Assignment: IPv6 Transition
Research to find information on what considerations should be included in a project plan to convert an organization’s information systems and networks from IPv4 to IPv6. What specific steps should be included and what should be the outcome produced at each completed step? What budgetary considerations would you anticipate the project requiring? What timeline do you recommend? Is there an alternative to this conversion? Be as specific as possible. Use Citation and references.
Assignment: IPAM for DDI I pick Windows Server 2016 IPAM
Access the PCLDWD.com web page “IPAM? What is it and How to Use it to Manage IP Address & DHCP (Links to an external site.)” and read about the third-party IPAM solutions. Select one of the IPAM systems and provide a brief description of its capabilities and some of its advantages and disadvantages (if you can find any). This doesn’t need to turn into a term paper; just a features description or list and a brief explanation of why each is important.
Discussion: IPv4/IPv6
What are the advantages or disadvantages of making a transition from IPv4 to IPv6? Should the transition be all at once or phased in over time? What impacts might there be on the organization and its systems and stored data?
Discussion: Identifying Risk
Consider the company you work for or select another business or organization. Research the terms “assets” and “risks” (you will find additional details in this week’s readings) and then do the following:
1-Briefly list at least three (3) critical company assets; 2-Describe how or why these are vital or critical to this particular business; 3-Describe what the “risks” would be should these assets become compromised or negatively impacted.
Discussion: Security Policies
No unread replies.No replies.
There are many network-related Security Policies. Research at least two (2) policies; then, share and answer the following:
1-Briefly define/explain the two policies. (Three or four sentences about each will suffice.)
2-List three or four companies or businesses that would benefit by implementing these policies.
3-Why do you feel/believe that these policies are important to these businesses?
Assignment: Risk Identification
Click on the following link and read the instructions to calculate ALE and other Risk-related information.
https://blog.netwrix.com/2020/07/24/annual-loss-expectancy-and-quantitative-risk-analysis/
BACKGROUND: After a thorough analysis, you assess the following details about BedRock Systems, Inc. They have one web server valued at $15,000 and with an exposure factor of 20% and annualized occurrences of 25%. There is a router worth $1,300 with annualized potential occurrences at 30% and exposure at 75%. The company owns 45 workstations each one valued at $1,100 with EF at 15% and ARO at 30%. The Xerox machine costs $2,500 and has an ARO of 20% and EF stands at 20%. There is also a DBMS that costs $25,000 and has an EF of 60% and ARO at 40%.
ASSIGNMENT: Some of the items have already been filled out for you on the table below. Using the instructions in the link given, please calculate and complete the missing items on the table.
Asset
Cost
EF
ARO
ALE
Web server
$15,000
Router
$1,300
45 workstations
$1,100 (each)
Xerox machine
$2,500
DBMS
$35,000
Formulas:
SLE x ARO = ALE
AV x EF = SLE
Point score: Each block is worth 3.33 points for a total of 50 points.
Lesson 8 – Security Policy Elements
Answer the following questions about the inclusions of a security policy for an information technology classroom and lab. Be as specific as possible.
Who should be the person(s) responsible for each piece of networking equipment in the classroom (for example, routers, switches, and wireless access points).
List the person(s) responsible for the computers that are used in the classroom.
List the person(s) responsible for assigning permissions to use the network resources.
Which types or subject-area Internet websites should users have permission to access from the IT lab?
Which types or subject-area Internet websites should users not be able to access from the IT lab?
What actions by users could damage the network or computers?
Should anyone, other than the network administrator, be allowed to attach computer or devices to the network? Why or why not?
Case Study Part 2 Look at the attachment for article
Using the case study titled Sarah’s Confusing Behaviors (in supplemental materials), you are to analyze and address the various ethical issues found within the case study taken from the College of Early Childhood Education; although the study revolves around a student (placement) teacher, the topic of the case study is highly pertinent. You will be addressing the conflicting ethical responsibilities to the child, family, colleagues, and community during the next four weeks. You will brainstorm possible resolutions. In each section, you are to cite what ideals or principles within the NAYEC Code you used as guidance for your answers.
Questions 3 and 4 (2 pages APA format)
3. What impact might these dilemmas have on the children in the center’s program?
4.. How might the adults (co-teacher, placement student, etc) be affected by Sara’s attitude and actions?