Discussion 7 (commerce)

250 words+

Wilderness Trailhead, Inc. (WTI) is a retailer that offers hiking, rock-climbing, and survival gear for sale on its Web site. WTI offers about 1200 different items for sale and has about 1000 visitors per day at its Web site. The company makes about 200 sales each day on its site, with an average transaction value of $372. WTI sells products primarily through its Web site to customers in the United States and Canada. WTI ships orders from its two warehouses: one in Vancouver, British Columbia, and another in Shoreline, Washington. WTI accepts four major credit cards and processes its own credit card transactions. It stores records of all transactions on a database server that shares a small room with the Web server computer at WTI’s main offices in a small industrial park just outside Bellingham, Washington. Outline and propose a security policy for the WTI database server. Be sure to consider the threats that exist because of that server stores customer credit card numbers.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Summary

2 pages pages

Please write a summary of Lecture PPT

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Basic Algorithm

 

Think of two day-to-day tasks that you do regularly.   You will write describe each of your chosen tasks and identify what parts could be written out as a conditional or looping structure as it relates to programming. The you will write them out in pseudocode statements with the proper structure and indentations.  There is an example/hint at the bottom of this assignment to help you on the pseudocode portion.

Minimum requirements:

  • A minimum of two full paragraphs describing each task and their related conditional and/or looping structures (four paragraphs total)
  • One full pseudocode statement for EACH task with proper indentations, syntax, and structure (two pseudocode statements total)
  • Submit only one document via the link title above.
  • Use paragraph structure where necessary. Use complete sentences where necessary and proper grammar and spelling.
  • Place a header on your page that contains your first and last name, the assignment name, and the course code from page two of the syllabus.
  • Your document must be one of the following formats (.doc, .docx, or .rtf).
  • Cite any and all sources. 

 

HINT:

This is a generic Algorithm:

  1. Put a teabag in a cup
  2. Boil some water
  3. Add water to cup
  4. Remove the tea bag
  5. Add sugar
  6. Add milk
  7. Stir
  8. Serve

Below are some possible pseudocode statements for step 5 ONLY, you will need to write out the appropriate syntax and structure for ALL steps to include any implied steps in between.

IF (want sugar)

     THEN (add sugar);

     ELSE (don’t add sugar);

ENDIF

WHILE (want sugar)

     Add teaspoon of sugar;

ENDWHILE

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud and IoT Security Concerns

 You have been asked for a cloud-based/IoT solution to replace a traditional client-server configuration. You may download the opensource version of MS Visio called Dia to create the network diagram or use the drawing features available in any Office Suite. Just make sure to label your components. The current technologies are as follows:

  •  A database server (Microsoft SQL)
  •  SplendidCRM running on a server (See http://www.splendidcrm.com/ )
  •  A Microsoft Exchange Server (For email)
  • A Windows Server 2012 R2 running Web Server (IIS)

Your deliverables are:

  • An assessment of the current configurations (Pros and Cons)
  • Potential replacement technologies
  • Proposed Network Diagram incorporating Cloud and IoT technologies (Do not neglect security measures such as firewalls, IDT, IDS, honeypots, DMZ, or encryption)
  • A narration explaining your network diagram

Your well-written paper should meet the following requirements:

  • Four to five pages in length, not including the title and reference pages.
  • Label each section clearly.
  • Include two external references in addition to the textbook. The Saudi Digital Library is a good source for these references.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Plan

Write 8 page network plan for  “A dual location medical clinic with doctors/physician’s assistants rotating between locations on different days”.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MKT 455 week 6

Week 6 Class Discussion topic comes from —

Chapter Six “Targeting Attractive Market Segments”

Chapter Seven “Differentiation and Brand Positioning”

This class expects you to contribute two times:

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

When entrepreneurs and companies use tools to work on market segmentation and target marketing, they essentially seek answers to the following questions raised in Chapter Six:

  • Why would market segmentation and target marketing make sense?
  • Why not sell the same products or services to everyone?
  • How can potentially attractive market segments be identified and defined?
  • How can segments be prioritized so that the most attractive ones are pursued?

So is this class.

We will undertake a similar process through your contribution one — answer one question only out of six questions below —

Question #1 How to define market segmentations (what are three steps used in the market segmentation process)?

Question #2 What is the Five-Step Process technique used by marketers to choose attractive market segments?

Question #3 One of the three common targeting strategies is “niche-market strategy”.  Explain this strategy and provide at least two examples.

Question #4 One of the three common targeting strategies is “mass-market strategy”.  Explain this strategy and provide at least two examples.

Question #5 One of the three common targeting strategies is “growth-market strategy”.  Explain this strategy and provide at least examples.

Question #6 What is the relationship between market segmentation, target marketing, and product positioning? What damage will be done to a company’s target marketing and positioning efforts if markets are incorrectly or not effectively or insightfully segmented?

.

You do not need to answer all six (6) questions above:

Question 1 needs student X1 to answer it (Question 1 must be listed first)

Question 2 needs student X2 to answer it (Question 2 must be listed first)

Question 3 needs student X3 to answer it (Question 3 must be listed first)

Question 4 needs student X4 to answer it (Question 4 must be listed first)

Question 5 needs student X5 to answer it (Question 5 must be listed first)

Question 6 needs student X6 to answer it (Question 6 must be listed first)

You will earn maximum 2 points from your completed contribution one, if —

  • your answer does not repeat to a same question that has already been answered by a classmate who did his/her work before you get here.
  • if you do not totally agree with a classmate’s contribution one, or you think there are some aspects missed out by that classmate, you could explain why you disagree or why some other aspects should be included in your contribution two.  
  • your answer is relevant to the question you selected to address.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Your contribution two — comment on one of your classmates’ posting about his/her contribution one.

