Verified Document

Computer Science Having Read Newman's Chapter 1, Term Paper

Computer Science

Having read Newman's Chapter 1, would you consider the security requirements across all environments to be the same?

Not all security requirements are the same in all network environments. Some systems are more vulnerable to the threat of viruses that permanently infiltrate the network's hardware, other to worms that do not permanently damage the hardware but cause programs to 'crash' through such tricks as forcing programs to infinitely reboot themselves. Certain systems, of which Microsoft and Oracle are good examples, excel at modifying or blocking with firewalls certain systemic vulnerabilities after hackers have found ways to broach these problems, and fixing the problem after the fact, but are not nearly as good at detecting holes prior to such exposure

Do you think SLAs will solve our security problem? Discuss why or why not.

Service Level Agreement, otherwise known as an SLA details the responsibilities of an Informational Technology (IT) services provider and its users, as well as the penalties assessed when the service provider violates any element of the SLA. An SLA also identifies and defines the service offering, the supported products, evaluation criteria, and quality of service that customers should expect.

Enterprises that use outsourced services often make use of SLAs. If the two partners have a mutual interest in obeying the agreement, SLAs can be useful. Systems that make use of frame relays also have the additional knowledge that the Frame Relay Forum released a 'Service Level Definitions Implementation Agreement' to define acceptable parameters for frame relay service, so frame relay providers could assure customers of their ability to deliver credible service. (Carr, 2004) However, SLAs, although useful, are no panacea, given the speed at which hackers have been able to infiltrate systems, and the fact that many hackers have no such mutual industry or legal interest in upholding agreements. Only between legitimate partners, and preferably partners that operate with outside guidelines and authorities to hem in any excesses or potential violations, are SLAs a foolproof solution.

Works Cited

Carr, Jim. (2004) "Service Level Agreements." Network Magazine. Retrieved on May 25, 2004 at http://www.networkmagazine.com/shared/article/showArticle.jhtml;jsessionid=YX1YTTMU1B4EUQSNDBCSKHQ?articleId=17601085&pgno=2

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

Cite this Document:
Copy Bibliography Citation

Related Documents

Physical Education and Computer Technology
Words: 11589 Length: 40 Document Type: Term Paper

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth

Preferences in Learning Between American
Words: 23082 Length: 65 Document Type: Dissertation

The trainer will then focus on the steps to be taken to develop new skills. For example, if the trainer wants to talk about motivating, leading, negotiating, selling or speaking, it is best to start with what the learners do well before showing some chart on Maslow's theory, Posner's leadership practices, or selling skills from some standard package that has been develop elsewhere. Many foreign trainers make grave errors

Strategic and Financial Changes in Private, Not-For profit
Words: 4350 Length: 15 Document Type: Literature Review

Strategic and Financial Changes in private, not-For=profit higher education institutions in Jamaica A Quantitative Analysis of Strategic and Financial Changes in private, not-for-profit higher education institutions in Jamaica Summary of Chapter 1 and introduction to chapter 2: Researchers are of the opinion that SIHE is in danger of being affected by external forces such as innovation, competition, and other disruptive forces (Christensen, Anthony, & Roth, 2004; Kirp, 2004; Koblik & Graubard, 2000;

Technology in Learning of Elementary
Words: 10688 Length: 39 Document Type: Thesis

For the purposes of this review, Web-based instruction is considered to be any educational or training program distributed over the Internet or an intranet and conveyed through a browser, such as Internet Explorer or Netscape Navigator. Java applet-based instruction is a special form of Web-based instruction. Although there is very little research on comparing the effectiveness of Java applet-based instruction to the traditional face-to-face offering. However Web-based instruction has received enough

Framework for Implementing the Z. Mathematical Model to a Six Grade...
Words: 12060 Length: 30 Document Type: Term Paper

positive outcome in the educational progress for the students resulting from applying the Z. Model framework. In Mr. Zander's classroom, the average improvement in test scores is 16.75 points. The is the rise in test scores resulting from the students taking the same standardize test, once at the beginning of the school year, and a second time after 6-7 months Z. Model application. The baseline group data was taken form

Teacher Attitudes and Perceptions About Curriculum Innovation in...
Words: 22121 Length: 76 Document Type: Term Paper

Self-Efficacy: A Definition Social Cognitive Theory Triangulation Data analysis Teacher Self-Efficacy Problems for the researcher Data Analysis and Related Literature review. Baseline Group Gender Deviation Age Deviation Comparison of data with other literature in the field. Everyday Integration Efficacy, Self-esteem, Confidence and Experience Barriers to use Integration paradigm. Co-oping and Project design. Organizational Climate Teacher Integration Education. Meta-evaluation of data and related literature. Data Analysis and Comparison Recommendation for Further Research Data Review Report Teacher efficacy in the classroom is facilitated by a number of different factors for different professions. However,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now