Question
COMMENT THESE TWO POSTS SAY WHY YOU ARE AGREE AND ASK SOME QIESTIONS TO MAKE THE DISCCUSSION FLOWS POST 1 The information I've received throughout
COMMENT THESE TWO POSTS SAY WHY YOU ARE AGREE AND ASK SOME QIESTIONS TO MAKE THE DISCCUSSION FLOWS
POST 1
The information I've received throughout this class has been interesting and informative. Initially, I thought I would struggle immensely due to having little to no experience in any area of computer science or cybersecurity, but I enjoyed the process and grasped the information more easily than expected. As we completed the discussions each week, I was able to gain new knowledge on the growing field of Network Concepts.
The one discussion that I enjoyed the most was week 5 - Network Threats. In this discussion, I found it fascinating how there is a plethora of strategic malware attacks that affect the OS. And to top it off, even if the OS has anti-virus software installed, it doesn't prevent all malware attacks. That is how sophisticated the cyber world is. Cybercriminals are a nuisance to all but it is interesting how sneaky they can be in intercepting information or manipulating the user into providing sensitive data. Two of the tactics used in malware attacks are Man-in-the-middle and Domain hijacking. I discussed those two malware attacks in the week 5 discussion post and was amazed at how easily they can be to manipulate the user. We must be diligent in our efforts to protect our systems and ensure the information being provided to another party or OS is a trusted source.
In conclusion, I enjoyed this class and the information I learned during the last 8 weeks. As I continue in my AMU journey, I will use my knowledge of Network Concepts for my other classes and hope to see the rest of this class along the way.
POST 2
While it's not exactly one of the discussion topics that were presented in the class One of the things however that most interested me was working through the assignments and the use of the Cisco packet tracer tool. Prior to this class I did not realize that such a tool exist and I can see opportunities to utilize this tool or another similar tool in my job responsibilities. When I started this class I was very very very new to networking and this tool can provide opportunity for me to design and simulate network configurations for the radio system that I manage.
We have a large microwave upgrade project that is happening this coming year and while designing the new ring topology and path is not my responsibility I'm able to take the proposed designs from our vendors and engineers with this tool to better understand how our network traffic will route. I can also test out the addition of IP based devices and sensors that we plan on adding outside the scope of our vendor 's design and project.
As for the discussions, definitely the interactions surrounding disaster recovery and evaluation of network monitoring tools. Both of these were able to demonstrate different real-world tools and examples which is one of the things I find most valuable from learning with AMU, being able to learn from others. The one around disaster recovery certainly sparked some internal discussion with my team regarding geophysical considerations and business continuity.
I know I certainly gained much needed skills and I hope others did as well!
Step by Step Solution
There are 3 Steps involved in it
Step: 1
For the first post I agree with the authors experience of initially feeling apprehensive about the computer science and cybersecurity content but then finding the information interesting and easy to g...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started