Part 1: Answer the Module Review Questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.
Part 2: Select a system of your choice and accomplish a life-cycle cost analysis (LCCA) in accordance with the steps identified in figure 3.38 and the process described in appendix B.
Part 3:
Discuss interoperability, its requirements, and give examples to some of the problems that may be encountered.
Part 4:
Click Here to go to the ERAU electronic database. Search the ERAU electronic databases for publications related to the application of quality management tools such as TQM, Six Sigma, etc. in system engineering. Find a publication pertaining to the subject, and write a 2 page APA format report, summarizing the paper. Make sure to include references. The last section of your paper should be titled Author Reflection , and it should reflect why you selected that particular publication and your critique of the publication examined.
Part 5: Answer the module review questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.
Part 6 – Using Internet Explorer, open Internet Options under the Tools Menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: a) content filtering, and b) protection from unwanted items like cookies?
Part 7: What architecture for deploying a firewall is most commonly used in business today? Why? Give examples. What are the reasons that VPN technology has become the dominant method for remote workers to connect to the organizational network?
Part 8: In this module, you will produce another key component of your security plan, the Access Control Policy.
Using the airport case we have established in module three, using what you have learned in this module, and using the Web for examples of Access Control Policies, create an Access Control Policy applicable to your airport project. You may use the Access Control Template (.docx) as a guide or modify it as applicable to write your Access Control Policy.