Is it possible to implement Alibaba style of fraud management (risk analysis) for US based institutions?
April 28, 2020Identify and name the 10 levels of the DGI Data Governance framework from the Data Governance Institute.
April 28, 2020Question Description
n
nnQ1.nnYou work for a network solutions provider. your goal is to become a network engineer and design enterprise networks. You began with the company as a technical support analyst who helped clients troubleshoot hardware and software.Because of your strong communication skills , your boss has been sending you on sales calls, but you feel that this task is moving you away from your goal of network engineering. As a compromise, you and your boss have agreed on a plan in which you will make a series of video training programs to explain complicated networking topics to clients.nnYour first video will explain the difference between inline and passive IDPS devices. In preparation for video production, you must submit an outline of your presentation along with explanatory diagrams. prepare a 1-2 page outline that defines inline and passive IDPSs, the hardware required, the advantages and disadvantages of each, and typical situations in which one is preferred over the other. Include atleast 2 diagramsnnQ2.nnReview the NIST Guide to Industrial Control Systems Security. NIST Special Publication (800-82) (Links to an external site.). Specifically review section 6.2, which covers the application of security controls for ICS’s. Select one of the case studies already covered in the course (You can use Maroochy Shire Sewage Spill case study.) and write a short (no more than 1 page) recommendation on security controls that if implemented would have served to mitigate the incident (i.e. case-study selected).nn