Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

COMMENT THESE TWO POSTS SAY WHY YOU ARE AGREE AND ASK SOME QIESTIONS TO MAKE THE DISCCUSSION FLOWS POST 1 The information I've received throughout

COMMENT THESE TWO POSTS SAY WHY YOU ARE AGREE AND ASK SOME QIESTIONS TO MAKE THE DISCCUSSION FLOWS

POST 1

The information I've received throughout this class has been interesting and informative. Initially, I thought I would struggle immensely due to having little to no experience in any area of computer science or cybersecurity, but I enjoyed the process and grasped the information more easily than expected. As we completed the discussions each week, I was able to gain new knowledge on the growing field of Network Concepts.

The one discussion that I enjoyed the most was week 5 - Network Threats. In this discussion, I found it fascinating how there is a plethora of strategic malware attacks that affect the OS. And to top it off, even if the OS has anti-virus software installed, it doesn't prevent all malware attacks. That is how sophisticated the cyber world is. Cybercriminals are a nuisance to all but it is interesting how sneaky they can be in intercepting information or manipulating the user into providing sensitive data. Two of the tactics used in malware attacks are Man-in-the-middle and Domain hijacking. I discussed those two malware attacks in the week 5 discussion post and was amazed at how easily they can be to manipulate the user. We must be diligent in our efforts to protect our systems and ensure the information being provided to another party or OS is a trusted source.

In conclusion, I enjoyed this class and the information I learned during the last 8 weeks. As I continue in my AMU journey, I will use my knowledge of Network Concepts for my other classes and hope to see the rest of this class along the way.

POST 2

While it's not exactly one of the discussion topics that were presented in the class One of the things however that most interested me was working through the assignments and the use of the Cisco packet tracer tool. Prior to this class I did not realize that such a tool exist and I can see opportunities to utilize this tool or another similar tool in my job responsibilities. When I started this class I was very very very new to networking and this tool can provide opportunity for me to design and simulate network configurations for the radio system that I manage.

We have a large microwave upgrade project that is happening this coming year and while designing the new ring topology and path is not my responsibility I'm able to take the proposed designs from our vendors and engineers with this tool to better understand how our network traffic will route. I can also test out the addition of IP based devices and sensors that we plan on adding outside the scope of our vendor 's design and project.

As for the discussions, definitely the interactions surrounding disaster recovery and evaluation of network monitoring tools. Both of these were able to demonstrate different real-world tools and examples which is one of the things I find most valuable from learning with AMU, being able to learn from others. The one around disaster recovery certainly sparked some internal discussion with my team regarding geophysical considerations and business continuity.

I know I certainly gained much needed skills and I hope others did as well!

Step by Step Solution

There are 3 Steps involved in it

Step: 1

For the first post I agree with the authors experience of initially feeling apprehensive about the computer science and cybersecurity content but then finding the information interesting and easy to g... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Algorithms questions