{"id":3219,"date":"2024-10-23T09:06:18","date_gmt":"2024-10-23T13:06:18","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5206fall16\/?p=3219"},"modified":"2024-08-04T14:03:23","modified_gmt":"2024-08-04T18:03:23","slug":"week-9-all-questions","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/2024\/10\/23\/week-9-all-questions\/","title":{"rendered":"All Questions"},"content":{"rendered":"<p>Question 1: What impacts could be expected if a portion of an organization\u2019s network capacity is inadequate?\u00a0 How would you determine if an organization\u2019s network capacity is adequate or inadequate?<\/p>\n<p>Question 2: Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) or b) network traffic going out to the internet (outbound).\u00a0 With respect to each of the 3 information system security objectives (i.e. confidentiality, integrity, and availability), if you could only filter and selectively block one network traffic direction which one you would you concentrate on and why?<\/p>\n<p>Question 3: In the contexts of being attacked by or unwittingly becoming a resource for distributed denial of service (DDoS), which is a bigger threat to an organization\u2019s network and computer resources and why: Spam phishing or Spear phishing?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question 1: What impacts could be expected if a portion of an organization\u2019s network capacity is inadequate?\u00a0 How would you determine if an organization\u2019s network capacity is adequate or inadequate? Question 2: Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) [&hellip;]<\/p>\n","protected":false},"author":4657,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[794772],"tags":[],"class_list":{"0":"post-3219","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-class-012-network-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/users\/4657"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/comments?post=3219"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3219\/revisions"}],"predecessor-version":[{"id":4763,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/posts\/3219\/revisions\/4763"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/media?parent=3219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/categories?post=3219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5206sec701fall2025\/wp-json\/wp\/v2\/tags?post=3219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}