Risk and compliances

 As an IT analyst for Dominion Online, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing, and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure. Please respond to the following questions for Dominion Online1: Identify the Most Appropriate Guidelines for Managing Risks

2: Identify Potential Privacy Issues and Mitigation Measures

3:Create Risk Management Matrix to assess/analyze that risk and make recommendations for risk mitigation measures. Please use excel format to create Risk Management Matrix.

4: Please add references 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 10 Assignment – Designing a Secure Network

 

 

Introduction

In this three-part assignment, you will  apply the various concepts you have learned throughout this course to  the design of the single most secure network possible, capable of  supporting three IT services: e-mail, file transfer (centralized), and  VPN. After you have fully designed your  network, you will need to provide three data flow diagrams explaining  how your designed network handles three different transactions: 

  • The first datapath diagram should show an internal user sending an  e-mail with their corporate e-mail address to a user on the Yahoo  domain with an arbitrary address of [email protected].
  • The second datapath diagram should show a user initiating an FTP  session from inside your network to the arbitrary site of  ftp.netneering.com.
  • The third datapath diagram should show an externally located  employee initiating a VPN session to corporate, in order to access files  on the Windows desktop computer DT-Corp534-HellenS at work.

The specific course learning outcome associated with this assignment is: 

  • Recommend solutions, products, and technologies to meet business objectives.

Instructions

Part 1

Use Microsoft Visio or an open-source alternative to: 

  • Create a diagram showing the overall network you have designed,  from the user or endpoint device to the Internet cloud; following the  access, core, and distribution layer model; depicting at least  four-fifths of the necessary network components; and citing specific,  credible sources that support the design. Include the following, at a  minimum:     
    • An authentication server (Microsoft Active Directory).
    • Routers.
    • Switches and/or hubs.
    • Local users.
    • Remote users.
    • Workstations.
    • File share (CIFS).
    • Mail server.
    • Web servers (both internal and external).
    • Firewalls.
    • Internet cloud.
    • Web proxy.
    • E-mail proxy.
    • FTP server (for internal-to-external transport).
Part 2

Use Microsoft Visio or an open-source alternative to: 

  • Create a datapath diagram for the following e-mail transaction:     
    • A local (corporate) user, with the e-mail address  [email protected], sends an e-mail to a Yahoo recipient at  [email protected].       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
  • Create a datapath diagram for the following file transfer transaction:     
    • A local user, Jonny Hill, transfers a file, using FTP, through  the Internet to another company’s site (ftp.netneering.com). He has to  access the secure shell, using his active directory credentials, to  authenticate the FTP server (Linux running Redhat) on the DMZ. He needs  to transfer files from his desktop across the Internet to  ftp.netneering.com.       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
  • Create a datapath diagram for the following VPN transaction:     
    • A remote user, Hellen Stover, connects, via VPN, from home  through the Internet to her corporate desktop, DT-Corp534-HellenS.  Hellen uses a browser to initiate her VPN connection. By going to  https://VPNaccess.corp534.com, she arrives at a login page where she  needs to authenticate using her Active Directory credentials before the  VPN tunnel is built.       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
Part 3

Write a 6–10 page paper in which you: 

  • Explain the function and configuration of at least four-fifths of  all required network devices, citing specific, credible sources.     
    • Authentication server (Microsoft Active Directory).
    • Routers, switches, and/or hubs.
    • Local and remote users.
    • Workstations.
    • File share (CIFS).
    • Mail server.
    • Web servers (both internal and external).
    • Firewalls.
    • Internet cloud.
    • Web proxy.
    • E-mail proxy.
    • FTP server (for internal-to-external transport).
  • Explain how the overall network design protects the organization  from both inside and outside attacks, addressing all required network  design features and considerations and citing specific, credible sources  that support your assertions and conclusions. Address:     
    • Physical and virtual access.
    • Logging requirements.
    • Security policy.
    • Firewalls.
    • Proxy servers.
    • The VPN tunnel.
    • DMZ isolation.
    • User authentication.
    • Distribution of layer routers and switches.
  • Explain how your layered design compensates for possible device  failures or breaches in network security, addressing all key design  features and considerations and citing specific, credible sources that  support your assertions and conclusions. Include:     
    • Load balancing.
    • Swappable devices.
    • Standby backup devices.
    • QoS prioritization.
    • Vendor support for core and services.
  • Explain how to make the file transfer process more secure, fully  addressing FTP security risks and how specific FTP replacement devices  add protection, clearly delineating the features of each device, and  citing specific, credible sources that support one’s assertions and  conclusions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Artificial Neural network and Deep learning

Chapter 5

Discussion Question 1: What is an artificial neural network and for what type of problem can it be used for?

