The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
U n i t 5 D i s c u s s i o n
Corporate EÂMail Security
Employees within an or ganization r egular ly use company eÂmail for exchanging information with people both
inside and outside the or ganization. Because these eÂmail messages use the Inter net, they r ender the
networ k vulner able to exter nal thr eats. The or ganization should incor por ate eÂmail secur ity measur es to
addr ess these thr eats.
For this Discussion, explain two impor tant r isks facing an or ganization by its employees using cor por ate eÂ
mail (Micr osoft Exchange, for example) . What pr ivacy safeguar ds and countermeasur es would you suggest
to the or ganization to pr otect eÂmails going outside the company , and addr ess junk mail, phishing attacks,
and malicious links and attachments in incoming eÂmail? Justify your selections.
Post a r esponse by Day 3.
Read a selection of your colleagues' postings.
Respond by Day 6 to at least two of your colleagues' postings in one or mor e of the following ways:
Ask a pr obing question.
Shar e an insight fr om having r ead the colleague’s posting.
Offer and suppor t an opinion.
V alidate an idea with your own exper ience.
Make a suggestion.
Expand on your colleagues' postings.
Remember , your posts should be r espectful and pr ofessional, and not dispar aging.
Return to this Discussion in a few days to r ead the r esponses to your initial posting. Note what you lear ned
and insights you gained as a r esult of the comments made by your colleagues.
 ATTACHMENT PREVIEW Download attachment
3/27/2016Course Assignmentshttps://class.waldenu.edu/webapps/blackboard/content/listContent.jsp?course_id=_14660637_1&content_id=_34010199_11/1Unit 5 AssignmentApplication: Remote Access and Cryptographic ProtocolsRemote access is essential to many organizations; however, it exposes the organization’s informationsystems network to a variety of security threats. There are different countermeasures available to combatsuch threats and each organization must select the measures that serve it best.Consider the following scenario: You are a busy software developer for a big IT consultancy and are workingon a large IT project. You have not taken any vacation in two years and really need to get away for at least aweek. However, given the nature of your job and the deadlines, you need to work for at least a couple ofhours on most days of your vacation. As a result, you need remote access to your company’s network.For this Assignment, prepare a presentation of 16–20 slides considering various modes of remote access,explaining them in terms of risks and benefits, and developing countermeasures to remote access basedsecurity threats. Address the following concerns in your presentation:Suppose you use a virtual session (i.e. Citrix or VMware virtual desktop environments) for remoteaccess. This access gives you a desktop session on the organization’s intranet.Explain specific details about this solution including which secure protocol it uses.Explain the benefits and drawbacks of the virtual session.Suppose you use a VPN for remote access. This access allows your computer to connect to theorganization’s intranet directly, like being at the office.Explain specific details about this solution including which secure protocol it uses.Explain the benefits and drawbacks of the VPN.Select two defense countermeasures that would secure your company’s network from threatsassociated with remote access. Justify your selection.Submit your Assignment byDay 7.
Attachments: