Course Paper
Essay by mrordinary82 • October 13, 2012 • Essay • 418 Words (2 Pages) • 1,784 Views
Course Paper. The main intent of the writing assignments are to promote attitudes and skills that will improve your ability to communicate in writing, develop research skills, documentation techniques, and encourage critical analysis of data and conclusions.
Paper Instructions. I have provided topics that you are to choose from to write your paper. No other topics will be accepted, unless prior approvals are obtained from the instructor.
Course Paper Topics. The topics that you can choose from are:
Voice over IP (VoIP): Conduct research on the VoIP technology and the vulnerabilities that are inherent if information security principles are not effectively incorporated in the architecture design. Include the applicable standards, benefits, shortfalls and information security mitigations.
Virtualized Computing:
Through virtualization of networks or portions thereof, organizations are gaining the ability to use server hardware more efficiently. The use of virtual servers lowers the ongoing cost of management while simultaneously making the entire infrastructure more flexible. Conduct research on this technology and identify problems that may affect confidentiality, integrity or availability of data.
Mobile Computing: Due to the increase in mobile computing power the technology is flourishing in organizations. Use of this technology has created an avenue for industrial espionage, proliferation of malware exploits and numerous other cyber-attacks. Conduct research on this growing technology, include the different scenarios in which it is being used in the workplace, security threats and the mitigating controls that are being used to reduce the risks.
Public Key Infrastructure (PKI): The Public Key Infrastructure is a prominent concept in the information technology arena and is based on public/private keys and digital certificates. It operates as an environment in which trust is paramount between users of the infrastructure. In this paper, discuss the core concepts of PKI - authentication, confidentiality, integrity and non-repudiation.
Cloud Computing Cloud computing continues to be a hot information technology rage. It is a flexible way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Conduct research and discuss this technology, compliance standards and the information security safeguards.
The course paper is a research paper based on thoroughly researching a particular subject area. Different resources must be reviewed to come up with a comprehensive view of the subject matter.
The approved format for Strayer University is APA. The length of the paper should be 5-6 pages excluding references, title page, and table of contents. To receive full credit on
...
...