Part I
Part II
2)Transitioning to a New System Respond to the following discussion topics:
Resistance to change is part of any system upgrade. Imagine that you are working for a large company that offers its services through a third-party website (such as Facebook). How would you handle change so that users are not turned away from frequent or radical changes, even though they have to be made from time to time?
Legacy systems are particularly difficult to replace, and the conversion strategy is often complex. What are some of the most challenging aspects of going from a legacy system to a new one? Which conversion strategy would you adopt? Support your answer with an example. ( 1 page)
Part III
Based on your reading and understanding of the topic, answer the following:
Discuss the difference between HMAC and MAC and why it is deemed as the most secure method for the Internet usage.
SNMP has evolved over time into the SNMPv2 and then lastly with the SNMPv3. SNMP provided a minimal but powerful set of facilities for monitoring and control of network elements using a straightforward Structure of Management Information (SMI), MIB, and protocol. But as there are more requirements for monitoring and as networks became more complex, new versions of the SNMP are released.
Compare and contrast the three versions of SNMP, explaining the deficiencies which the preceding version had, which paved the way for the newer version to be created.
Explain in detail two or more strengths of each new version and what it has been brought to today’s marketplace.
Discuss in detail two or more advances of SNMPv3 in its security engine and any new MIBs. (1 or 2 pages)