You will earn maximum 2 points from your completed contribution two, if —

  • your comment starts with a classmate’s name – making it clear that his/her contribution one that you would like to critique on or discuss with.
  • your comment has minimum 100 words.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Please

study chapters 6 to 7 thoroughly before you write up your response either for contribution one or contribution two.

review chapter 6 to 7 PowerPoint slides thoroughly (you can find them in “Files” at Canvas).

→ Unicheck before posting your contribution one and contribution two.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

easy and own words, discussion topic, one page only,

 

discussion deals with Operating systems and its vulnerabilities.  An  operating system is defined as the following:  A software that manages  the hardware and software of a system.  It also provides the User  Interface that allows humans to interact with the system. As much of the  information is either created and/or stored in the system, securing the  OS requires a thorough understanding of the Operating system and how to  secure it.  There are many different types of operating systems that  exist, either for desktops, routers, switches, servers, and mobile  devices.

In the previous week’s discussion, you identified and discussed a system and its vulnerabilities. 

  1. Based on the definition above, please identify the operating  system.  Provide recommendations on how you would secure and harden the  operating system to ensure it has been configured more securely.
  2. Based on the system and its operating system, please research the  vendor and its website to identify any hardening guides and documents  you may find.  You may also research other sources on the Internet for a  hardening guide.  Some of useful sites you may visit are the following: 
    • SANS Information Security (Links to an external site.)  – SANS is a valuable information Security resource.  SANS organization  has been recognized within the Information Security community as an  indispensable tool for all security needs.  The reading room serves as  the repository on thousands of white papers and documents regarding  information security.  It has templates on creating InfoSec policies and  guidelines on how to configure IT systems securely.
    • Best Practices and How To Articles (Links to an external site.)  – Here is a collection of Information Security policy documents, best  practices, and how to articles for Information Security.  It can be used  to help develop hardening documents.
    • National Vulnerability Database Repository (Links to an external site.)  – National Institute of Standards and Technology is a government agency  that is tasked with developing standards on all technology, from IT to  non-IT technology and things like standard weights and measure.  Many  regulations that drive Information Security reference NIST as a source  for standard methodologies used in the industry.
  3. Based on your research, please list and discuss any operating system  configuration that needs to be evaluated and hardened.  Please identify  the default setting and what it needs to be to ensure a higher level of  security.  You should also indicate the importance of the setting.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 7 Computer esentials

 Unit VII ScholarlyActivity Answer the following questions thoroughly, and submit in a document. Each answer must be at least 150 words in length. Cite your sources. 1. Describe seven database models, and give examples of each type. 2. Provide five examples of data you would store in a real, integer, text, logical, date, memo, and BLOB data field. 3. Using a real-world entity like a recipe file or collection of some sort that can be stored in a database, divide this information into fields and record types. Explain the steps you need to take to normalize the data. 4. Explain in your own words the differences between sorting and indexing. 5. Imagine that you must access a library card catalog using SQL. Write an SQL query that you would use to search for any books by J. J. Parsons in a table called Books, where author’s names are stored in a field called Title. 6. Explain the extent to which encryption, user privileges, and audits can secure a database. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. Information about accessing the grading rubric for this assignment is provided below 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Individual: Standard Operating Procedures

 

The CIO, of the company you chose in Week One, has asked you to create a PowerPoint®  informational presentation. The audience for this week’s presentation  will be the members of the executive staff, including the Vice  Presidents, CIO, and CEO.

The objectives of this presentation are to:

  • Identify at least five opportunities areas for management to improve company’s security plan.
  • Identify at least five opportunities for employees to contribute a positive effect on the company’s security plan.
  • Identify at least three opportunities for management to display  their support for the efforts of the IT Department in the pursuit of  safe computing for all employees.

Create an 8- to 10-slide PowerPoint® training presentation, including the following:

  • Content for each of the objectives
  • Speaker’s notes
  • References used to support your presentation, including a minimum of  two outside academic references in addition to course textbooks and  videos

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Polices :Case Study Analysis

Write a two to three page critical essay dealing with the following questions.

The Internet of Things (IoT) consists of about 8 billion devices worldwide, which are often targeted as the launching point for devastating cyber-attacks. If that fact were not troubling enough, a new paradigm of connectivity on the horizon will eclipse the IoT in size, complexity, and opportunity. The Internet of Everything (IoE) will connect people in more relevant and valuable ways, convert data into intelligence to make better decisions, and allow for delivery of the right information to the right person or machine at the right time by utilizing the physical devices and objects connected to the Internet and each other for intelligent decision making. In essence, the IoE will lead to decentralization of business and to distributed information capture, and will push security to the edge. Most of the approximately 50 billion devices will be consumer devices, managed by individuals with no specialized training in cybersecurity, and no advanced degrees in computer science. This trend will continue to have a major impact on information technology as we move to more ubiquitous technology. How has the distributed nature of IoT infrastructure changed networking fundamentals, such as network architecture, services, and transmissions?

Search the Internet to find an example of a hacking activity or situation that represents a morally, ethically, or criminally ambiguous situation that took advantage of this new technology phenomenon which demonstrates a failure of traditional network fundamental practices.

Write a critical essay that addresses the following items:

1.  Cite and briefly describe your example.

2.  Apply what you have learned from the course to this point to identify arguments both in support of and critical of the behavior of the attackers.

3.  Describe and explain the relationships among morality, ethics, law, and crime as they intersect in the case example you have found.

Discuss and cite at least two credible or scholarly sources other than the course textbook to support your analysis and positions. You may cite the course textbooks as well. Use APA style guidelines, citing references as appropriate. Your paper should be two to three pages in length.

Book:

Kizza, Joseph Migga. Computer network security and cyber ethics. McFarland, 2014.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now