-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Quiz: Quiz
Quiz: Solutions
Presentation: Slides
Presentation: Video
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Quiz: Quiz
Quiz w/solutions: Quiz w/solutions
Presentation: Slides
Presentation: Video
Additional material (not covered in recorded lecture) students are responsible for learning: Read this
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
What is the difference between identity management and access management?
Why is it important to a business to care about the difference between identity management and access management?
What is the one […] -
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
What is the difference between identity management and access management?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Why is it important to a business to care about the difference between identity management and access management?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
What is the one interesting point you learned from the readings this week? Why is it interesting?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Question 1: How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate?
Question 2: […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) or b) network traffic going out to the internet (outbound). […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
In the contexts of being attacked by or unwittingly becoming a resource for distributed denial of service (DDoS), which is a bigger threat to an organization’s network and computer resources and why: Spam p […]
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 4 months ago
Quiz: Quiz
Quiz: Solution
Presentation: Slides in PDF format
Presentation: Video
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
Presentation: Slides in PDF format
Presentation: Video
Quiz w/Solutions: w/Solutions
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
Are the terms Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) synonyms or are they different? If they are different, what are the differences?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
Is it practical to conduct a thorough test of a Business Continuity Plan? Why might it not be practical? If it is not practical, what alternative ways can you recommend for testing a BCP?
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
What is the U.S. Federal Government’s Recovery Time Objective (RTO) for IT capabilities needed to support continuity of communications?
[Hint: see Homeland Security (2012) Federal Continuity Directive 1, from FEMA.gov] -
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
-
David Lanter wrote a new post on the site ITACS 5206 7 years, 5 months ago
Exam: Exam 1 w/answers
Presentation: PDF format
Presentation: PowerPoint format
Quiz w/solutions: Quiz w/solutions
- Load More