Question

In: Computer Science

TOPIC: This chapter lays the groundwork for information security. As you dirtect your attention towards the...

TOPIC: This chapter lays the groundwork for information security. As you dirtect your attention towards the top-down approach and bottom-up approach, its important to be informed and the approaches must deal with an integral decision making part of a project, plan, or assessment.

Do you agree with the philosophy (top-down approach or bottom-up), or do you think it is the sole concern of the IT managers or a technology coordinator? Depending on your choice and informational support, do you feel it works this way within an organization or even a education setting? Please post your thoughts, opinions, and key points to support your groups answer. We will discuss this as a group and come to a conclusion and solution.

Solutions

Expert Solution

Yes,I agree with the philosophy Top-Down approach and Bottom up approach.I feel that this works in the education.In education,some of the courses can be taught directly through lecture.,and some require the direct interaction through laboratory.So,the approach and the method of teaching in both the cases differ.Therefore there comes the role of Top down and Bottom Up approach.These are completely differ with each other and they helps in understanding the needs of students and providing them the education based on their needs.

A Top Down approach teaching style focuses on immersing the students in the big picture without explaining the components that makeup the subject.If we consider a English language in an second language the top down will begin with immersing the students in all aspects of learning English immediately including writing,reading,pronouncing.In this case,the students will not be taught by the basic grammar.Instead they would be plugged into the totality of learning English and then they gradually learn the building blocks that make up the English language.

Unlike top down approach,Bottom up approach begins with the component parts of the subject and gradually builds up the whole.

As per my knowledge is concerned,bottom up is a better approach in both in an organisation or in education.

  • In education ,it would help the students to build the subject in a proper way.
  • In an organisation or a company,in this approach the team members are involved in planing making the decisions collaboratively .This will improve the team communication and also empowers the team members.As a result it will motivate the team members to do their best for achieving the team goals.

Related Solutions

Topic: Attributions Throughout this week, pay attention to the attributions you make for your own behavior...
Topic: Attributions Throughout this week, pay attention to the attributions you make for your own behavior and others’ behavior. Select 1 instance in which you made an attribution for your own behavior, and 1 instance in which you made an attribution for someone else’s behavior. Then respond to the questions below. Describe 1 instance from the past week in which you made an attribution for your own behavior. Was the attribution internal or external? Positive or negative? Did you demonstrate...
Why do you think so much money and attention goes towards genetic research rather than towards...
Why do you think so much money and attention goes towards genetic research rather than towards improving social conditions?
From your paycheck, what is a combination you pay towards Social Security and Medicare taxes? Group...
From your paycheck, what is a combination you pay towards Social Security and Medicare taxes? Group of answer choices IRS Income Income Deduction Medicaid FICA Utilities 2. A mutual fund does what? Group of answer choices Allows investors to take advantage of the large gains that are possible in the stock market Provides immediate diversification Is professionally managed Pools together small amounts from a large number of investors All of the answers are correct 3. Most people spend much time...
This topic comes from both Chapter 13 and 15. It is an investment topic, but you...
This topic comes from both Chapter 13 and 15. It is an investment topic, but you will need to refer to Chapter 13 to understand stock splits. You are a financial consultant. Your client owns 200 shares of Chipotle Mexican Grill. This corporation has never had a stock split. Write a message to your client discussing the possibility of a stock split. Explain to your client how a 2:1 split might affect their portfolio of stocks. You will need to...
can you create your idea for financial budget for security information
can you create your idea for financial budget for security information
Information security vulnerability analysis tool Your browser should return several hits. Choose a topic which can...
Information security vulnerability analysis tool Your browser should return several hits. Choose a topic which can be a tool, framework, practice, a methodology or technology related to vulnerability analysis and summarize it for the class. In your summary explain its purpose and address the following points: How widely is it used? How reliable is it in practice? What is its commercial availability? Does it scale well? Is it applicable to networked environments? Are there any other relevant aspects which you...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to conduct a Web application penetration test on your network. Identify and explain all steps necessary to successfully complete the test.
Information Technology (IT) Security Define your chosen type of security in your own words. Does the...
Information Technology (IT) Security Define your chosen type of security in your own words. Does the term shrinkage relate to your type of security? If so, how? (If not, please omit this portion from your response.) What challenges and risks exist for this type of security? How are the risks mitigated? Tracked? Eliminated? What types of internal and external factors exist? What key strategies are used to protect assets, personnel, and infrastructure? Please be sure to outline prevention and response...
-Define the selective attention -Describe a case where you experience selective attention. Provide the details. Your...
-Define the selective attention -Describe a case where you experience selective attention. Provide the details. Your answer should have no less than 100 words -How can you avoid suffering from selective attention in the future? Provide a step-by-step guideline on how you can avoid the bias. Your answer should have no less than 100 words. It can be in point-form.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT