Write 6–8 pages describing the primary network components that should be considered as part of an IT solution that supports the business detailed in the case study:
National Centers of Academic Excellence in Information Assurance/Cyber Defense (IA/CD). (2013). CAE knowledge units. Retrieved from http://www.cisse.info/pdf/2014/2014%20CAE%20Knowle…
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Describe the typical components of a modern network that contain an access control process. |
Does not describe the typical components of a modern network that contain an access control process. | Describes incompletely or inaccurately the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process. | Describes the typical components of a modern network that contain an access control process, including the use of supporting examples. |
Describe the various forms of operating systems that are components of a modern network. |
Does not describe the various forms of operating systems that are components of a modern network. | Describes incompletely or inaccurately the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network. | Describes the various forms of operating systems that are components of a modern network, including the use of supporting examples. |
Explain the role that virtual and real memory play in the overall security profile of an operating system. |
Does not explain the role that virtual and real memory play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system. | Explains the role that virtual and real memory play in the overall security profile of an operating system, including the use of supporting examples. |
Discuss the role of cloud computing and virtualization in operating system security. |
Does not discuss the role of cloud computing and virtualization in operating system security. | Discusses incompletely or inaccurately the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security. | Discusses the role of cloud computing and virtualization in operating system security, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks. |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples |
Describe the role of the hypervisor in operating system security. |
Does not describe the role of the hypervisor in operating system security. | Describes incompletely or inaccurately the role of the hypervisor in operating system security. | Describes the role of the hypervisor in operating system security. | Describe the role of the hypervisor in operating system security, including the use of supporting examples. |
Describe the implications of public versus private clouds in operating system security. |
Does not describe the implications of public versus private clouds in operating system security. | Describes incompletely or inaccurately the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security. | Describes the implications of public versus private clouds in operating system security, including the use of supporting examples. |
Explain the role that the command line interface can play in the overall security profile of an operating system. |
Does not explain the role that the command line interface can play in the overall security profile of an operating system. | Explains incompletely or inaccurately the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system. | Explains the role that the command line interface can play in the overall security profile of an operating system, including the use of supporting examples. |
Explain how operating system and application security impact the overall security of modern networks |
Does not explain how operating system and application security impact the overall security of modern networks. | Explains incompletely or inaccurately how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks. | Explains how operating system and application security impact the overall security of modern networks, including the use of supporting examples. |
WhatsApp us