Computer science

Asset Security

  Background scenario: overseeing the designing of asset security for a private company that contracts work to the United States federal government. You deal with global entities that have locations in Europe and South America. Your organization has been the target of mysterious attacks on their networks, social engineering attempts made on their employees, and …

Asset Security Read More »

A solid understanding of basic computing, computer storage, and processing

Consider jobs that require a solid understanding of basic computing, computer storage, and processing speeds as part of an information technology degree. Put yourself in the position of the hiring manager and think about what you would expect as competent responses from an applicant: Briefly explain the four main parts of a computer system information.Provide …

A solid understanding of basic computing, computer storage, and processing Read More »

Operation Stop Hack

  Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the …

Operation Stop Hack Read More »

Server Virtualization

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts: Describe the organization’s environment, and evaluate its preparedness for …

Server Virtualization Read More »

Addressing the complexities of data security and privacy

            Scenario: You are assisting the Chief Information Security Officer (CISO) for a start-up company that just acquired multiple cloud service providers in the U.S. the EU and may possibly acquire more in Germany and Saudi Arabia. The company plans to transform its business offering by consolidating the acquired technology …

Addressing the complexities of data security and privacy Read More »

Seven domains of a typical IT infrastructure

    The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations. Answer the following question(s): 1. What is an advantage of organizing IT …

Seven domains of a typical IT infrastructure Read More »

Our customer support team is here to answer your questions. Ask us anything!