1/2 Page for each Short Essay
Short Essay 1:
Describe why it is important to secure all network equipment in a protected area. What do you think are the most significant potential problems that can occur if these steps are not followed?
Short Essay 2:
Describe the role encryption plays in protecting data. Examine where an organization should begin when it comes to choosing an encryption vendor. What features do you think make up an effective encryption method?
Short Essay 3:
What steps would you take to guarantee that both physical and virtual machines are patched in accordance with regularly scheduled releases? Be sure to defend your thoughts with reference to the readings.
Short Essay 4:
Describe the importance of choosing a proper authentication method for your wireless network. In your own words, explain what makes some methods better than others.
Short Essay 5:
What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?
Short Essay 6:
There are five phases that frame the Risk Management Life Cycle. Which of the five is the most significant in your opinion? Be sure to defend your thoughts with reference to the readings.
Please provide Google Scholar References where needed and please provide the URLs.