Mike Meyers CompTIA Network Guide to Managing and

Meyers, M. (2018). Mike Meyers CompTIA Network Guide to Managing and Troubleshooting Networks Exam N10-007 (5th Ed.). New York: McGraw-Hill

Mike Meyers CompTIA Network Guide to Managing and

Meyers, M. (2018). Mike Meyers CompTIA Network Guide to Managing and Troubleshooting Networks Exam N10-007 (5th Ed.). New York: McGraw-Hill
Education. ISBN: 1260128504
Hurwitz, J., Kaufman, M., & Halper, F. (2012). Cloud Services for Dummies. John Wiley & Sons, Inc. doi: https://www.ibm.com/cloud-computing/files/cloudfor-dummies.pdf

Week 5:
From your textbook CompTIA Network Guide to Managing and Troubleshooting Networks, read the following chapters:
Firstly, Network Threats
Secondly,  Risk Management
Thirdly, Cloud Computing Security
Fourthly, Network Operations Security
Further, Continuity of Operations
From your textbook Cloud Services For Dummies, read:
Lastly, Starting Your Cloud Journey

Discussion
The discussion question consists of three independent parts. Address each part under your main contribution to this discussion board:
Firstly, Describe how to perform a patch installation in a network, and the measures a network administrator should take before patching and in preparation for a potential failure.

Secondly,  Explain the concept of cryptography for networking applications.

Thirdly, What are the various types of cryptography used in networking technology?

Further, Summarize the mechanisms that make up a strong cryptosystem . Also, how the cryptosystem could be used to secure a network system.

Further, Explain the purpose of IBM cloud alarm monitors for a single metric over a specified period of time. What happens when a metric exceeds a threshold during that time?

More details;

How is patching done?
Patching is a process to repair a vulnerability or a flaw that is identified after the release of an application or a software. Newly released patches can fix a bug or a security flaw, can help to enhance applications with new features, fix security vulnerability.

How do you ensure systems are patched correctly?

To reiterate the 5 steps crucial to enterprise patch management are: 1) Inventory of Authorized and Unauthorized Devices 2) Inventory of Authorized and Unauthorized Software 3) Secure Configuration for Hardware and Software on Various Devices 4) Continous Vulnerability Assessment and Remediation and 5) Controlled Use .

Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>