Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks). 

What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks).

I need 250 words without plagarisms.

2Q)

 

In the business environment, most companies or businesses rely on the computers wireless networks. This allows them to communicate vital information either to their clients, investors, suppliers or even internally between the manager and his subordinates or subordinates to subordinates. Information system security aims at protecting this information or information systems from unauthorized access, disruption, modification, disclosure, usage and destruction (Hossain et al., 2015).

The concerns that should be understood by individuals and companies about data transfer are the data security and data privacy as they try to send data via air through the wireless networks. Hackers have tried to penetrate network connections to spy, tamper and steal the information about companies, products, and customers and they can also change the information or make software’s dysfunction (Hossain et al., 2015).

Wireless Application Protocol

The wireless Application protocol is defined as a protocol in communication mostly for the purposes of data access wirelessly using networks of mobile wireless (Sarkar et al., 2016).

Pros

Wireless application protocol has enhanced the efficiency of data transfer since most of the of the network operators, hardware manufacturers and software application developers have worked to in co-operating WAP in their worldwide products in the bid of reaching as many users as possible. WAP has managed to add features like personalization and wireless telephony application which has improved the privacy level and users can even make calls using the application without needing to enter the telephone number. WAP is easier and cheaper to install especially in business setup since there is no need to buy and install internet cables. WAP offers a higher level of flexibility since the workers in an office-based wireless setup can network without sitting in a dedicated computer and be productive even while away from the office (Sarkar et al., 2016).

Cons

WAP is more exposed to attacks from unauthorized users who may tend to access information of individuals or companies requiring more expenses in security installations. WAP is slower and less efficient compared to wired networks and will, therefore, require a wired backbone network. WAP usually have a network coverage problem resulting in black sports where there are no signals for example in buildings with steel reinforcements. WAP has installation problems especially in areas where other wireless technologies are in use or radio interference exists which slows down the wireless communication (Sarkar et al., 2016).

REFERENCES:

Hossain, M. M., Fotouhi, M., & Hasan, R. (2015, June). Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.

Sarkar, S. K., Basavaraju, T. G., & Puttamadappa, C. (2016). Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.

I need  a response of above post with 150 words.

Thanks

Each student’s goal is to compare current news about an organization with our Organizational Behavior course topics.  Then comment on how this organizational fits your personal preferences as you’ve come to understand them.

Introduction:
Many students comment that they like that our class relates to the “real world.” This assignment accomplishes exactly that. During our course, there will be many current world events that relate directly to things we will be studying. You can find them on the daily news and in the sources listed in your syllabus.
Each student’s goalis to compare current news about an organization with our Organizational Behavior course topics. Then comment on how this organizational fits your personal preferences as you’ve come to understand them. After finding a current news story, write exactly how this news relates to our course, including your thoughts on it. Use only a Canvas discussion board.
For example, one student found a New York Times video about how Amazon treats its employees and compared it to motivation, job satisfaction, employee empowerment and organic organizational structure. She commented on how her personal style of motivation is affected, and on other personal thoughts. She entered it into a Canvas discussion board.
3. Create one original post to the discussion board by the 11:59 PM on the due date you chose in step 1
Find one news article. An acceptable news article:
• Has direct relevance to specific concepts in our course.
• Is less than 3 months old. The more current the better.
• Covers materials from our course.
• Can be a print article, online written article, TV, radio story, video, or other relevant media. You must be able to allow other students to see it by posting a link to it on your discussion board post.
Create a 200 to 300 word discussion board post.
1. Select 10 key words or topics from our course to relate to the article.
2. Briefly define all key words
3. Write exactly how your article demonstrates the key words or topics you defined
4. Communicate your personal thoughts on the article.
5. Post a question for other students to answer.
6. Review your draft for organization, grammar and connection to the course
7. Submit a well thought out and polished entry to the discussion board.
8. Include a copy of the article or a link to it.

4. Read at least 2 other students’ posts
Reading the ”Showrooms” is a great way for every student to:
• Learn how the concepts we are studying apply to the real world.
• Review for the exams, since exams are focused on applying our course to the real world.
• Enjoy the course more.
5. comment on 2 other students’ posts in a discussion board
Comment on exactly how the article related other aspects of our course. Every student is responsible for “adding to/commenting” on 2 showrooms. Comments will be graded on relevance to our course and on bringing new topics into the discussion. 250 words should be adequate.

Scoring – 300 points possible
• Personal Newsroom discussion board post and class presentation = 200
• Commenting on other posts. 2 comments at 15 points each = 100
The best efforts will:
• Thoroughly explain how our course topics apply in “the real world of business”
• Select an article that thoroughly covers the news story.
• Select an article that relates to a lot of course key words/topics
• Write about many course topics as they relate to your article
• Be well written
• Be thoroughly proofread
Tips and hints
Choose a news article that contains enough information to promote discussion on many course topics. If your article is too narrowly focused or too short, it would be impossible to relate to enough course topics. That would result in a bad grade for this assignment
Steps(suggestions)
Find a suitable article
Choose course topics and key words to relate to the article.
Write a 300 word discussion draft.
Ask other students to review and proofread your draft
Make final revisions
Upload article and discussion text
Check the discussion later to see what else you can learn from them.
Comment on other “Showrooms”

To apply the model, examine the intersecting cells on the CNSS cube from Figure 1.2 and determine how you could address some of the factors influencing security of class information.

