IT Infrastructure

 PART 1: Executive Summary of IT Infrastructure Assessing the current state of the business before starting the full project is a necessity when it comes to working with infrastructure. International Plastics, Inc., a  manufacturing company, hired you as a technology consultant to work with the company to review its resources and develop a plan for its infrastructure needs. Your first step is to become familiar with the company’s current documentation and provide a status update to the executives. Review the ZIP file for International Plastics, Inc. documentation. Write a 1 to 2-page executive summary of International Plastics’ business requirements for an upcoming discussion with the CEO. As a general guideline,  executive summaries are typically1 to 2 pages in length, at 12 pt. font, and single-spaced. Include the following information: • A high-level description of International Plastics’ current IT Infrastructure, including network, information systems, applications, mobile computing, data  management, business intelligence, and security • An overview of International Plastics’ operational environment • An explanation of how a new IT infrastructure will improve business performance • A chart listing at least three examples of technology hardware upgrades and how they will improve business performance PART 2: Identifying Current IT Standards and Protocols and Making Recommendations The International Plastics, Inc. CEO read your executive summary and would like more information. The CEO would like a detailed explanation of the IT standards,  protocols, and communication tools currently in use in the facilities to determine if improvements are needed. Review the existing International Plastics network diagrams located in the International Plastics, Inc. documents ZIP file. Assess the current telecommunications  protocols, standards, and collaboration tools used for International Plastics. Determine if improvements are needed, and if so, list your recommendation with how  the improvement will affect the standard or protocol (you will use this to prepare the required chart).Copyright 2021 by University of Phoenix. All rights reserved. Prepare a chart/table, using Microsoft® Word or Microsoft® Excel®, to document at least 6 current standards or protocols used at each location. Use the  following table headings: • Current Telecommunications Standard, Protocol, or Collaboration Tools • International Plastics Location • Recommendation for Improvement with anticipated effects of Improvement Decide on a recommendation that will have the most beneficial impact to the company. • Write a 1-page explanation on how you made the decision to move forward with this recommendation. What are the advantages and disadvantages of this  recommendation? Submit your PART 1: Executive Summary of IT Infrastructure and your PART 2: Identifying Current IT Standards and Protocols and Making Recommendations. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer and Information Networking

  Please answer these questions : (No plagiarism )

1. Explain the layers of the OSI, TCP/IP, and the Internet models in detail, and elaborate on their similarities and differences.

2. Explain the concept of Capsulation/De-capsulation.

3. Explain TCP and UDP, their differences, and their applications. Which one is better and why?

4. Explain in detail the hub, active hub, switch, and routers, and their purposes, similarities, or differences.

5. List and explain guided and unguided mediums and give a couple of examples of each.

6. Explain the difference between wire and fiber optic and list the advantages and disadvantages of each one in detail. 

7. Assume that you have a wired network. Explain how you would covert this system to a fiber optic system.

8. A RF amplifier has a power gain of 30 dB. How many times does this amplifier amplify the incoming signal? Show your calculations step-by-step.

9. Explain how analog signals are converted into digital.

10. Explain how wireless networks work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Iphone Discussion

 The first iPhone was revealed at the Mac World conference in early January 2007, and later released in June of that year. Initially, third-party native applications were not allowed. Apple products have created a unique brand value within society.  Their products do not support third party applications, thus providing additional layers of security from social engineering and malware attacks.

  • How has the use of core ideas such as location and orientation-aware pushed iPhone beyond its web browser and tightly integrated web functionalities?
  • Why are Plists (property lists) the easiest way to store information on Macs?
  • Discuss the benefits of using Xcode for developing iOS apps.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software Devops Question

I need a software development engineer to help with this assignment. Details will be provided after finding the right person

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computing technology

Why is computing technology important?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project management

In project management, define a project and give examples

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CAPS

 

Similar to playbooks, runbooks are more specific to systems and networks and best defined as a tactical method of completing a task. They are a series of steps needed to complete some process for a known end goal. Examples include “Restarting the web services on frontend servers” to “Deploying the newest build of staging application.” 

Runbooks can define the exact steps to make that action repeatable and usable as a programmatic approach to problem-solving. A well-written runbook not only lowers the difficulty of execution and ensures repeatability but also has the end goal of automating the action, making the runbook itself no longer necessary. 

The board of directors found your presentation on playbooks very informative and has asked you to create another presentation on runbooks that would be utilized as part of the incident response plan for the following 3 attacks: 

  • Credential Compromise 
  • Code Injection in Website 
  • DDoS Attack 

To complete this, you should create a 12 -slide presentation with speaker notes and media such as images, video, or tables that will be presented to the board of directors. Specifically, your presentation should do the following:  

  • Explain the importance of using runbooks to risk management. 
  • Summarize the risks of the 3 threats listed above and the recommendation of the remediation plan presented in the labs associated with SQL Injection, Website Compromise, and Exploitation of Windows 7 Workstations.
  • Summarize incident response plans for each of the 3 attack scenarios listed above.
  • Justify NIST implementation, including an explanation of why it is the best option rather than another quicker and easier process.
  • Identify additional tools and systems that might reduce or mitigate the risk of the 3 identified threats.  
  • Assess potential violations to user privacy from these attacks as well as the implications from going through the steps in the runbooks. 
  • Assess ethical implications of these attacks. 
  • Recommend ethical and privacy standards as they relate to any of the steps or tasks.

Include a title page, purpose statement for the presentation, and a reference slide.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 1

Answer the following questions:

Map the layers of the TCP/IP model to the OSI model

Each layer of OSI has a body/group that is responsible for the standards, please name them

Describe the progression through the OSI model of the following:

A web browser request and connection to www.cnn.com

An email being sent from Outlook on a Windows machine from your APUS email account to [email protected]

Submit these assignments as a single Word document

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security awareness

No training plan is in place for the company you chose, and many members of the upper management argue that there is no need to have one. However, your supervisor has asked you to research the compliance and/or audit standards that your organization must adhere to maintain these requirements and then write a proposal to address the training needed for the company.

Please review the following documents:

You are required to write a three to five (3-5) page proposal in which you recommend the need for security awareness training. In your proposal, be sure to:

  1. Identify compliance or audit standards that your organization must adhere to.
  2. Identify security awareness requirements for those standards.
  3. Identify training methods to meet those requirements (In house, contract or CBT).

Assumptions

  • You should assume that your company will have to accept credit cards as payments.
  • You should assume that no current awareness/training plans exist for your company.
  • You should assume that all offices and groups need training.

Notes on submission:

  • Use at least three (3) quality resources as references in this assignment. Wikipedia and similar Websites do not qualify as quality resources.
  • Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Future Trend

Why so much trend?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now