Analyzing Network Connectivity and Security

Category: Internet
Last Updated: 30 Mar 2023
Pages: 3 Views: 69

Assignment Grading Rubric Course: IT530 Unit: 5 Points: 120 Copyright Kaplan University Unit 5 Assignment Outcomes addressed in this activity: Unit Outcomes: Explain flow control and congestion management and their significance to overall network performance Evaluate standard routing techniques and their application to a business’ internet connectivity Recommend a comprehensive security plan Plan and describe methods to secure data including encryption techniques and security protocols Assess LAN communications and management protocols and examine their significance in business environments

Course Outcomes: IT530-5: Analyze issues surrounding the connectivity and administration of networks. Assignment Instructions: 1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider hiring “black hat” hackers as security consultants. Research the elements that comprise “ethical” hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the position of a system administrator considering hiring a hacker.

How would you ensure that this individual was actually strengthening your company’s network security rather than hacking into your company’s sensitive data? Would you even consider hiring a hacker in the first place? Why or why not? Try to find at least one example of a real world “ethical” hacker being hired; was it a good or bad decision on the part of the company? 2. Based on your research, write an 8 to 10 page paper that researches the concept of “ethical” hacking, as well as the ethical dilemmas inherent in hiring a hacker as a security consultant. Preparing your Assignment

Order custom essay Analyzing Network Connectivity and Security with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

The written essay/paragraph formatted paper should be 8 - 10 pages long NOT including cover page and references. As you research ethical hacking, ALL of the pages must have citations and references. No more than one direct quotation (of 40 words or more) is allowed per page and bullet lists without substantial narrative included are strongly discouraged. There should be no spelling or grammar errors. All written assignments should be in APA format. APA formatted in-text citations and references are required for all sources, and all figures and tables must be captioned in APA format.

If you are unfamiliar with APA formatting, please see the Kaplan Writing Center for more information on how to work with APA. Directions for Submitting Your Assignment: Compose your assignment in a Microsoft Word ® document and save it as Username-IT530 Assignment - Unit#. doc (Example: TAllen- IT530 Assignment-Unit5. doc). Submit your file by selecting the Unit 5: Assignment Dropbox by the end of Unit 5. Assignment Grading Rubric Course: IT530 Unit: 5 Points: 120 Copyright Kaplan University Assignment requirements:

All papers must meet these standard requirements: Paper follows APA formatting Length is 8-10 pages long not including references and cover page No more than three bulleted or listed points per paper. No more than one direct quote per page from a reference source and those quotes must be properly cited within the body and in the references at the end of the paper Title page Reference page No spelling errors No grammar errors *2 points will be deducted from grade for each occurrence of not meeting these requirements.

Review the grading rubric below before beginning this activity. Unit 5 Assignment Grading Rubric = 120 points Assignment Requirements Points possible Points earned by student Document includes introductory paragraph discussing the general concepts of ethical hacking as opposed to black hat hacking. 0-30 Document includes well supported argument pro or con for hiring a hacker as security consultant. 0-30 Document includes example of “real world” hiring of hacker and discusses the outcome. 0-30 Discussion of ethical hacking considerations should be substantial nd flow logically. 0-30 Total (Sum of all points) Less: Standard Requirements points deductedAssignment Grading Rubric Course: IT530 Unit: 5 Points: 120 Copyright Kaplan University Assignment Total For more information and example of APA formatting, see the resources in Doc sharing or visit the KU Writing Center from the KU Homepage. Also review the KU Policy on Plagiarism. This policy will be strictly enforced on all applicable assignments and discussion posts. If you have any questions, please contact your professor.

Cite this Page

Analyzing Network Connectivity and Security. (2017, Feb 07). Retrieved from

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer