Question 1
Question must be answered in your own words. However when you use the
words of others in any answers you must use quotation marks and attribute the
source right there following APA style recommendations. Also be sure to cite
references right there using APA style when you paraphrase the words of others.
Provide a separate bibliography for each question following APA style
recommendations. The bibliography for each question is outside the scope of the 4
double-spaced pages and should be placed at the end of each question.
Question 1
Question must be answered in your own words. However when you use the
words of others in any answers you must use quotation marks and attribute the
source right there following APA style recommendations. Also be sure to cite
references right there using APA style when you paraphrase the words of others.
Provide a separate bibliography for each question following APA style
recommendations. The bibliography for each question is outside the scope of the 4
double-spaced pages and should be placed at the end of each question.
Select two Vulnerability Analysis tools BeyondTrust Retina CS and Retina CS by eEye Digital Security and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses when used in the three (3) scenarios described below:
a. The system to be developed is intended to be operational in a large enterprise
environment and the system itself when fully developed will be of a size typically
found in large enterprise deployments such as DOD large banks or similar sized
operations where integration and deployment includes use in a networked
environment.
b. The system to be developed is intended to be operational in a midmarket sized firm
which has branches located countrywide. Familiar examples might include a fast
food chain of outlets such as Burger King a nationwide clothing store or similar set
of replicated stores where integration and deployment includes use in a networked
environment.
c. The system to be developed is intended to be operational in a small market firm or
small business firm or even in home usage. Familiar examples might include an
income tax preparation package by a small tax consulting firm.
Be sure to frame your answer in logical argumentations and referenced research results
using the text and credible outside sources. Ensure that your answer is written in the
contexts of security and trusted systems.
Attachments: