Fixing Home Networks for Fun and Profit

1. Describe how you would fix the home network of your noisy neighbors.

Parameters: In 10 to 12 complete sentences, identify the CPU architecture, memory, and storage, and state why each item was selected. Please include a table indicating the cost of the items and their specifications.

Your next-door neighbors and their four kids play music at all hours of the night. When you knock on their door to complain, the mom explains that her kids play music when doing homework, but their network is so slow, the kids never finish. Knowing you’re taking classes in CIS, they ask you to help them get some sleep by speeding up their computers and network. Based on the following description, make a list of recommended upgrades you would perform. Make sure to recommend specific devices and describe how they will resolve the problem. Assume they do not trust wireless technology, so please do not base your recommendations on a wireless infrastructure.

The family has the following devices:

  • ZyXEL cable modem DOCSIS 3.0 (CDA30360)
  • TP-Link AC1750 smart WIFI router
  • 3 x D-Link 8 port 10/100 unmanaged metal desktop switch (DES-108)
  • 1 x Xbox one slim
  • 6 x Roku magically wired to the network
  • QNAP for movies and music videos
  • Vonage home phone service HT802-VD VoIP device
  • 4 x Echo Mini
  • All devices are connected using CAT3 cable
  • 5 Mac Mini (2018) with SSDs and 8 GB of memory

Parameters: Given a $500 budget, generate a quote of recommended upgrades for their network. Each item should be accompanied by a three-to-four-sentence description of why it needs to be upgraded.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risk Assessment Tools Response

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

1. What software applications or “tools” would you use? 

The first tool in my kit would be Cacti. Cacti is a very well know network monitoring software. After searching the web this product was found in most articles concerning network monitoring. Monitoring the network is half the battle. The second half is interpreting and visualizing the information. Cacti provides the user to present that information on charts and graphs they can customize to their personal preference. To help mitigate risk I would also add Avast for online protection. This antivirus is excellent in protecting from viruses and malware. It also disperses information to users when new fixes for threats and vulnerabilities are found.

Windows would be the incorporated platform. Windows is the most universally used OS in the private and commercial sectors. Familiarity with the OS leads to less chance of human error, the toughest element to mitigate in a risk assessment plan.  

I would use AirMagnet for wireless network monitoring. It is a more proactive tool to use, which helps with identifying and combating threats. Total AV is a good antivirus I would user for the assessment. This product actively monitors and and some cases remove threats.

-ANDREW

RESPONSE 2:

What software applications or “toolkit” would you use?

Right off the bat I would start to look for the best vulnerability scanner. I chose this because before I start to do any deep digging I want to know where I should start. This will also help me determine the scope of my assessment. The software I would choose for this would be Network Configuration manager due since it automatically finds issues across your network.

What platform (Operating System) would you use?

As far as the operating system I would probably go with windows. Although I could probably do just fine on a Mac I think windows would work best for me. 

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment? You can list other types of related assessments if you know how you might adjust for the given scenario.

For an application assessment I would tailor my tools more toward applications and the rights they access within the computer. With a network assessment I would focus more on security of the network. 

-WINFRED

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study Phase 1

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

Please complete the scenario below following these guidelines for your deliverable.

Scenario: 

A) Create an introductory section where you clearly DEFINE RISK.

B) Research and Pick ONE organization that can you conduct a risk assessment on.

C) Identify the potential risks found in the organization and for it’s ability to function in it’s chosen business vertical (i.e. government, financial, commercial, industrial, shipping& logistics, etc.)

GUIDELINES:

Paper must be a minimum of 2 pages double spaced

Make sure you are using at least two (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Risk Assessment

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

Please complete the scenario below following these guidelines for your deliverable.

Attached is the chapter from the textbook for your reference.

Scenario: 

You have been hired as a consultant to secure all network devices for a large firm.