Discussion Question 2: Compare artificial and biological neural networks. What aspect of biological networks are not mimicked by artificial ones? What aspects are similar?

Discussion Question 3: What are the most common ANN architectures? For what types of problem can they be used?

Discussion Question 4: ANN can be used be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

Exercise 6: Go to Google Scholar (scholar.google.com) Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet Exercise 7: Go to http://www.neuroshell.com/examples.html. Look at USG Corporation example. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Chapter 6 

Discussion Question 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

Discussion Question 2: List and briefly explain different learning paradigms/methods of AI.

Discussion Question 3: What is representation learning, and how does it relate to machine learning and deep learning?

Discussion Question 4: List and briefly describe the most commonly used ANN activation functions.

Discussion Question 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy! cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to resolve complex real-world problems. Summarize your findings in a professional organized report.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

response database concepts integrity

refer to the attached documents with two posts please create a two responses for it and please attach references for each post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

500 words

Video Review,

Please follow below link

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

critical elements of Computer Software Security

Discuss the critical elements of Computer Software Security in a 1 to 2 page APA format paper. References must not be more than 5 years old and no more than one entity source and no more than one N.D source.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Gap in Literature

Healthcare cyber-attacks and their mitigation techniques in Industry 4.0 is the topic selected. Advanced threats and attacks have developed by cyber criminals unaware of healthcare professionals. I want to address the latest threats and mitigation strategies that help healthcare organizations and patients secure their information. Cybercriminals believe the healthcare industry is a soft target. Cybercriminals routinely target healthcare organizations. Healthcare industry vulnerabilities can be linked to various issues, including a lack of security awareness among care personnel, reliance on old unpatched systems that are no longer supported, a broad attack surface, and a lack of staffing resources. 
Qualitative and quantitative research methods address the problem by conducting interviews and an online survey with healthcare professionals. Factor Analysis Information Risk (FAIR) and Technology acceptance models (TAM) are utilized for this study. 
Humayun, M. (2021). Industry 4.0 and cyber security issues and challenges. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2957-2971.
Research questions
What are the most common types of social attacks against humans encountered by healthcare organizations?
What policies and governance adopted by healthcare organizations have resulted in enhanced resilience?
How does an organization perform a cybersecurity risk assessment to identify the role of humans in the loop for enhancing cybersecurity?
What is the role of the training program in enhancing healthcare professionals’ awareness of cyber threats, and how can we measure the impact of training and awareness activities adopted within an organization?
What have cyber defense strategies been proposed by national and international organizations to strengthen cyber resilience?
Findings: The research aims to synthesize the recent literature on human behavior-related security weaknesses that compromise the cyber defense strategy used by healthcare organizations.
====================================================
Professor Response:
Hi Student
Interesting topic but remember that your research question must fill a scholarly gap in the literature. Also, take care to proof read your APA Style works. Typo’s and grammar mistakes in this one as this is aproposal should be in the future tense. Glad to have you in the class,
Good progress on an interesting topic area and good progress on finding scholarly literature, but what is the scholarly gap in the literature. Identifying that gap will help narrow your look at an IT topic in healthcare. Remember too that proper APA Style is essential as you refine your scholarly writing skills needed in this scholarly writing effort. Example, your third paragraph first sentence “…attacks trick…” and use nouns rather than pronouns, ex. “it” HINT, again, the Purdue OWL is a great source of citation and grammar requirements for APA style seventh edition.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 3- Project HR & Stakeholder Mngt

What is the purpose of a Stakeholder Register and how is it used? How can a project manager incorporate this tool into controlling the project?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Regulatory Compliance for the Healthcare Sector

Explain healthcare-related information security regulatory compliance requirements.

Write HIPAA-related policies and procedures.

 it should follow APA Citation rules.Please proofread, spell, and grammar check your paper before  submission. This SyncSession paper should be 1-2 pages long, not including the title page and reference page. Please use Times New Roman,12points font. Please double -space the paper

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 3- Project Risk/ Quality Mngt

#1.  What are the benefits an organization can receive from the adoption of a risk management system?

  • Describe the risk management system application.
  • What roles do security and capacity play within the risk management process?
  • What is the purpose of a risk management system?
  • Describe the various risk management methodologies used for risk assessment and how they relate to a systematic approach.

Text

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now