Demonstrating the Gap

Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network.

Using Microsoft Visio or another online network diagramming tool, diagram the network that was analyzed in the Topic 1 “Quantify the System” assignment.

Then, create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.

Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.

Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

APA style is not required, but solid academic writing is expected.

Refer to “Demonstrating the Gap Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

ALSO  PLEASE READ INSTRUCTOR ASSIGNMENT TIP

Hi Class, the link below can help you with week 4 assignment. The link is not an endorsement or affiliated in any way to GCU. However, you are welcome to use whatever application or site that will produce the end results for what is being asked.

https://creately.com/

Also, I don’t except to see 50-100 servers on your diagram. However, your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

This is an assignment that many students forget to label or include what is required. That said, I want everyone to do their best and get the best possible grade.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Resource Management

Project Resource Management

Several people working on the Recreation and Wellness Intranet Project are confused about their responsibilities for the testing portion of the project. Recall that the team members include you, a programmer/analyst and aspiring project manager; Patrick, a network specialist; Nancy, a business analyst; and Bonnie, another programmer/analyst. Tony Prince is the project manager, and he has been working closely with managers in other departments to make sure everyone knows what’s going on with the project.

1.    Prepare a responsibility assignment matrix based on the following information: The main tasks for testing include writing a test plan, unit testing, integration testing for each of the main system modules (registration, tracking, and incentives), system testing, and user acceptance testing. In addition to the project team members, a team of user representatives is available to help with testing, and Tony has also hired an outside consulting firm to help as needed. Prepare a RACI chart to help clarify roles and responsibilities for these testing tasks. Document key assumptions you make in preparing the chart.

2.    The employees of the outside consulting firm and the user representatives have asked you to create a resource histogram to show how many people you think the project will need for testing, and to show when testing will occur. Assume that the consulting firm has junior and senior testers and that the user group has workers and managers. You estimate that you’ll need the involvement of both groups in testing over a period of six weeks. Assume that you’ll need one senior tester for all six weeks, two junior testers for the last four weeks, two user-group workers for the first week, four user-group workers for the last three weeks, and two user-group managers for the last two weeks. Create a resource histogram like the one in Figure 9-6(SEE ATTACHED) based on this information.

3.    One of the issues Tony identified is the ability to work effectively with the user group during testing. According to MBTI classifications, Tony knows that several of his project team members are very introverted and strong thinking types, while several members of the user group are very extroverted and strong feeling types. Write a one-page paper that describes options for resolving this issue, focusing on using a confrontation/problem-solving approach.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework 3

 Review the article by Hemmatian (2019), on classification techniques. In essay format answer the following questions:

  1. What were the results of the study?
  2. Note what opinion mining is and how it’s used in information retrieval.
  3. Discuss the various concepts and techniques of opinion mining and the importance to transforming an organizations NLP framework.

In an APA7 formatted essay answer all questions above.  There should be headings to each of the questions above as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page). 

Text-

 

  1. Read: Hemmatian, H. (2019). A survey on classification techniques for opinion mining and sentiment analysis. Artificial Intelligence Review52(3), 1495–1545.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Creative, Critical, and Analytical Thinking

 

Unit 6 DB: Creative, Critical, and Analytical Thinking

Unit 6 DB: Creative, Critical, and Analytical ThinkingAfter reviewing this week’s Readings and Resources, be prepared to discuss the following questions:

  • In what ways could creative, critical, and analytical thinking help you to be a better student and employee?
  • Think of a routine task (studying, exam preparation, downtime, grocery shopping, food preparation, etc.) in your life that you may have never questioned. How can this routine be improved? How would this benefit you?
  • How can creative thinking help you in your career?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Best Practices for Obtaining Evidence from an ISP

 Best Practices for Obtaining Evidence from an ISP
Learning Objectives and Outcomes

  • Identify best practices for obtaining evidence for a digital forensic investigation from an Internet service provider (ISP).

Assignment Requirements
You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been asked to assist in an investigation of a possible cybercrime involving theft of intellectual property. The information will need to be obtained from an Internet service provider (ISP) while complying with any applicable laws and regulations. Your manager wants to update staff on details about best practices for working with ISPs and obtaining electronic evidence.Your manager has asked you to find a resource on the web that contains information useful to this investigation and write a report about the resource.For this assignment:

  1. Research the Internet for information on working with an ISP to legally obtains electronic evidence in a digital forensic investigation.
  2. Write a report that describes best practices for obtaining electronic evidence from an ISP.

