CLASS DISCUSSION: (CYBR 436) Internet & Network Security
Class discussion are designed to ensure critical reflection and application of course content as well as peer interaction. For each discussion, you will: • Post a detailed response of 300 words to the question.
Q1. Most people see Bluetooth as a personal wireless network (PAN). Why is this so? What standard does Bluetooth use?
Q2. If you are an enterprise security chief, how would you go about choosing a security best practice? Is it good security policy to always use a best security practice? What are the benefits of using a best practice?
Q3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those vulnerabilities? Defend your response.
Q4. Study the reporting patterns of computer crimes reported by industry. Which industry best reports?
Q5. Discuss a good security auditing system.
Q6. Physical access to resources is essential and must be the most restricted. Why?
Q7. Authentication is based on three factors. List the factors and discuss why each one determines which type of authentication to use. Physical access to resources is essential and must be the most restricted. Why?
REQUIRED COURSE MATERIALS: books and materials recommend for this course
Title: Guide to Computer Network Security (Computer Communications & Networks)
Author: Kizza, Joseph Migga
others such as
(Journals, Books, Government/Industry Papers) are also recommend.