Cloud Computing

 Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.

 Chapter 11 topics:

  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.

 Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.

 Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework

 Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Use your own words. Attach your WORD document here.(200 to 300 words and add references)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Project

Final Project Topic: “Digital Forensics and It’s Advantages and Disadvantages” 

A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography

Write: Abstract, Introduction, explanation, advantages, Disadvantages, conclusion and References. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework 1

How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust online? Will governments have to step in more? Will public confidence in the Internet decline to such a great extent that other infrastructures will become more popular? (300 words and References)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

excel help

Using the data from 3 tables:

•The team wants to know their % of Distribution by Item and for items not at 100% what stores they need to execute on.    

•Expected execution is that every Product is in every store.    

Can create pivot table or formulas. no manual data entries.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

os

  

explain the key advantages of a UNIX operating system as if you were explaining it to a high school student who is unfamiliar with computer-specific terminology.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Topic

 

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students.

Due Thursday

Respond to the following in a minimum of 175 words:

  • Most schools and businesses require some standard style of documentation for written reports. Discuss why that might be.
  • What disadvantages, if any, might there be to insisting that all reports conform to a certain style?

Due Monday

Reply to at least 2 of your classmates. Be constructive and professional in your responses.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Semester Project Company

 

This assignment continues your work towards your Semester Project. Now that you have seen what the Internet offers in the way of templates for security policies, you will need to provide a basic background for the organization and its network that you want to model your Security Policy for. This is typically step one for any professional developing such a document, but since this would most likely be the first time you’ve ever done this and there’s no existing organization to analyze, you need to start somewhere. So for this assignment, do the following:

– The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community.

P.s: a U.S. company is recommended for this assignment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project

 

  1. Final Project – This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.

Required Source Information and Tools

The following tools and resources are needed to complete this project:

  • A web browser and access to the Internet to perform research for the project
  • (Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft Visio

Learning Objectives and Outcomes

  • Apply core competencies learned throughout the course to a single project.
  • Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
  • Demonstrate logical reasoning and decision-making skills.

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.

Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.

You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. 

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Project Part 1: Network Design

Scenario – The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

  • Current infrastructure elements
  • A logical topology that separates the Accounting and Sales departments
  • Redundant communications
  • Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

  1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
  2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
  3. Include a high-level plan that ensures communications are available 24/7.
  4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
  5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
  6. Create a draft report detailing all information as supportive documentation.
  7. Cite sources, where appropriate.

Required Resources

  • Internet access
  • Course textbook

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I determined the best network design to ensure the security of internal access while retaining public website availability.
  • I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
  • I created a plan that ensures communications are available 24/7.
  • I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
  • I created a basic network diagram that illustrates the current network and enhancements.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 2: Firewall Selection and PlacementScenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

  1. Research and select firewalls for the Corporation Techs network.
  2. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.
  3. Address network, server, and workstation firewalls.
  4. Describe a plan for creating a DMZ, and explain how it makes the network more secure.
  5. Research network authentication and create a high-level plan for secure authentication to internal network resources.
  6. Create a draft report detailing all information as supportive documentation.
  7. Cite sources, where appropriate.

Required Resources

  • Internet access
  • Course textbook

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and selected firewalls.
  • I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.
  • I addressed network, server, and workstation firewalls.
  • I described a plan for creating a DMZ and explained how it makes the network more secure.
  • I created a high-level plan for secure authentication to internal network resources.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

  1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.
  2. Recommend any other forms of remote access that are relevant and describe how they would be used.
  3. Create a draft report detailing all information as supportive documentation.
  4. Cite sources, where appropriate.

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and recommended an appropriate VPN technology.
  • I described the VPN technology and explained why it is the best choice.
  • I recommended other forms of remote access that are relevant and described how they would be used.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 4: Final Network Design Report

Scenario

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks

For this part of the project, perform the following tasks:

  1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.
  2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.
  3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of final report: 10–16 pages, including executive summary and network diagram

Self-Assessment Checklist for Final Report

  • I developed a network design that meets the requirements.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I described technology recommendations, provided justification for those recommendations, and described methods to measure the success of each major network enhancement.
  • I included an executive summary and a final network diagram.
  • I included citations for all sources used in the report.
  • I followed the submission guidelines.

Additional Instructions

  • The papers must include exactly all four parts of the project. Make sure your submission includes ALL the deliverables as requested.
  • DO submit only the deliverables listed under Tasks.
  • DO NOT submit the information in the self-assessment checklist. That is just to make sure your paper is completed and includes all the requested information.
  • Make sure you adhere to the format, font, citation style, and length requirements, listed under Submission Requirements.

Please let me know if you can actually take this project seriously and do it

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

HR and Blockchain

1. What are Smart Contracts and how might they be applied in human resource management? 

500 words paper: Introduction, Question 1, Conclusion, References.

References

1. Druck, J. A. (2018, October). Smart Contracts are neither smart nor contracts. Discuss. Banking & Financial Services Policy Report, 37(10), 5-9.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now