CIS 505 Week 8 discussion Satellite Communication Data Transmission Employee Monitoring Computer Security

Please respond to the following questions with at least 2 paragraphs for each bullet.

Satellite Communication

·         Justify the circumstances in a business situation in which you would use GEOS, LEOS, and MEOS.

·         Discuss the business applications currently being used to support VSAT.

 

Data Transmission

·         Compare the four items related to channel capacity: data rate, bandwidth, noise, and error rate. Determine the most important and justify its significance over the remaining items.

 

·         Describe real-world examples of attenuation and white noise. Examine the effect on the information-carrying capacity of the link and present a way to avoid these types of interruptions.

 

·         Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multiplexing.

 

·         Compare digital transmission to analog transmission to determine the advantages of digital transmission. Provide at least one example to support your response.


T-1 Lines

·         From the e-Activity below, analyze the multiplexing techniques of DSL and cable modem Internet and suggest the one you prefer. Explain your decision.

·         Compare and contrast the use of leased lines in a WAN or LAN setting. Then recommend what you would use if you were a CIO. Support your response with evidence or examples.

 

***E-Activity*** Research the Internet for an article, publication, or online document written in the last 12 months that describes how DSL and cable modems use multiplexing. 

 

 

Employee Monitoring

·         Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their email or Internet access for security purposes. Assess whether you believe it is fair for an employee to undergo this type of surveillance.

·         Suggest an alternative approach for an organization to control security without monitoring employee actions. 


Computer Security

·         From the e-Activity listed below, discuss two security issues related to the researched technologies.

·         Select a Wi-Fi device you are familiar with and analyze the security protection currently implemented on the device. Speculate whether the protection on the selected device is sufficient for the data it contains.

 

***E-Activity*** Go to the NIST Website, located at http://www.nist.gov/index.html, to research technologies that are currently being used in support of security.Bottom of Form

 

Field of study: 
No answers yet