Social Media and Its Impact on Multiculturalism and Diversity
A firewall is a devices software the filters the amount of traffic that is being exchanged between the network traffic. It ideally monitors the network traffic and is able to determine the data that is being exchanged throughout the network. It is a networking security that shields the computer from unwanted malicious software and other types of cyber security. Without laying up professional network security configuration, your computer is exposed to various multiple threats which the attackers pose to the network channel hence it is essential to setup strict and firm networking rules.
To commence, lab 8.1.8 one needs to be connected to nodes and the router to be configured to firewall and also multiple computers. The configuration access list that will be created and applied to the network will check the packets at the network layer or even the transport layer, analyze for possible threats that it may impose in the network, permit or deny the passage of each packet through the firewall (Varadhan & Gomes, 2012).
First, you need to create an access list that basically permits the network flow to be conveyed freely between the organizations through the local network channel.
The next step will ideally be to setup and configure lab 8.3.5 to demilitarized zone (DMZ) .In this step there are several objectives that need to be attained at the end of the process (Johnson, Reed & Nordmark, 2009).
- To allow the DMZ and HTTP only with Ethernet access list
- Dent traces and icmp with Ethernet access list
- Verify the functionality of the access list
- Configure the web ip address
The following command needs to be followed when setting up the DMZ zone in the network
Router>en
Router #config t
Enter configuration commands, one per line. End with CNTL/Z.
Router (config) #access-list 110 permit udp any any eq doamin
Router (config) #access-list 110 permit tcp any any eq www
Router (config) #int fa 0/1
Router (config-if) #ip access-group 110 out
Router (config-if) #access-list 100 deny icmp any any
Router (config) #access-list 100 deny tcp any any eq 23
Router (config) #access-list 100 permit ip any any
The last lab 8.3.5, we need to set up the perimeter firewall. The following set will be followed just like the above configuration of lab 8.1.8 (Zalenski, 2012).
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)#ip inspect name firewall tcp
Router (config) #ip inspect name firewall rtsp
Router (config)#
Router (config)#ip inpect
Router (config)#
Router (config)#ip inspect name firewall netshow
Router (config)#
Router (config)#ip inspect name firewall h323
Router (config)#access-list 103 permit udp host 200.1.1.1 any eq isakmp
Opposing Perspectives on Ethical Issues Faced in the Information Technology Field
Router (config)#access-list 103 permit udp host 200.1.1.1 eq isakmp any
Router (config)#access-list 103 permit udp host 200.1.1.1 any
Router (config)#access-list 103 permit icmp any any
Router (config)#access list deny ip any any
Router (config)#
Router#
%SYS-5-CONFIG_I: Configured from console by console.
Social media is a web based application software that is generated and enhanced to enable the users to develop and share content between two or more people. By receiving and sharing, then that is participating of social networking (Duggan et al., 2015).
Google + – this is a google web based application software that is basically used to create a global platform for people to interact and share information all round.
Twitter- is a web based application software that was developed for online news by developing a social networking platform by enabling people to communicate by the help of “tweets”.
Pinterest – is a web based mobile application that operates on a system software design to discover in various form of World Wide Web (WWW).
LinkedIn – this basically focuses on employment and business oriented communication application network by posting for slots in the organization and various other jobs.
Facebook – this is used for social interaction with people within the globe making them to interact communicate and also share content such as picture videos and captions.
Social media has dominated the traditional medium and soon it may become extinct. This is because of various factors that social media are able to attain such as
- Quality – the level of information is monitored and controlled by the people who bear the information
- Scope – this is the intended message that is being communicated to others
- Frequency – this is the time taken to share information from the transmitter to the receiver.
- Immediacy – this is the duration that it take to publish and make the information to be conveyed a direct to the consumers which in this case is the receivers.
Multiculturism and diversity have basically changed multiple of aspects in daily routine of life. This is by the way people react to different
- Learning and interrogation
- Legitimacy and access
- Fairness and discrimination
My Company is specialized in event cleaning and allocation of cleaning workers. On my account employees are able to enhance fairness among themselves despite of all the barriers such as skin color and the sexual orientation of people since they are able to react both positive and negative depending on the Multiculturism and diversity in the organization. In the long run it brings social justice among people and sense of equal treatment among people in my Company (Shohat & Stam, 2014).
Information technology has ideally shaped the industry in development countries. To some other benefits, it comes with new innovation and creation along the way and also brought diversity among people. This is the way people react to curtain environmental circumstance (Behavior of society to the topic of discussion). Focusing on information technology, people have a different way to react to some new key elements that alter the norms.
One of the opposite perspective on ethical issues is Digital Divide. Despite of the plenty of industries, it’s able to shape form to another. There are various people who resist to change and upgrade while others are trained for their labor for the new culture more so in developing counties
Some people are often used to the old school model since it is safe and reliable at the moment and fast. This is generally being afraid to implement new stuff across the globe. Also on the new school, the perspective of people are regarded as different since people cannot reason the same.
In the ones that accept the diversity, they are able to implement some of these factor without even a blink hence making it super reliable to depend when it comes to the development of the projects and other software development (Norris, 2011).
Upon applying aspect in the work station, this is by simply capable to encourage others that it is important to understand the development and migration of technology from one step to another. Also subjecting them to new application feature that might be vital during their transition
Networking is among the major key factor that helps company growth and development. More so for international companies, it helps them to increase their boundaries and the region in which they partake their trade. Also in the connectivity of international and global companies, there are also some challenges that may arise due to the development of the communication channel (Baillieul & Antsaklis, 2009).
- High Cost of connectivity of the internet – this means that in some region setting up a network is super tiresome.
- Bandwidth – in some various countries the bandwidth strength is wavey at some points, this means that yes the devices might connect to the root server but the ability of the device to obtain some information from it is unable (404 network unavailable).
- Security authentication majorly focus on various issues to setup so as to safeguard yourself from various threats. Factors like Authentication, Open port which is various dangerous if not attended. And also the encryption
- Power consumption is also the key challenges in setting up international network for origination. Some regions may AC direct power hence using the alternative that is the UPS and some also don’t hold large amount of current.
- Signaling – this depends on the transmitter but still in some countries, it is basically poor at the receiving end (Akyildiz, Pompili & Melodia, 2014).
References
Akyildiz, I. F., Pompili, D., & Melodia, T. (2014). Challenges for efficient communication in underwater acoustic sensor networks. ACM Sigbed Review, 1(2), 3-8.
Baillieul, J., & Antsaklis, P. J. (2009). Control and communication challenges in networked real-time systems. Proceedings of the IEEE, 95(1), 9-28.
Duggan, M., Ellison, N. B., Lampe, C., Lenhart, A., & Madden, M. (2015). Social media update Pew research center, 9.
Johnson, D. P., Reed, D. J., & Nordmark, E. (2009). U.S. Patent No. 7,633,864. Washington, C: U.S. Patent and Trademark Office.
Norris, P. (2011). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge University Press.
Shohat, E., & Stam, R. (2014). Unthinking Eurocentrism: Multiculturalism and the media. Routledge.
Varadhan, K., & Gomes, J. C. F. (2012). U.S. Patent No. 8,307,422. Washington, DC: U.S. Patent and Trademark Office.
Zalenski, R. (2012). Firewall technologies. IEEE potentials, 21(1), 24-29.