1 / 2

NTC 300 Week 2 Discussion Questions//tutorfortune.com

NTC 300 Week 2 Discussion Questions//tutorfortune.com<br><br>Click on below link to buy<br>https://tutorfortune.com/products/ntc-300-week-2-discussion-questions<br><br>NTC 300 Week 2 Discussion Questions<br>Discussion Question: Types of Cloud Security Solutions<br>You work for an IT department that has weekly IT roundtables. This week the topic is cloud security and you will lead<br>one of the conversations.<br>Select one of the following types of security that can be included in the cloud:<br> u2022 Layering<br> u2022 Least privilege<br> u2022 Separation of duty<br>Research whether the security type you identified is frequently used by businesses and why or why not.<br>Post your responses to the following prompts to the discussion area:<br> u2022 Provide a short summary about what you found to be the usage of the security type<br> in business.<br> u2022 Describe the circumstances in which the security type would be appropriate.<br> u2022 Describe the circumstances that would indicate the security type would not be<br> appropriate.<br> u2022 What are some high-level steps to implement the security type?<br>Respond to at least one of your peers. In your response, consider sharing additional information or insights about how technologies may affect the use of security solution. Alternatively, consider sharing an experience or something you read to further the solution described.<br> <br>Discussion Question: Mandatory and Discretionary Access Control Lists<br>Explain the difference between mandatory and discretionary access control lists.<br>Post your explanation to the discussion area.<br>Respond to at least one of your peers. In your response, consider sharing ideas about when to implement these types of access control lists or why these types of lists are used during an implementation of cloud technology. As appropriate, include pros or cons of each type. <br> <br>Discussion Question: Security Automation<br>You are part of a team initiating a new cloud environment. Your team is presenting an overview of the security plans.<br>You are to give an overview of single sign-on.<br>Define single sign-on.<br>Provide an example that explains how single sign-on is used and its benefits.<br>Research an article describing an implementation of single sign-on that demonstrates the benefit of the example you identified.<br>Cite your article according to APA guidelines.<br>Post your answer to the discussion area.<br>Respond to at least one of your peers. In your response, consider offering your opinion regarding the potential security risk the automation of access through single sign-on provides and alternative automation ideas.<br>NTC 300 Week 2 Discussion Questions<br>Click on below link to buy<br>https://tutorfortune.com/products/ntc-300-week-2-discussion-questions<br>

