Information regarding the Pros and cons of using a VPN

Research to find information regarding the pros and cons of using a VPN for your Internet and other communication uses. Share what you see as the four advantages and four disadvantages that result from its use. Then indicate whether or not you think using VPN is a good or bad choice to use.

 

Discussion 2 Use references and citations

What’s ahead for RAS, VPN, and DirectAccess? These tools are being discussed more frequently in terms of their end of lives. A new technology is emerging that many believe will serve as the replacement for at least VPN and DirectAccess: Zero Trust. Research to learn more about Zero Trust and its capabilities and then share two of its best features and why they may be better than the current in-use technologies.

 

Assignment 1 VPN

For each of the questions below, provide a brief explanation or description as an answer. There is no minimum word count for each answer, but your answers should be complete and provide the key points, issues, or facts that are relevant to the topic.

1. What is a VPN?

2. How Does a VPN Work?

3. How Secure is a VPN?

4. Is it Legal to Use a VPN?

5. What are VPN Logging Policies?

6. Which is better, a free VPN or a subscription VPN?

7. When should a VPN be used?

8. When should a VPN not be used?

9. Are there any content types that VPN doesn’t work with?

10. Are there any practical alternatives to VPN?

 

Assignment 2 DirectAccess

Research to learn and then share five major reasons why an organization would choose to implement DirectAccess on their network server. Among the organizations that provide this information, does one or two reasons tend to stand out more than others? There is also talk that DirectAccess may be at end-of-life with Windows Server 2019. What would be the logical replacement?

 

Discussion 1 Please read the article

Access and read the article “Lack of Awareness, Poor Security Practices Pose Cyber Risks (Links to an external site.)” by Kathy Gurchiek on the Strategic Human Resource Management (SHRM) web site.

From your own experiences and the information in Ms. Gurchiek’s article, name three (3) causes for poor security practices in organizations and suggest how they could be resolved.

Assignment: Risk Identification

Please look at the attachment and fill out sheet.

Discussion 2 Vulnerabilities

When the subject of the vulnerabilities of information systems comes up, it’s often common for the focus to be on either software or system-related weaknesses. However, in some cases, there are also a number of physical security vulnerabilities that may be just as threatening, if not more so. Here are the questions of the day:

1-In a computer network, what would you say are three (3) physical security vulnerabilities?

2-How can these vulnerabilities be mitigated?

Assignment: Vulnerability Assessment

Please look at the attachment and fill out sheet

Case Study Part 3 Look at the attachment for reading purpose

Using the case study titled Sarah’s Confusing Behaviors (in supplemental materials), you are to analyze and address the various ethical issues found within the case study taken from the College of Early Childhood Education; although the study revolves around a student (placement) teacher, the topic of the case study is highly pertinent. You will be addressing the conflicting ethical responsibilities to the child, family, colleagues, and community during the next four weeks. You will brainstorm possible resolutions. In each section, you are to cite what ideals or principles within the NAYEC Code you used as guidance for your answers.

Questions 5 and 6 (2 pages APA format)

5. What professional values and issues surface through this case?

6. What NAYEC ethical ideals or principles are reflected in this case?

 

Assessment Results

For this assignment, you are to create an Assessment Results.

Elements that are needed in this packet:

Create a comparison chart that shows clearly labeled data from the first and second assessment, or assessment over time. (if assessment once then create a chart to display the data)

Develop strategies for a visual learner, for an auditory learner, for a tactile learner and to be performed in a group. The strategies should assist struggling students in mastering the learning objectives (from the assessment packet).

Develop a project to assist gifted students moving forward or going on to more depth with the learning objectives. Include rubric on how the project is graded based on Bloom’s Taxonomy and are level 3 or higher.

Create 2 letters to parents explaining scores for a struggling student and another letter to a gifted student. Include an explanation of the next steps for students.