The employer shall conduct” + “risk assessment
z
Dependability:most important? User degree of trust in system, system will operate as expected and not fail during normal user interdep attributes: availability,reliability,security, safety, resilience, maintainability, error tolerance, repair ability Why?failures affect lots of people, unreliable = unsafe, cost, info loss, reputation causes: hardware, software, operational. Interdependent safe systems must be safe and reliable which can be hindered by cyberattacks, viruses, ddos attacks which can |
|---|
Network Fundamentals: VLANs, Spanning Tree, and Network Layer Concepts
VLANs and Hubs
VLANs require configuration tables in bridges to function. However, if hubs are used instead of switches, configuration tables are not necessary because hubs simply connect incoming lines electrically without performing any routing or configuration.
Spanning Tree Algorithm
Steps:
- Elect a root node (switch with the lowest address).
- Grow the tree as the shortest distances from the root (using the lowest address to break distance ties).
- Turn off ports for forwarding if they are not on the
Understanding Plastics: Types, Properties, and Applications
A monomer is… A molecule with low molecular weight
All these containers are made with: thermoplastics
All these objects are made with: Thermosets (rigid)
All these objects are made with: elastomers (goma)
Impermeability is a property of plastics … True
Molecular bonds in thermosets plastics are much stronger than in thermoplastics:… True
Polymers in plastics are made of long chains of carbon atoms… True
Plastics can be natural or synthetic … Yes, there are two types.
Plastics have high malleability
Routing Algorithms, Congestion Control, and IPV4 Protocol: A Comprehensive Guide
Distance Vector Algorithm
- A router transmits its distance vector to each of its neighbors in a routing packet.
- Each router receives and saves the most recently received distance vector from each of its neighbors.
- A router recalculates its distance vector when:
- It receives a distance vector from a neighbor containing different information than before.
- It discovers that a link to a neighbor has gone down.
- The DV calculation is based on minimizing the cost to each destination
– In distance vector routing,
Read MoreCybersecurity Fundamentals and Advanced Concepts
Cybersecurity Basics
Security Models and Principles:
Bell-LaPadula Model: Ensures confidentiality with “no read up, no write down” principles.
Biba Model: Integrity-focused, with “no write up, no read down” rules to prevent data corruption.
Clark-Wilson Model: Ensures transaction integrity and separation of duties.
Least Privilege & Defense in Depth: Fundamental principles for minimal access and multi-layered defense strategies.
Authentication & Access Control:
Strong authentication mechanisms,
Software Development Concepts and Methodologies
User Categorization
User categorization is most effective when the target audience is diverse, allowing for distinct criteria.
Macro-Iterative Strategy
This strategy aims to evolve systems through periodic releases, ensuring continuous improvement and adaptation.
Object-Oriented Development
Object-oriented development promotes code reuse, enhancing efficiency and scalability in software development.
Mission-Critical Systems
These systems face extreme risk exposure, necessitating significant quality assurance
Read More