compare/contrast network topologies DUE 4/29

 

A network topology is the shape, or pattern, of the way nodes on the network are connected to each other.

Please respond to the following in a post of 150 – 200 words:

  • Compare/contrast the basic network topologies: point-to-point, bus, ring, star, and mesh.
  • Select an industry and recommend which network topology best supports this industry’s business needs.
    • Support your rationale with examples.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LAB 4 Creating a Security Policy Framework

Part 1: Research Separation of Duties Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on separation of duties policies in order to form a basis for their purpose and usage. Understanding the reason behind a SoD policy is key to understanding the component policies and procedures. Please take time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing separation of duties policies.

Lu, J., Li, R., Lu, Z., & Jin, Y. (2009, December 31). Dynamic Enforcement of Separation-of-Duty Policies. Paper presented at the International Conference on Multimedia Information Networking and Security. http://dx.doi.org/10.1109/MINES.2009.102

2. Write a brief summary of the article. In your summary, focus on the need for a Separation of Duties policy and its key elements.                                                                                                    

Part 2: Create a Separation of Duties Policy (0/6 completed)Note: In Part 1 of this lab, you learned about the motivating factors that inform a separation of duties policy. In this part of the lab, you will create your own separation of duties policy for a given scenario. As you prepare your policy, remember that no one individual or team should have too much authority or power to perform a function in a business or organization and that understanding where responsibilities begin and end is critical to effective separation of duties. However, just because one individual or team has decidedly too much authority or power does not necessarily mean that management should apply separation of duties to mitigate the risk given that truly separated duties often means additional labor and/or costs. Instead, management might decide to accept the risk or address the risk by other means.

1. Review the following scenario for the fictional Bankwise Credit Union:

  • The organization is a local credit union that has multiple branches and locations throughout the region.
  • Online banking and use of the internet are the bank’s strengths, given its limited human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
  • The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems security.

2. Create a security management policy with defined separation of duties for the Bankwise Credit Union.

Bankwise Credit Union

Separation of Duties Policy

Policy Statement
(Define your policy verbiage.)

Purpose/Objectives
(Define the policy’s purpose as well as its objectives.)

Scope
(Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?)

Standards
(Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards.)

 Procedures
(Explain how you intend to implement this policy for the entire organization.)

Guidelines
(Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.)

Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

For this portion of the lab, you will complete additional research of a case study in separation of duties and provide your own overview of the problem and solution. 

Locate and read the following research article:

Ballesteros, S., Pan, L., Batten, L., & Li, G. (2015). Segregation-of-Duties Conflicts in the Insider Threat Landscape: An Overview and Case Study. Paper presented at the Second International Conference on Education Reform and Modern Management. https://doi.org/10.2991/ermm-15.2015.96

Discuss how a separation of duties policy would help to resolve the issues at Bankwise Credit Union, as discussed in this case study. Assume your audience is the CEO and Board of Bankwise Credit Union.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LAB 3 Developing a Security Policy Framework Implementation Plan

Part 1: Research Security Policy Frameworks (0/2 completed)

Note: In this part of the lab, you will review internet resources on security policy frameworks in order to form a basis for their purpose and usage. Understanding the reason behind a security policy framework is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts behind the framework itself.

1. In your browser, navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331.

2. Read Sections 1-5 of the SANS Policy Development Guide.

3. Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.

Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often.

Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high level, but they answer the “what” questions. Finally, the procedures and guidelines provide the “how.”

Examples of security policy and guideline templates are available from the SANS Institute at https://www.sans.org/information-security-policy/.

In the next steps, you will learn about COBIT 2019, a popular industry-standard policy framework.

4.  In your browser, navigate to https://www.cio.com/article/3243684/what-is-cobit-a-framework-for-alignment-and-governance.html.

5. Describe the core principles and objectives of COBIT 2019.

Part 2: Define a Security Policy Framework (0/2 completed)

Note: Understanding both unique and universal risks to your organization’s IT infrastructure is essential to developing an appropriate IT security policy framework for your organization. In this part of the lab, you will review a list of risk, threats, and vulnerabilities and define appropriate policies to mitigate them. Next, you will organize your policies into a policy framework.

1. Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.

  • Unauthorized access from public Internet
  • Hacker penetrates IT infrastructure
  • Communication circuit outages
  • Workstation operating system (OS) has a known software vulnerability
  • Unauthorized access to organization-owned data
  • Denial of service attack on organization’s e-mail
  • Remote communications from home office
  • Workstation browser has software vulnerability
  • Weak ingress/egress traffic-filtering degrades performance
  • Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
  • User destroys data in application, deletes all files, and gains access to internal network
  • Fire destroys primary data center
  • Intraoffice employee romance gone bad
  • Loss of production data
  • Need to prevent rogue users from unauthorized WLAN access
  • LAN server OS has a known software vulnerability
  • User downloads an unknown e-mail attachment
  • Service provider has a major network outage
  • User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
  • Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

2. For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.

Security Policies

  • Acceptable Use Policy
  • Access Control Policy
  • Business Continuity—Business Impact Analysis (BIA) Policy
  • Business Continuity and Disaster Recovery Policy
  • Data Classification Standard and Encryption Policy
  • Internet Ingress/Egress Traffic Policy
  • Mandated Security Awareness Training Policy
  • Production Data Backup Policy
  • Remote Access Policy
  • Vulnerability Management and Vulnerability Window Policy
  • Wide Area Network (WAN) Service Availability Policy

3. Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.

