Home work 9

  Write short answers, uploaded as a WORD DOCUMENT and attach references.   

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 505-1 week2

BUSINESS CASE: New-Horizon Insurance Company needs your service to establish a new IT network.  Main parameters of the given case.

New-Horizon company has a four-story office building in the city. There are four offices in that building.  In each office, there will be

  • 25 desktop computers
  • 10 portable/laptop computers and need a wireless connection (WiFi)
  • One network printer for all employees in each section.
  • All office computers must have access to the network 

So, there are four local area networks in the building.

You should be developing and drawing network diagrams. Your name and the company name must be written on each diagram. You should label all network devices in your diagrams.

Question 1: 

Develop and draw a network diagram of LOCAL AREA NETWORK for one Office Section only. You will be presenting only one of the LANs in the building. Draw only one LAN considering one of the offices in the main building.

Question 2: 

Draw the block diagram for INTRANET to connect all LANs in the main building. All computers in the main building will be connected to each other with this network. There is one database for customer all transactions. All computers in the main building should have access to this database.  This is your Backbone Network Diagram.

Here you should represent all LANs by using a simplified LAN diagram that was covered during the virtual class. 

Question 3: 

Finally, you should be connecting all computers in the main building to the INTERNET as well.

Use https://www.draw.io  to develop/draw three network diagrams. And place them in your MS Word document and upload them.  

In your network diagram; You should write your name on the upper right section of the DRAW.io diagram and export it as JPEG. And insert into your answer MS Word document.

Rules and guidelines 

Follow proper guidelines 

If there is a diagram(s) then the word count is between min 100 and max 400 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 – Project Recommendations Overview

WEEK 4 ASSIGNMENT – PROJECT RECOMMENDATIONS

Week 4 Assignment – Project Recommendations

Overview

For this assignment, you will create a response to the following memo from your Project Manager:

MemoFrom: The PMTo: Members of the project teamAttached is the Gantt chart for the project. As you can see, we have a tight schedule. Please review it and comment on your area, as we know the coming project will be challenging. With everyone’s help, though, I’m sure we can pull this off with a minimum of scope creep. I look forward to hearing from you before the meeting on Tuesday.This project involves moving our current in-house system to a cloud solution. We are not sure yet if we’re going to partner with an outside company to manage the cloud services or if we’re going to just rent space on Google, Amazon, Microsoft, or other cloud services. I’ll expect a recommendation from each of you based on your area of expertise. Do your research and provide me the pros and cons of the option you are recommending. Be sure to share where you got that information, so I can take a look at your reasoning if I have questions. DO NOT just cut and paste what you find, but rather explain the pros and cons in your own words.

Gantt Chart File [PDF]

Instructions

Respond in a memo using the Word document template provided. There should be two parts to your response.

Part 1

The first part of your response is based on the research you complete determining whether to go with a company to manage cloud services or to rent space with one of the well-established cloud services. Include the following:

  • A list of the pros and cons of both options. You should have at least two pros and cons for each option. 
  • Your recommendation is supported by your research. 
  • A list of the sources that informed your recommendation. Be sure that these sources are varied and from a variety of relevant perspectives. They should also be credible sources. For example, what Google claims their cloud service will do may not be the experience of a business using their service. In the same way, a small business may have a different experience with the same service a large business uses.
Part 2

The second part is the additions needed to the Gantt chart in your area of expertise. Consider what steps will need to occur in your area in order to make this project possible. Consider also the time it will take to complete each of the subtasks, keeping in mind the overall timeline of the project. Include the following:

  • A list of subtasks that need to be added to your area of the Gantt chart. (For example, if you’re a networking specialist, you’ll need to decide what you’re going to do with the network to support the project. Are you going to hire an outside company to expand your network? Do you have the bandwidth you’ll need now that the system is going to be located in the cloud? How much time do you need to purchase equipment like an additional router or a better firewall?)
  • A breakdown of any equipment that will be needed for each subtask and when it will need to be installed.

Here are some questions to consider for each role as you write your response memo:If you’re the IT Project manager, you’ll need to get recommendations from others on the team and then make your recommendation to the PM. What are the main considerations? You’ll need to research and come up with some options.If you’re the data analyst, do your research and find out what this transition will look like to the users in the company and your company’s clients/customers.If you’re the cybersecurity expert, what concerns do you have, and which methods will you use to secure the network and the cloud solution? What does the partner service provide, and what will we need to do/know in the company, and what training will be needed for users?If you’re a software designer, what interface will you need to create/adopt? How will the software you’re using now change if we relocate to the cloud?If you’re a data manager, how will the database platform change/adapt to the relocation? How will the data be packaged, secured, stored, transported, backed up, etc.? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

“Could RFID technology be used to become the mark of the beast?

 

Answers the question: “Could RFID technology be used to become the mark of the beast?  Why or why not?” Understand that this post is an intersection of Theology and Technology question. You cannot answer this post without considering both.
Technology can be used for good. Think of all medical devices that have saved countless lives over the decades.
Technology can also be used for evil. Think of how technology can be used to manufacture biological weapons and mind-altering drugs or to facilitate kidnapping, human trafficking, and even murder.
In the hands of good people, any technological device can be used for good.  In the hands of evil people, the same device can be used for evil.  Thus, it is true for RFIDs.
Some people have suggested different uses for RFIDs, including the tracking of humans through the use of chip implants beneath the skin.  For all of the benefits that this potentially brings, could there be hidden dangers as well? Some people have likened embedded RFIDs in humans to the mark of the beast as described in Revelation 13:17 (NIV): “And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
You will find countless resources by An Internet search on topics like:

  •     End time Prophecy and RFID
  •     Is RFID the Mark of the Beast
  •     Technology as the Mark of the Beast

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

 

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%. Figure 5.4 AppMaker DFD with data types.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 Discussion

 

Topic 1: Obstacles to Successful Implementation

Implementing a well-developed computer network security policy is oftentimes difficult to accomplish. What are some of the technical and organizational obstacles to computer network security policy implementation? “Organizational Typologies” (Generative, Bureaucratic, and Pathological) as specified by Ron Westrum or the Awareness, Desire, Knowledge, Ability and Reinforcement (ADKAR) model by Hiatt can be used to frame your observations. 

 

Reference

Westrum, R. (2004). A typology of organisational cultures. Quality and Safety in Health Care, 13, ii22–ii27.

Hiatt, J. (2006). Adkar: A model for change in business government and our community (1st ed.). Prosci Learning Center Publications.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Techfite Case Study 2

 

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A.  Address ethical issues for cybersecurity by doing the following:

1.  Discuss the ethical guidelines or standards relating to information security that should apply to the case study.

a.  Justify your reasoning.

2.  Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices. 

3.  Discuss what factors at TechFite led to lax ethical behavior.
 

B.  Describe ways to mitigate problems and build security awareness by doing the following:

1.  Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property. 

2.  Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.

a.  Explain how the SATE program will be communicated to TechFite employees.

b.  Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.
 

C.  Prepare a summary directed to senior management (suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.
 

D.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
 

E.  Demonstrate professional communication in the content and presentation of your submission.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ERM strategy paper

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4 page research paper

  Write a four (4) page research summary paper in APA format in which you:  

  • Investigate alternative tools and frameworks for building web services (do not use ASP.NET)
  • Talk about specific tools, ie software platforms, OSes, and computing architectures 
  • What software is needed and compare this with other common approaches for Mobile development
  • To what community/constituent group (personal or enterprise) is this type of Mobile development targeted
  • Argue the need for cross-platform Mobile development frameworks.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Questionnaire on IPSec

 

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now