Preview

Assignment Unit 4

Powerful Essays
Open Document
Open Document
4613 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment Unit 4
ITT Technical Institute
3825 West Cheyenne Avenue, Suite 600
North Las Vegas, Nevada 89032

NT2580 Introduction to Information Security
Class First Day Information and Syllabus

Quarter Credits: 4.5 Class Contact Hours: 56
Prerequisite: NT1330 Client-Server Networking II (34 Theory, 22 Lab) and NT1430 Linux Networking

Important General Class Information

Instructor: Steve Todd e-mail: Primary: stodd@itt-tech.edu
Phone: Cell – 702-539-9414 (has voice mail) ITT Campus – 702-240-0967

Class Meetings: Saturday mornings 9:00 AM - 1:45 PM

Class documents, assignments and quizzes and tests are available at stevetodd.coursesites.com.

Office Hours: I do not have standard office hours, I generally will be in one of the labs working on projects for my classes, if you need additional assistance, please contact me and we can arrange to work in the lab.

All class materials will be available weekly stevetodd.coursesites.com -> Your first assignment for this class is to send me an e-mail at my primary e-mail address, include your name and Class in the subject line. In return I will e-mail you a link to the class site.

All assignments and quizzes and unit exams, mid-terms, and final exams will be available on this site.. This will allow you to see your grade on the assignment or quiz at that time. You will also be afforded feedback after the assignment closes that will assist you in understanding what incorrect responses you gave.

Course Description:

This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definitions of terms, concepts, elements and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. This class is not terribly difficult, but it will be difficult if you make



References: CVE List http://cve.mitre.org/ (accessed May 26, 2010). National Cyber Alert System http://www.us-cert.gov/cas/alldocs.html (accessed May 26, 2010). National Vulnerability Database http://nvd.nist.gov/ (accessed May 26, 2010). SANS Top 20 Threats/Vulnerabilities http://www.sans.org/top-cyber-security-risks/?ref=top20 (accessed May 26, 2010). CERT® Coordination Center http://www.cert.org/ (accessed May 26, 2010). US Computer Emergency Readiness Team http://www.us-cert.gov/ (accessed May 26, 2010). US Department of Homeland Security http://www.dhs.gov/ (accessed May 26, 2010). US National Institute of Standards & Technology http://www.nist.gov/ (accessed May 26, 2010).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The onsite updates the responsibility of the onsite IT team, and ultimately the IT supervisor. The responsibility of the restore includes the same people plus the OK from management. All parties need to be kept updated with current…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 431 Words
    • 2 Pages

    7. Convert the While loop in the following code to a Do-While loop: int x;…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 417 Words
    • 2 Pages

    Extended Service Set: A wireless LAN in which all devices communicate through one wireless access point at a time, but the wireless LAN has at least two access points that cooperate to create the single wireless LAN.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Free software is free, users can change code, and source code is available to anyone.…

    • 699 Words
    • 3 Pages
    Satisfactory Essays