The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.
At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.
The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.
Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol). In a 3–5-paragraph posting, provide the following information:
- Current vulnerabilities related to TCP/IP
- Countermeasures that address the vulnerabilities
- Recommended products for addressing TCP/IP vulnerabilities
If you have experience with TCP/IP, include your own experience and recommendations in this posting.
Study the postings of at least 2 other classmates, and respond to them with comments and questions. Ask for clarifications of their ideas if necessary.
Be sure to document your references using APA format.
This entry was posted in Academic Writing, Computer Science and tagged Current vulnerabilities related to TCP/IP Countermeasures that address the vulnerabilities Recommended products for addressing TCP/IP vulnerabilities, transmission control protocol/Internet protocol.