- 
	
	David Lanter wrote a new post on the site ITACS 5206 7 years, 12 months ago How would you determine if an applications development project team was using secure coding practices? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 7 years, 12 months ago 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 7 years, 12 months ago Quiz: Quiz Quiz: Solutions Presentation: Slides Presentation: Video 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Quiz: Quiz Quiz w/solutions: Quiz w/solutions Presentation: Slides Presentation: Video Additional material (not covered in recorded lecture) students are responsible for learning: Read this 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago What is the difference between identity management and access management? 
 Why is it important to a business to care about the difference between identity management and access management?
 What is the one […]
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago What is the difference between identity management and access management? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Why is it important to a business to care about the difference between identity management and access management? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago What is the one interesting point you learned from the readings this week? Why is it interesting? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Question 1: How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate? Question 2: […] 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) or b) network traffic going out to the internet (outbound). […] 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago In the contexts of being attacked by or unwittingly becoming a resource for distributed denial of service (DDoS), which is a bigger threat to an organization’s network and computer resources and why: Spam p […] 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Quiz: Quiz Quiz: Solution Presentation: Slides in PDF format Presentation: Video 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Presentation: Slides in PDF format Presentation: Video Quiz w/Solutions: w/Solutions 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Are the terms Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) synonyms or are they different? If they are different, what are the differences? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago Is it practical to conduct a thorough test of a Business Continuity Plan? Why might it not be practical? If it is not practical, what alternative ways can you recommend for testing a BCP? 
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago What is the U.S. Federal Government’s Recovery Time Objective (RTO) for IT capabilities needed to support continuity of communications? 
 [Hint: see Homeland Security (2012) Federal Continuity Directive 1, from FEMA.gov]
- 
	
	David Lanter wrote a new post on the site ITACS 5206 8 years ago 
- Load More

 
	 
		