Chapter 4, reviewing the PowerPoint slides,

After reading chapter 4, reviewing the PowerPoint slides, and watching the videos (and other readings if present) discuss the following:

Documenting a network is essential in troubleshooting and support. Discuss the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

Don't use plagiarized sources. Get Your Custom Essay on
Chapter 4, reviewing the PowerPoint slides,
Just from $13/Page
Order Essay

General guidelines for all class discussions:

  • You are responsible to post (A)at minimum, at least three times (including your original introduction) to the Discussion area for the Introduction Discussion Forum. More posts are welcome and encouraged.
  • Post a thorough, grammatically sound response that pertains to the course material by 11:59 PM on Wednesday, October 7.
  • You are required to respond to at least two of your classmate’s original posts. They are to be thought provoking responses. In other words, your reply needs to be more detailed than “Great job,” or “I like what you said here.” Responses are due by 11:59 PM on Friday, October 9.
  • It is critical that you are forthright and genuine with your opinions when it comes to participating in our class discussions. However, it is essential that you tie your opinions into the literature and substance of the topics being covered within the class for that particular week. In other words, your responses should allude to, and suggest a sort of understanding/comprehension of the material being covered in class for that period of time.

Additional requirements:

  • Supplement the textbook information with at least one other source.
  • Do not use the following sources:
    • Wikipedia – no wiki pages at all.
    • Ask.com
    • Yahoo Answers
    • InfoPlease
    • E-How
  • Follow APA Guidelines.
  • Make sure to cite all sources appropriately. (Don’t forget to use quotation marks.)
    • If the work is plagiarized, your grade will be a 0.
    • Remember if what you write is not your words, thoughts, or ideas you must cite the source and quote appropriately.
  • If classmates post to your original discussion, it is important that you respond to their postings.

Click here for help on how to cite sources in APA Style from the SWOSU Library. (Links to an external site.) (Links to an external site.) (Links to an external site.) (Links to an external site.)

Click here for further help on APA Guidelines. (Links to an external site.) (Links to an external site.)

responsible to post (A) just

A- The biggest security implication is if someone gains access to your documentation, they know almost everything about your network. If a hacker had your IP and server list this will allow them to target an attack on the important pieces of equipment on your network. Also if you include a security diagram this could help them bypass your security equipment and protocols. “The standard Layer 3 diagram includes firewalls, but the security diagram needs to also include any special security probes, IDS/IPS devices and passive or active taps.” I think that only employees that are working in the IT department should have access to these documents, and even then should only have access to the ones that pertain to their duties. There should also only be certain people that are allowed to update information to prevent incorrect data being entered.

Reference: https://www.auvik.com/franklyit/blog/network-documentation-best-practices/

Essay Assign
Calculate your paper price
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.

Free Revisions

All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.

Title-page

A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.

Bibliography

Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.

Originality & Security

At Essay Assign, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.

24/7 Customer Support

Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

We work around the clock to see best customer experience.

Pricing

Flexible Pricing

Our prices are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.

Communication

Admission help & Client-Writer Contact

When you need to elaborate something further to your writer, we provide that button.

Deadlines

Paper Submission

We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.

Reviews

Customer Feedback

Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.