Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Security Measures for the CyberSpace

Coursework Instructions:

Module 2 - SLP
TECHNOLOGY OF INFORMATION SECURITY : "Security Measures for the CyberSpace -- Part II"
Alternative assignment
I strongly recommend you download CyberCIEGE to your computer; it would benefit you a lot to work on the simulation. If, for various reasons, you can not download or run CyberCIEGE to your computer, work on the following alternative assignment. Research three IT security technologies, explore how they work. Write a 3- to 4-page paper on your findings.

Coursework Sample Content Preview:

IT Security Technologies
Name:
Institution:
Course:
Date:
IT security technology which are also referred to as the digital securities have been on the radar for quite some time, relative to the fact that much of the economy is reliant on information technology. Furthermore, there are also issues related to security, which put companies on high alert as hackers try to exploit weaknesses in various systems across the economy (Carafano, 2003). IT security technologies have become an economy on its own, with multibillion companies investing in the sector to offer IT security to millions of companies across the globe. Although the sector presents a very significant gap between what is implemented and the business needs, there are quite a number of trends picking up pace such as big data analytics, adaptive access, application isolation, website protection, securing internet of things and software defined security (Messmer, 2015).
Of importance is the way that the technologies work given the different situations. CyberCIEGE is one of the best video games that simulates how the IT Security technologies work. This simulation game can run on Windows operating system if the computer in question has 3D Graphics and runs as a stand-alone (Thompson & Irvine, n.d.). The game also includes logs that collect all the data on the player’s progress and can be sent to an instructor for review. The main scenarios of the game that the player interacts with are organized into a campaigns (Cisr.us, 2015). Each of the campaign addresses a different security topic that the user is able to interact with. One of the campaigns that is found on the game is called encryption. In this campaign, the user is able to interact with aspects such as SSL, email encryption, and VPNs among others. Among the tools that are found on the game is the online help facility that helps that users understand some of the scenarios that are in the game relative to their actual meaning in the IT Security Technologies (Thompson & Irvine, n.d.). There are also some animated videos which help the users understand some of the main concepts such as assurance, PKI and malicious software. There is also a student’s manual on the various concepts and the guiding concepts.
On the levels of abstraction, the game presents a level of fidelity that is quite high such that when one is playing they are met with the chances to make crucial decisions, which have observable consequences (Thompson & Irvine, n.d.). In the meanwhile, the game does not overwhelm the user with a lot of the syntax as well interface details that go on in...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!