teches
Download Presentation

NTC 300 Week 2 Discussion Questions//tutorfortune.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NTC 300 Week 2 Discussion Questions//tutorfortune.com Click on below link to buy https://tutorfortune.com/products/ntc-300-week-2-discussion-questions N T C 3 0 0 We e k 2 D i s c u s s i o n Q u e s t i o n s D i s c u s s i o n Q u e s t i o n :   T y p e s o f C l o u d S e c u r i t y S o l u t i o n s Y o u w o r k f o r a n I T d e p a r t me n t t h a t h a s w e e k l y I T r o u n d t a b l e s . T h i s w e e k t h e t o p i c i s c l o u d s e c u r i t y a n d y o u w i l l l e a d o n e o f t h e c o n v e r s a t i o n s . S e l e c t   o n e o f t h e f o l l o w i n g t y p e s o f s e c u r i t y t h a t c a n b e i n c l u d e d i n t h e c l o u d :       • L a y e r i n g       • L e a s t p r i v i l e g e       • S e p a r a t i o n o f d u t y R e s e a r c h   w h e t h e r t h e s e c u r i t y t y p e y o u i d e n t i fi e d i s f r e q u e n t l y u s e d b y b u s i n e s s e s a n d w h y o r w h y n o t . P o s t   y o u r r e s p o n s e s t o t h e f o l l o w i n g p r o mp t s t o t h e d i s c u s s i o n a r e a :     • P r o v i d e a s h o r t s u mma r y a b o u t w h a t y o u f o u n d t o b e t h e u s a g e o f t h e s e c u r i t y t y p e               i n b u s i n e s s .       • D e s c r i b e t h e c i r c u ms t a n c e s i n w h i c h t h e s e c u r i t y t y p e w o u l d b e a p p r o p r i a t e .       • D e s c r i b e t h e c i r c u ms t a n c e s t h a t w o u l d i n d i c a t e t h e s e c u r i t y t y p e w o u l d n o t b e               a p p r o p r i a t e .       • Wh a t a r e s o me h i g h - l e v e l s t e p s t o i mp l e me n t t h e s e c u r i t y t y p e ? R e s p o n d   t o a t l e a s t o n e o f y o u r p e e r s . I n y o u r r e s p o n s e , c o n s i d e r s h a r i n g a d d i t i o n a l i n f o r ma t i o n o r i n s i g h t s a b o u t h o w t e c h n o l o g i e s ma y a ff e c t t h e u s e o f s e c u r i t y s o l u t i o n . A l t e r n a t i v e l y , c o n s i d e r s h a r i n g a n e x p e r i e n c e o r s o me t h i n g y o u r e a d t o f u r t h e r t h e s o l u t i o n d e s c r i b e d .   D i s c u s s i o n Q u e s t i o n :   Ma n d a t o r y a n d D i s c r e t i o n a r y A c c e s s C o n t r o l L i s t s E x p l a i n   t h e d i ff e r e n c e b e t w e e n ma n d a t o r y a n d d i s c r e t i o n a r y a c c e s s c o n t r o l l i s t s . P o s t   y o u r e x p l a n a t i o n t o t h e d i s c u s s i o n a r e a . R e s p o n d   t o a t l e a s t o n e o f y o u r p e e r s . I n y o u r r e s p o n s e , c o n s i d e r s h a r i n g i d e a s a b o u t w h e n t o i mp l e me n t t h e s e t y p e s o f a c c e s s c o n t r o l l i s t s o r w h y t h e s e t y p e s o f l i s t s a r e u s e d d u r i n g a n i mp l e me n t a t i o n o f c l o u d t e c h n o l o g y . A s a p p r o p r i a t e , i n c l u d e p r o s o r c o n s o f e a c h t y p e .     D i s c u s s i o n Q u e s t i o n :   S e c u r i t y A u t o ma t i o n Y o u a r e p a r t o f a t e a m i n i t i a t i n g a n e w c l o u d e n v i r o n me n t . Y o u r t e a m i s p r e s e n t i n g a n o v e r v i e w o f t h e s e c u r i t y p l a n s . Y o u a r e t o g i v e a n o v e r v i e w o f s i n g l e s i g n - o n . D e fi n e   s i n g l e s i g n - o n .

  2. P r o v i d e   a n e x a mp l e t h a t e x p l a i n s h o w s i n g l e s i g n - o n i s u s e d a n d i t s b e n e fi t s . R e s e a r c h   a n a r t i c l e d e s c r i b i n g a n i mp l e me n t a t i o n o f s i n g l e s i g n - o n t h a t d e mo n s t r a t e s t h e b e n e fi t o f t h e e x a mp l e y o u i d e n t i fi e d . C i t e   y o u r a r t i c l e a c c o r d i n g t o A P A g u i d e l i n e s . P o s t   y o u r a n s w e r t o t h e d i s c u s s i o n a r e a . R e s p o n d   t o a t l e a s t o n e o f y o u r p e e r s . I n y o u r r e s p o n s e , c o n s i d e r o ff e r i n g y o u r o p i n i o n r e g a r d i n g t h e p o t e n t i a l s e c u r i t y r i s k t h e a u t o ma t i o n o f a c c e s s t h r o u g h s i n g l e s i g n - o n p r o v i d e s a n d a l t e r n a t i v e a u t o ma t i o n i d e a s . N T C 3 0 0 We e k 2 D i s c u s s i o n Q u e s t i o n s Click on below link to buy https://tutorfortune.com/products/ntc-300-week-2-discussion-questions

More Related