1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)

2. Detail the countermeasures (and tools) you would put in place.

*******(Note: You are not limited to following the steps/countermeasures described in your textbook. If there are additional steps you would take please list them and explain why you are taking them.)

GUIDELINES:

Paper must be a minimum of 2 pages double spaced

Make sure you are using at least two (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

The Request for Proposal (RFP)

 

nstructions

One of the critical stages of a project is planning. Through project management standards and practices, enterprises are conducting and executing information technology solutions implementations. Therefore, project management activities interact with the SDLC, extreme prototype software development, or infrastructure implementations. For this course, you will develop a project plan for an information systems development. This plan will be part of the formal request for proposal (RFP) document. You can work on your own document or use a template provided with the syllabus.

In this final project, you will research, analyze, propose, and design a comprehensive RFP for a complex IT solution or development. You can complete the project plan for the scenario or project worked in assignments for Weeks 1-4, or select a scenario to work on your information technology development, as part of the requirements and specifications document to be part of the RFP.

For this assignment, create a mock request for proposal (RFP) either for the scenario you worked on during Weeks 1-4, or for a selected IT application design project as suggested in Week 1. You can use your own document format, use templates published by the Project Management Docs portal supported by PMI, or follow the outline below. In this document, you will provide all the key items anticipated in the closing phase. Include each item using a heading to identify the item and brief sample content under the heading.

Project Plan Outline:

  1. Introduction
    1. Purpose of the project
    2. Executive summary
      1. Company at-a-glance
      2. Project at-a-glance
      3. Business mission, vision, goals, and objectives
    3. Project approach
  2. Project Scope
    1. Scope description
    2. Key milestones and deliverables
    3. Assumptions and constraints
  3. Overview of Applications and Functions
    1. Description of current operations
    2. Inventory of current databases and applications
  4. Project Requirements
    1. Functional Requirements
    2. Technical Requirements
      1. Network Infrastructure
      2. Hardware Requirements
  5. Schedule
    1. Timetable
    2. Major deliverables

When selecting your project topic, make sure it is not too small or too complex (remember time constraints—this course lasts eight weeks), and avoid choosing an area where you have little or no knowledge. The project should not identify a specific organization or sensitive data; therefore, if you are working with a known scenario, all names, locations, and operations indicators must be protected.

Some sample topic selections are:

  1. Client Technology Tracking System
  2. Employee Self-Service Systems
  3. Network Design Proposal for Casino
  4. Small Business Network Design
  5. Small Network for a Physician’s Office
  6. Network Security Policy Implementation for a University Campus
  7. Home Wireless Network Design
  8. Campus Secure Virtual Lab

Length: 10-15 pages not including the cover page.

This document will not follow the APA format, but any content must be properly cited and references presented at the end of the document, if applicable.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 3: Risk Mitigation Plan

Project Part 3: Risk Mitigation Plan 

Senior management at Health Network  allocated funds to support a risk mitigation plan. They have requested  that the risk manager and team create a plan in response to the  deliverables produced within earlier phases of the project. The risk mitigation plan should address  the identified threats described in the scenario for this project, as  well as any new threats that may have been discovered during the risk  assessment. You have been assigned to develop a draft of this new plan. 

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

intelligence

What are problems and challenges of sentiment analysis in present time ?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Phishing

Need below 3-word documents on “Phishing”.

1.  A short paragraph describing “Phishing” and how you intend to research it?

2.  A brief abstract(100 words) describing “Phishing”. 

3. A  500-700 words, double spaced, written in APA format, showing sources and a bibliography

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

analyzing and visualizing data midterm

 Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a two-page document answering all of the questions above.  Be sure to show the visualization first and then thoroughly answer the above questions. Ensure that there are at least two-peer reviewed sources utilized this week to support your work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

GDSS Discussion

 Explain how GDSS can increase some benefits of collaboration and decision-making in groups and eliminate or reduce some losses. 

Please respond in 250 -300 words in APA format and include the references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now