesdropping on data. In addition, this layer can experience routing attacks, which can enable attackers to forge the identity of known host before taking over the network.

These risks are critical in the security of the network security layer of the OSI model. Despite the above vulnerabilities, these risks can be mitigated using know technologies such as encryption. The use of encryption at this layer will limit chances of hackers looking at the data and reading the content of information on transit. This strategy is essential in limiting the impact of potential security breach (Schudel, & Smith, 2008). The use of a firewall is essential in boosting security of a network.

A firewall can be placed between the ISP network and internal network and configured to deny unwanted traffic while filtering data on specific rules. This strategy would reduce the impact of network challenges.ReferencesClear, T. R., Cole, G. F., & Reisig, M. D. (2011). American corrections. Belmont, CA: Thomson Wadsworth.Schudel, G., & Smith, D. J. (2008). Router security strategies: Securing IP network traffic planes. Indianapolis, Ind: Cisco Press.Whitman, M. E., & Mattord, H. J. (2012).

Principles of information security. Boston, MA: Course Technology.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Answer the three discussion questions Assignment - 1”, n.d.)
Answer the three discussion questions Assignment - 1. Retrieved from https://studentshare.org/information-technology/1608932-answer-the-three-discussion-questions
(Answer the Three Discussion Questions Assignment - 1)
Answer the Three Discussion Questions Assignment - 1. https://studentshare.org/information-technology/1608932-answer-the-three-discussion-questions.
“Answer the Three Discussion Questions Assignment - 1”, n.d. https://studentshare.org/information-technology/1608932-answer-the-three-discussion-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Answer the three discussion questions

Instructional presentation

Of the three teaching styles - helicopter, drill sergeants, and consultants – it is the consultant teacher who embodies the overt and covert “messages of personal worth, dignity, and strength” (Fay & Funk, 1995, p.... points out that feedback also involves the methods by which the educator communicates correctness of student responses to academic questions.... First, educators should make sure the questions being asked are of appropriate difficulty and cognitive levels while being stated as clearly as possible....
2 Pages (500 words) Essay

Importance of Questions and Feedback

When the student fails to answer the question, the teacher should guide him to find out the answer.... In classroom settings, teacher questions are defined as instructional cues or stimuli that convey to students the content elements to be learned and directions for what they are to do and how they are to do… d.... ). Generally speaking questions are asked for getting answers or information.... Mainly questions are asked using interrogative sentences....
4 Pages (1000 words) Assignment

Bertrand Russell (1912) The Value of Philosophy and Brie Gertler (2008) In Defense of Mind-Body Dualism

Deliberating fundamental questions on the meaning of life, human nature, the cosmos, etc do not have any commercial value.... It cultivates in us to focus on the non-Self, which liberates us from individual petty concerns and veers our consciousness toward bigger questions on the human condition.... Studying philosophy mitigates this phenomenon by prompting us with valid questions.... In the final part of your answer, provide a reasoned evaluation of some aspect of Russell's defense of philosophical inquiry that includes some discussion of an example or two that you think illustrates the… Russell's argument is of the vein that studying philosophy is an end in itself....
2 Pages (500 words) Essay

Post-Stonewall LGBTQ Civil Rights and Lesbian Feminism (responses)

In this Response for Post To begin with, the seems to have covered all the three major questions that wereapplied to write the topic.... In this regard, the topic is properly covered by the writer; however, the major issue that arising in relation to his/her presentation is that he/she did not focus on other extra information, but rather focused strictly on answering the three major questions that guided the task.... He begins by a describing the comprehensive information that answers the first questions and continues with this trend to the other questions....
1 Pages (250 words) Assignment

Leadership and Management

Many organizations are focusing on venturing into the global markets to take advantage of the economic boom experienced in many developed and developing countries.... Such an objective can be considered complex by many business analysts.... However, organizations do not have any… Global managers are required to help organizations cope with such a complex issue....
1 Pages (250 words) Research Paper

The Myth of Neutrality in Knowledge

In the most elementary form, neutral questions are those which are asked by innocent children who express their curiosity over anything they see or hear.... questions like “From where does babies come?... ?? are common neutral questions since the children who frame these questions do not have any pre-conceived notions and can be satisfied by any random answer.... the children have no inherent interest in the questions other than curiosity....
4 Pages (1000 words) Essay

Peer Assessment Experience

The instructors used this opportunity to go through the questions with us, in an attempt to revise the paper.... The teacher would guide us through, reading the questions aloud, and one after the other.... He would then ask a classmate to provide the correct answer, and we would have a brief discussion on each issue....
6 Pages (1500 words) Essay

Analyzing Discourse Community: Perdue Civil Engineering Community

"Analyzing Discourse Community: Perdue Civil Engineering Community" paper involves an analysis of the environment with respect to goals of the community, the significance of the environment and class-based set up, and communication that prepares the university students for their engineering duties....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us