Required Resources

  • Course textbook
  • Internet access

Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I selected researched the Internet for information on working with an ISP to legally obtain electronic evidence in a digital forensic investigation.
  • I wrote a report that describes best practices for obtaining electronic evidence from an ISP.
  • I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Model Draft

 Create a database model according to the following steps: 

  • Create a simple class diagram containing three classes: Vehicle, Car, and Truck. Provide two attributes for each of these three classes.
    • Create a rough sketch of a relational table that will store the objects belonging to the aforementioned three classes.
    • Ensure you have tried all three options—single table, two tables, and three tables—in your database design.
    • Enter two objects per table, corresponding to the classes.
  • Use the two-table design to recreate a Car object.
  • Repeat the preceding step to recreate a Truck object.
  • Create a simple association relationship in a separate class diagram showing Driver and Car.
    • Apply a multiplicity of 1 on the driver side and N on the Car side.
  • Add/modify your table designs to handle storing of two objects belonging to Car and two belonging to Driver.
    • Modify the multiplicity on the Driver side to N. This makes it a many-to-many multiplicity.
  • Modify your table designs to handle this multiplicity and show where and how the KEYS or IDs will have to be placed.
  • Create a class diagram corresponding to the tables you have designed. Stereotype all classes on that class diagram as <<table>>.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

case study assignment

 In this case study assignment, you will perform a quantitative risk analysis for a company’s network. Please use your imagination and feel free to specify any vulnerabilities and threats while completing the steps of this case study. 

 

  1. Download and read the Case Study: Information Security Risk Assessment Word document.
  2. Download the Case Study Information Security Risk Assessment Answer Sheet.
  3. Type all of your answers into the answer sheet.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Review on Energy Resilience

I need a Review for the above topic. 

Basically State of art in energy infrastructure resilience and remaining sections which present in the attached document.

I have all the docs from which these can be picked and also an outline document and subtopics which need to be touched upon.

Attaching the docs from which state of the art to be picked, also another word document mentioning the outline(Literature Review-outline)

Literature Review-outline to kept as base file and to be worked on.

Thanks and Regards

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study – Improving Business-to-Business Sales Using Machine Learning Algorithms

Case Summary: Champo Carpets is one of the largest carpet manufacturing companies based in India, with customers across the world, including some of the most reputed stores and catalog companies. Champo Carpets is based out of Bhadohi, Uttar Pradesh, which is one of the most famous clusters of carpet weaving in India. This cluster is spread over 1,000 sq. km and comprises many villages and districts in and around it. The company is a vertically integrated manufacturer and exporter of carpets and floor coverings, with more than 52 years of existence. At the beginning of 2020, the company employed 1,500 people with a capacity to produce 200,000 pieces of carpets and floor coverings per month. As part of sales and marketing, Champo Carpets shared sample designs with its potential customers, based on which the customer placed an order. The sample design selection was done in various ways and the process itself is costly and elaborate. To capture industry trends, a team of the company visited various trade shows and events and sent samples to the client as per the latest fiber and color trends. However, their sample-to-order conversion ratio was low compared to the industry average. This had cost repercussions as well as lost opportunities. The company identified the cause as inaccurate targeting of products to their customers. It subsequently implemented an enterprise resource planning (ERP) application and has been capturing data at every point of production as well as sales. They believe this accumulated data can help target their products accurately to the right clients and design an appropriate recommender system.

Learning Objectives The primary objective of the case is to illustrate how machine learning algorithms can be used to manage business-to-business (B2B) sales. The learning objectives include the following:

Access attached the full case or article. After a critical review of the case, respond to the questions below.

For a better understanding of the issues related to the problem, knowledge of data visualization using Tableau, R, or Python programming will be useful.
1. With the help of data visualization, provide key insights using exploratory data analysis.
2. What kind of analytics and machine learning algorithms can be used by Champo Carpets to solve their problems and in general, for value creation?
3. Develop ML models to help identify features that contribute toward conversion (or non-conversion) of samples sent to customers.
4. Discuss the data strategy for building customer segmentation using clustering. What are the benefits Champo Carpets can expect from clustering?
5. Discuss clustering algorithms that can be used for segmenting Champo Carpets’ customers.6. Develop customer segmentation using K-means clustering. Discuss the optimal number of clusters, significant variables, and cluster characteristics.
7. Discuss the data strategy that can be used for building recommender system models.
8. Develop an association rule mining algorithm, which can be used for recommendation.
9. Build collaborative filtering techniques for recommender systems.
10. What will be your final recommendations to Champo Carpets?

Requirements:

  • Your analysis will be considered complete, if it addresses each of the 9 components and subcomponents outlined above.
  • Use of proper APA formatting and citations. Supporting evidence from outside resources should be used and those must be properly cited. 
  • Include your best critical thinking and analysis to arrive at your justification.
  • Approach the assignment from the perspective of the senior executive leadership of the company.

    Answer all questions thoroughly. Min 7-8 pages without reference page and main header page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer architecture Embedded systems

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 Question 3

Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system?  

Question 5

Is the microprocessor controlling a cell phone an embedded system?  

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer?  

Question 7

List and briefly define the possible states that define an instruction execution.  

Question 8

List and briefly define two approaches to dealing with multiple interrupts.  

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long.  (a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ?  (b) Repeat assuming that half of the operands and instructions are one byte long.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now