Report Issue

Exercises: Answer problems 1 and 2 from the “Exercises” section
(page 35) of Chapter 1 of the textbook.

 

 

 

——————————————————————–
Exercises:

Some hints on Chapter 1  Exercise 1  (page 35)
——————————————————————–
A useful reference on the CNSS model can be found
in document NSTISSI No. 4011 from the National Training
Standard for Information Security Professionals
( www.cnss.gov/Assets/pdf/nstissi_4011.pdf )

 

 

 

To answer Exercise 1 (page 35 of text) please refer to Figure 1.2
(CNSS security model) on page 5 of Chapter 1 of the text.

 

The CNSS model of Figure 1.2 identifies the nine interacting
factors that influence the security of any resource. The nine
key factors are:
(1) Policy:  which deals with info security policies in place,
(2) Education: which deals with education of users on security related issues,
(3) Technology: which covers the technology used to implement security measures
(4) Confidentiality:  confidentiality of info/data
(5) Integrity: addresses measures in place to ensure data integrity
(6) Availability: to ensure authorized users access to information in usable format
(7) Storage: issues dealing with data storage
(8) Processing: issues that cover the processing and handling of data
(9) Transmission: covers issues related to factors that influence transmission of data

 

 

 

These nine influencing factors can be modeled as a 3-dimensional cube as
shown in Figure 1.2, where the each of the three axes of the cube represent
three of these factors. When we consider the relationship among the three
dimensions represented by the axes shown in Figure 1.2 we have a 3 x 3 x 3
cube with 27 cells, where each cell represents an area of intersection among
the three dimensions that must be addressed.

 

 

 

In Exercise 1 you determine how you would address the different factors that impact
the security and protection of data/information pertaining to this class (such as student
information, student homework submissions, student discussion posts etc.) by applying
the CNSS model (Figure 1.2).

 

 

 

To apply the model, examine the intersecting cells on the CNSS cube from Figure 1.2
and determine how you could address some of the factors influencing security of class
information.

 

Some examples that you may consider are:

 

First you could consider the nine factors individually. For example,

 

(1) Confidentiality:  Only students registered in the course have access to the
course web page.

 

(2) Integrity: Students would have unit logins which would be their means to
access the course webpage via eCollege. Students can only alter or modify
their own work, and cannot change or delete another student’s submitted work.

 

(3) Availability:  The university would ensure that the eCollege site is accessible
to all online students with minimal downtime for maintenance and upgrades.

 

… etc.

 

After you have addressed the individual factors, you can address the intersecting
cells in the CNSS security model of Figure 1.2. Some examples include:

 

Confidentiality/Policy/Storage – This cell represents the intersection of the
factors Data Confidentiality, Security Policy, and Data Storage. This can be
addressed by adopting the following policy:– “Only students registered in the
course are able to access course related material and student discussion posts.
Additionally, homework assignments are only viewable by the instructor and the
applicable student”

 

Integrity/Policy/Processing – formed by the intersection of the Integrity, Policy,
and Processing cells in Figure 1.2. This can be addressed by having a policy such
as:– “The course would have a policy that would all work submitted by the students
must represent their own work, and would properly cite all sources referenced.”

 

Availability/Education/Processing – formed by the intersection of the Availability,
Education, and Processing cells in Figure 1.2. This can be addressed by having a
policy such as:–

 

Discuss why it is (or is not) important to include end users in the process of creating the contingency plan?

  • Module 2 Reading AssignmentPageNot completed: Module 2 Reading Assignment. Select to mark as complete.Read Chapter 2 and be sure to take copious note of key points.
  • Module 2 Discussion ForumNot completed: Module 2 Discussion Forum . Select to mark as complete.Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.
    Module 2 Discussion QuestionSearch “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion?
  • Module 2 AssignmentNot completed: Module 2 Assignment. Select to mark as complete.
    Graded Assignments may be found at the end of each chapter of the required textbook under the title “Real-World Exercises”. Each assignment is due between Monday to Sunday evening by 11:59 p.m. EST. of the respective week. Each student is to select one exercise (per module exercise) from the grouping as identified below. Provide documented evidence, in Moodle, of completion of the chosen exercise (i.e. provide answers to each of the stated questions). Detailed and significant scholarly answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided. All submissions need to directed to the appropriate area within Moodle. Late submissions, hardcopy, or email submissions will not be accepted.
    Module 2 Graded AssignmentFrom Chapter 2, page 81, Real World Exercise 2.2