Week 2

Beginning an IT project includes a fundamental skill of making the best product decision for your organization. One decision to make at the beginning of your project plan is to consider options available for your deliverable.

IT projects can be based on existing, off-the-shelf software that is customized to meet the needs of the project deliverables. In other cases, IT projects can be built from the ground up, in-house. Imagine you and your colleagues are consultants who have been asked to weigh in on the custom vs. off-the-shelf question at the beginning of an IT project at a Fortune 500 company.

 

Respond to the following in a minimum of 175 words: (repeating the questions and your required reference section do not count for the 175 words) (Note there are multiple parts, ensure that you cover each)

·        What are 2 benefits of choosing and customizing off-the-shelf software to meet your project’s needs vs. building the entire project in-house?

·        What are the drawbacks?

·        Consider cost, the impact on the in-house team’s development staff, the software’s ability to grow with future project requirements, and how the choice will affect project support and maintenance.

Week 2

A firewall is a device that prevents unauthorized access to a host or a network either from within the corporate environment or from the public network, such as the Internet. Generally, there are two types of firewalls:

  1. A hardware firewall takes the form of a closed proprietary appliance with its own operating system. This is considered faster, but a bit expensive.
  2. A software firewall is installed on a computer, and it utilizes the computer’s operating system. Firewalls use either hardware or software rules to filter incoming and outgoing traffic to the network.

 

  • How could you use firewalls to support organizational security?
  • What are the advantages and disadvantages of using hardware- and software-based firewalls?
  • What software tools could you use to assess the security of the firewalls used to protect your organization’s computer architecture?
  • How can you bypass blocked sites using anonymous website surfing sites?
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *