Retrieved from https://studentshare.org/information-technology/1609247-class-student-dicussions-answers
https://studentshare.org/information-technology/1609247-class-student-dicussions-answers.
discussions answers Justin G, I agree with you, the network layer is part of the OSI Model which is responsible for data transfer between devices in a network. You could have also named the specific devices in the network layer such as routers. This is meant for the reader to understand well what you mean by devices. Simply, the network layer is for routing data, and that is why devices such as routers operate in the network layer. The network layer also routes packets to different network devices according to their addresses.
In addition to the above functions, you could have stated that the network layer also provided flow and control of congestion in order to prevent depletion of network resources. Good illustration for giving a protocol which operates in the network layer. I agree with you based on the explanation of the protocols. The Loki tool illustration is well explained as well the relevant examples provided. I could also add that ICMP does not support broadcast or multicast traffic. Good explanation about the ZoneAlarm firewall, in that its combination as an antivirus and a firewall makes it an ideal tool to utilize.
The need for a tool like this in a business environment is of great importance especially this era of internet/information systems are prone to hacking.Kevin, the explanation you have given is too shallow in that someone cannot be able understand what you mean by the layer being contact with most people. You could have stated your argument that the application layer defines the interface for users to communicate their process and data transfer in network. Kevin, you could simplified that the application layer provided an interface for operations and acts as a virtual terminal.
I agree with you on the application layer’s vulnerability. You provided a good example of its weakness and a good definition of phishing. Your argument of using firewalls and anti-virus is also justified. User training and awareness is also important as part of information systems security but it needs the hand of information systems security to implement a secure platform in order to achieve security. The explanation of Comodo Firewall is good but I suggest you could have added its advantages over other firewalls and also include its weaknesses.
David H, yes, I agree with you that employees might require accessing organization data while they are away from office or from within the range of company’s LAN. You can also argue the benefits of using VPN for employees, for instance you can say that, VPN improves productivity of employees and also reduces operational costs. I agree with you that the use of VPN require remote login for authentication and authorization to access the organization network. To ensure security, you stated the use of SSL VPNs which is a good example.
SSL VPNs has been proofed to be secure, ease to implement. The responsibility of ensuring data is secure in VPNs lies on the network administrator who should be responsible of VPN security by implementing the best practices of using the VPN. Justin G, I disagree with you that VPNs increase security level of data transmitted across a public data network. The fact is the use of best protocols, practices and high level security mechanisms is what ensures data security over VPNs. Encryption is part but be aware that hackers are devising more complicated ways of obtaining information from a VPN.
However, I agree that the use of VPN for an organization to transmit data is more secure than use the public internet.It is true Michael that most cities in third world are rapidly increasing in population as most people are settling there in order to get a piece of the fast growing cities. The higher population has led to the increase in criminal activities. Most of cities have also poor housing, poor sanitation, lack of water and poor governance. These criminals are mostly from slums. The growth in crime can mostly be attributed to poverty and criminal drug cartels.
You could have argued that the obstacles of reducing the crime is mostly because of corruption, unemployment, ill equipped security personnel and security authorities colluding with criminal gangs. It is true Michel that corruption will increase, poverty levels will also increase, economic downturn as investors will shun this cities and possibly, it might lead to civil wars.Good explanation Alicia. I agree with you that the third world countries should figure out the best solution in order to combat crime.
They should address prominent issues such as corruption, poor governance, unemployment and poor access to health facilities. I agree with you that citizens get frustrated of bad governance which is corrupt and their leaders are also involved in drug trafficking. The governments in third world should get their politics in order, listen to the views of the citizens and promote the rule of law. Good explanation Alicia.
Read More