This module is an introduction to network security, mobile cloud as well as a farther exploration of the Internet of Things. We learned network security through reading chapter 10 which addresses the major threats to the network security, how to conduct a risk assessment, how to ensure business continuity, and how to prevent intrusion. We learned The Internet of Things through reading chapter 13, 14, and 15 in Foundation of Modern Networking online Ebook from UH’s Library. These chapters covered the topics of Cloud Computing, The Internet of Things, and Architecture and Implementation. After reading Cloud Computing, I have had an overall of cloud computing concepts, understood the principal cloud services, and able to compare and contrast the NIST and ITU-T cloud computing reference architectures as well as understanding more concepts in the Internet of Things components and the scope of the Internet of Things.
The learning artifact I chose for this module is the vocabulary table which I answered all the vocabularies chose from chapter 10 (Network Security) of Business Data Communications & Networking book. When answering these key terms, I learned more about the types of security threats, network control, Risk Assessment, Encryption, User Authentication, and how to prevent Social Engineering. After finishing this assignment, I’m able to define what are the Vulnerability, Threats, Availability, and how to reduce the Risks. This chapter also provided me a useful knowledge in network security area which I am perusing. Below is my Learning Artifact that show the table of the Key terms from the book.
Learning Artifact: