2,047
30
Review, 4 pages (800 words)

Review

Was the spelling and punctuation well done and was the grammar appropriate? It is important to outline that the paper contained high quality use language. However, there are a number of challenges in the use of grammar. For example, in the initial sentence, the word “ concerned” was necessary to be followed with the word “ with”. However, this word is missing. There is also poor use of comma specifically in the definition of the router model number. Lastly but certainly not the least, the use of split infinitive is also a key in the grammatical aspect of this paper. This includes words such as properly and easily.
Was the organization of the content effective?
Considering the ability of the organization to adopt up to date information security practices, it is clear that it is content effective. Most importantly, the application of secure data mechanisms such as the use virtual private networks in mobile has well been covered in the organization. Additionally, the use data encryption and decryption techniques to manage contents have effectively been applied in the organization. In general, the organization has an effective approach in management of content.
Did the information flow well?
As seen in the document information flow in the article has been very precise. The paper has began by outlining the research subject followed by a deep analysis of the necessity information security in an organization. The information content in the article is divided into two main segments, which are utilization of virtual private networks and a project. In the first section, it starts with an overview followed by history of VPNS, VPN technical aspects, PPTP, L2TP, IPsec, authentication and finally vulnerabilities. It is also essential to specify that the subject of vulnerabilities has addressed issues such as user threats and hardware and software threats. The second section is the project. The flow of information in the project begins with a background, materials, planning and finally implementation and testing. In essence, this a well organized flow of information in the paper.
Were diagrams used effectively?
It is also vital to note that the paper contains an effective use of diagrams. This is as stipulated below. The first diagram illustrates a general application of virtual private networks in an organization using the site-to-site approach. It has been designed in a way that makes it easier for one to comprehend its ability to facilitate secure data transfer. The second diagram goes deep into the subject of VPNs by stipulating a three step tunneling approach from a client to server. There is also a diagram for secure data access in the organization. In general, the diagrams in the article have been effectively used to outline the necessity of data security.
Were citations used where necessary and were references appropriate and formatted correctly?
The use of citations in the paper has seriously been poor. On the other hand the subject of referencing has accurately been implemented. In essence, the paper has had an accurate formatting of references. This is through the use MLA formatting style.
Project:
Did the project give the student some in-depth experience in the topic?
The content of this paper has clearly delivered a quality in depth experience on the topic of information security. To be precise, the subject of using virtual private networks in the operations of an organization’s information system plays a huge role in facilitating great experience in enhancing data security.
Was the project well-designed?
This project was clearly developed in a poor design platform. According to their plan, the project began by background, then a deep analysis of materials, followed by planning, implementation and testing and conclusion. In essence, the project was supposed to begin with an introduction, followed by a review of literature, methodology, planning , testing, implementation and finally a conclusion.
Did they follow their project design?
It is essential to clarify that their targeted project design was properly followed. In simple terms, the project begins with a background, followed by materials, planning, implementation and testing and finally conclusion. This project design approach facilitated smooth execution of the targeted project objective, which is a thorough study on the application of virtual private networks not only in computer networks but also in mobile phones.
Was the information the student presented beyond what would be learned in the Networking and Security classes taken? In other words, have they learned new content?
Upon a thorough analysis of the project, it is important to note that the student presented new content. To be specific, the application of virtual private networking concepts in smart phones is a subject that is, new. It ascertains that the student has covered material that will pave way for better security mechanisms in the future.
What grade would you give this paper/project?
This paper has made a deep analysis on the subject of information security. Regardless of the few grammatical errors and poor in text citation, I give this paper a grade of B Plus (B+).

Thank's for Your Vote!
Review. Page 1
Review. Page 2
Review. Page 3
Review. Page 4
Review. Page 5

This work, titled "Review" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Review

References

AssignBuster. (2021) 'Review'. 17 November.

Reference

AssignBuster. (2021, November 17). Review. Retrieved from https://assignbuster.com/review-review-paper-samples-2/

References

AssignBuster. 2021. "Review." November 17, 2021. https://assignbuster.com/review-review-paper-samples-2/.

1. AssignBuster. "Review." November 17, 2021. https://assignbuster.com/review-review-paper-samples-2/.


Bibliography


AssignBuster. "Review." November 17, 2021. https://assignbuster.com/review-review-paper-samples-2/.

Work Cited

"Review." AssignBuster, 17 Nov. 2021, assignbuster.com/review-review-paper-samples-2/.

Get in Touch

Please, let us know if you have any ideas on improving Review, or our service. We will be happy to hear what you think: [email protected]