StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS329 Week 123 - Assignment Example

Cite this document
Summary
a) Hardware compatibility, hardware availability and security are some of the items which should be a part of every installation checklist during the time of hardware deployment. Compatibility is an important part of checklist because it will ensure that the installed hardware…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
CIS329 Week 123
Read Text Preview

Extract of sample "CIS329 Week 123"

Week 2.3 assignment: CIS 329 Hardware Deployment Solution to Question1 a) Hardware compatibility, hardware availability and security are some of the items which should be a part of every installation checklist during the time of hardware deployment. Compatibility is an important part of checklist because it will ensure that the installed hardware is capable of functioning with other hardware and software types. The availability is also important since it will determine whether the needed hardware device(s) are easily obtainable or not.

Security consideration ensures that the hardware devices are free from theft or any cyber attack after installation.b) The type of hardware and site of installation should also be part of checklist. The hardware type can be used to solve compatibility issues with other hardware while installation site will ensure that adequate space is chosen for the occupancy of the hardware equipment (General 2011).Solution to question 2a) In terms of user interface, win 7 supported touch screen although it was not perfect or ideal, that is, it did not have control features that are sufficiently good.

Win 8 on the other hand has improved touch screen support. An example is that of desktop which is far better in such a way that the user can close window and be able to choose menu items without any problem.b) Windows8 also has improved performance in terms of short response time as compared to win7 since it has quicker ways of opening the target programs rather than just relying on menus given that the interface is built for touch. The additional advanced features of windows 8 also make it safer in terms of security features than win 7.

Validating Device DriversSolution to question 1a) It is necessary to bypass the use of digital signatures to validate or protect device drivers in situations where non-embedded intelligent Guards against Disasters (iGADs) does not have device driver.b) In the case where non embedded iGAD do not have, one or more disaster management applications is used to run on some platforms and thus digital signatures may not be necessary for protection (Liu et al., 2013).Solution to question 2a) The key guideline that one should meet in order to justify an administrator’s decision to bypass the use of digital signatures when validating device drivers is the design guideline.

This is because the design guideline has the basics of ensuring that many levels of security and dependability are open, modular and cost effective(Di Sarno, 2011).b) Another guideline is the NIST guideline which recommends shifting to 2048 bit keys in addition to protecting against adversaries (Böhme & Moore, 2012).AppLocker versus Software Restriction PoliciesSolution to question 1a) Both software restriction policy and AppLocker use group policy for domain management. Nevertheless, AppLocker takes precedence over software restriction policy on computer running windows 7, 8 and others at a time when software restriction policy and AppLocker policies exist in similar domain and used via group policy.b) One situation that would influence the use of software restriction policy or AppLocker within a network environment is the need to reduce network trouble shooting issues whereby the two are not combined but used individually.

Another situation is where different group policy objective (GPO) is to be used for each case for the purpose of making straightforward the result of policy testingSolution to question 2a) Many organizations limit or restrict the applications used by their employees in order to reduce both the catalog of supported applications, and support and help desk escalation. This is necessary for the purpose of enforcing different levels of security for various users in order to ensure that not all organization files are accessed by them.b) However, this practice is not really good because this translates to saying that the organization which is the employer always have employees which it cannot trust yet they part and parcel of the organization stakeholders.

Nonetheless, this restriction by the organization aligns closest with my belief concerning the restriction of access to applications. This is because not all employees will always be satisfied with the organization and hence at one time one might be attempted to illegally gain access to sensitive files and applications of the organization for their own personal gains.ReferencesBöhme, R., & Moore, T. (2012). A Brief Introduction to Information SecurityDi Sarno, C., UPM, V. V., UPM, V. G., Mazzeo, A.

, Mazzocca, N., UPM, R. J. P., . & Vial, E. (2011). D5. 1.4-Resilient SIEM Framework Architecture, Services and Protocols.General, A. (2011). SECTION 16740 PRIMARY ELEMENTS. SECTION TITLE PAGES SPECIFICATIONS DIVISION 1-GENERAL REQUIREMENTS.Liu, J. W. S., Shih, C. S., & Chu, E. T. H. (2013). Cyberphysical Elements of Disaster-Prepared Smart Environments. IEEE Computer, 46(2), 69-75.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1673711-cis329-week-123
(CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 Words)
CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1673711-cis329-week-123.
“CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1673711-cis329-week-123.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS329 Week 123

CREB Mutation Schematic

This paper investigates mutations in all domains of "3',5'-Cyclic Adenosine Monophosphate Response Element Binding" (CREB) (Brunetti, A, et al, 2000) transcriptional factor (TF) and its associated protein CBP that may result in Rubinstein-Taybi syndrome (RTS).... hellip; CREB is a transcription factor that allows regulation of gene expression mediated by cAMP-responsive signaling pathways that plays a key role in gene regulation, cell proliferation and differentiation (Brunetti, A....
14 Pages (3500 words) Lab Report

Personality Inventories: Reliability, Validity, and Correlation

In this experiment we wish to assess a group of 17 subjects on two parameters, Internal Control Index (ICI) and Generalized Expectancy for Success Scale (GESS) using standardized questionnaires.... We hope to test the reliability and validity of these two assessments by correlating the results with each other. … The ICI questionnaire is an adaptation of Duttweiler's 28 item inventory (Duttweiler, 2004)....
2 Pages (500 words) Essay

Conjoined Twins: Law and Medical Ethics

 This essay analyses the case of re A Children, Jodie and Mary were conjoined twins.... There were serious problems.... So it is necessary to make the decision in accordance with the principles of existing law as they perceived them to apply to this unprecedented situation.... nbsp;…  Jodie seemed to have normal brain development and all her main organs were working well....
14 Pages (3500 words) Essay

Mat 131 Part 2

To find the age distribution of all participants we add the frequencies of men and women in each age bracket.... We also add a column for percentage for each category out of total. For this… After that, a comparison is made in a discussion based on this information. The table above shows that males have a much higher cholesterol level than This is best observed by the median value of 282....
22 Pages (5500 words) Coursework

Aspects of Connected Speech in British English

102).... An example used by Roach of a weak form is the word “that.... ?? If it is used in the sentence “I like that”, it is the strong form of the word; the sentence “I hope that you come to… 102).... There are competing schools of thought as to whether the mastery of the weak forms is crucial to new speakers to the English language....
15 Pages (3750 words) Thesis

Solving Equations

Hence, mathematicians ventured to uncover laws which govern prime number.... Euclid was the first to find evidence that there are an infinite number of prime numbers.... hellip; nwhile, Eratosthenes devised a method which bears his name, the sieve of Eratosthenes to find all prime numbers to a specified number (Knoebel, Laubenbacher, Lodder & Pengelley, 2007)....
4 Pages (1000 words) Assignment

Analysis of complex sentences of wals info French features 122, 123, 124, 125,126,127,128

123).... Languages use divergent strategies in encoding the relative construction (Dryer et al.... 122).... French uses relative pronoun to relativize the subjects.... Apparently, the position… ized is indicated inside the relative clause by using an initial pronominal element clause which is case-marked, predominantly by an adposition or by case, to designate the function of the head noun in the comparative clause. Oblique refers to grammatical relation of arguments hat are often coded in special ways using semantic case, case affix or an adposition instead of the grammatical case marking that is used in marking core arguments (Dryer et al....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us