Challenge Exercise (0/2 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

A user at Digital Innovation Products has been using company network resources to download torrent files onto a USB drive and transfer those files to their home computer. IT tracked down the torrent traffic during a recent network audit. Unfortunately, the company does not have a current policy that restricts this type of activity.

Identify at least two appropriate policies that should be in place to define this type of behavior and the consequences thereof.

Write a brief overview for C-level executives explaining which policies should be added to the company’s overall security policy framework, why they should be added, and how those policies could protect the company.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lab 1: Creating an Acceptable Use Policy

Part 1: Research Acceptable Use Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on AUPs in order to form a basis for their purpose and usage. Understanding the reason for developing an AUP is key to understanding its component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing AUPs:

Cramer, M., & Hayes, G. R. (2010). Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing, 9(3), 37–44. https://doi.org/10.1109/MPRV.2010.42

Note: If you are unable to locate or access this research, find a similar scholarly, peer-reviewed article and provide a citation in your response.

2. Write a brief summary of the article. In your summary, focus on the need for an AUP and its key elements.

Part 2: Design an Acceptable Use Policy (0/1 completed)

Note: In this part of the lab, you will use what you learned from your research to design your own acceptable use policy.

  1. Review the example of an AUP on the SANS site: https://www.sans.org/reading-room/whitepapers/policyissues/acceptable-policy-document-369.

Note: While you evaluate the document, notice the following items:

  • The policy mentions positions rather than specific names.
  • The policy provides an overview of the topic but does not provide specifics on how a task will be completed. This point is the difference between a policy and a procedure.
  • The policy provides references to other policies or resources that were used to create it.

Keep this example in mind as you prepare for the next steps.

2. Consider the following fictional organization, which needs an acceptable use policy (AUP):

 

  • The organization is a local credit union with several branches and locations throughout the region.
  • A major focus for the organization is online banking.
  • The organization’s most critical business function is its customer service department.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.

Note: The best style for writing IT policy is straightforward and easy to understand. Avoid unnecessary wording and phrasing that could be understood more than one way. Write in concise, direct language.

3. Design an AUP for this fictional credit union, using the online example of the AUP as a template. Your policy does not need to be exhaustive, but it should outline the key components of an AUP and provide policy statements that address the above requirements. You may want to create your policy using word processing software on your local computer and then copy and paste the text into the deliverable field.

Challenge Exercise (0/3 completed)Note: The following exercise is provided to allow independent, unguided work using the skills you learned earlier in this lab – similar to what you would encounter in a real-world situation.

For this portion of the lab, you will utilize the AUP that you designed in Part 2. This exercise is designed to challenge your creativity by not providing industry guidelines or clues as provided in Part 2.

Select an industry other than banking. For example, you could choose manufacturing, higher education, or utilities.

Create a list of unique attributes of the business in your chosen industry.

Instead of creating an AUP, write a formal letter to the company’s CEO and board to explain the need for an AUP and your suggestions on the content of that policy.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 3: Client Presentation

 

Your final project will be to design a training presentation to the client’s IT staff. 

If you haven’t already done it last week,:

The presentation must meet the following requirements:

  • 11 to 15 slides of writing-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
  • voice annotation for every slide (excluding the reference slide)
  • at least two references

The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.

The presentation should address your recommendations for the following items:

  • Version Summary
    • Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
  • Installation Methods
    • Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
  • Security Features
    • Windows Security, BitLocker, Defender, Local Security Policy
  • Backup and Recovery Overview
    • Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
      • the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
      • the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
      • the ability to restore system files and settings without affecting the user’s personal files and data.
      • the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
  • Backup and Recovery Tools
    • You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
  • Backup to Recover from Ransomware Attack
    • Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
  • Backup and Recover a Restore Point
    • Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ppt

 

Scenario: Your instructor has asked you to present information about  core programming concepts and the idea behind computer algorithms to the  class.

Create a PowerPoint presentation that describes the following core  concepts for computer programming. Provide an example for each concept.  (Hint: You can use examples from your readings/labs.)

  1. Numbers and data representations for computers
  2. Data types
  3. Variables
  4. Decisions/selection
  5. Repetition/iteration
  6. Data structures
  7. An algorithm

 

  • Contain at least seven content slides.
  • Include the transcript of your presentation in the notes section for the given slide.
  • Cite references in APA format within the presentation where applicable. Consult the Writing Center’s APA Style resources as needed. For additional APA citation and formatting help, refer to the Academic Tools area of this course.
  • Include a title slide and a final reference slide.

No plagiarism

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Monitoring Program

For your development project, you will imagine you are in charge of managing a zoo’s computer infrastructure. There are many aspects of a zoo that need to be in place to keep it running. One of those aspects are monitoring animal activities in exhibits. This option requires at least two classes and for the design to be broken into multiple methods. 

This project represents an authentic demonstration of competency because it involves application of real-world Java programming. 

In this assignment, you will demonstrate your mastery of the following course outcomes:

 Implement appropriate variables, operators, methods, and classes as they are used in object-oriented programming for developing successful programs

 Utilize appropriate syntax and conventions in terms of their best practice and use in programming

 Debug coding errors by testing existing code, identifying errors, and correcting errors for improved functionality

 Assemble basic, working programs that effectively integrate essential elements of object-oriented programming

Monitoring System

As a zookeeper, it is important to know the activities of the animals in your care and to monitor their living habitats. Create a monitoring system that does all of the following:

 Asks a user if they want to monitor an animal, monitor a habitat, or exit

 Displays a list of animal/habitat options (based on the previous selection) as read from either the animals or habitats file

o Asks the user to enter one of the options

 Displays the monitoring information by finding the appropriate section in the file

 Separates sections by the category and selection (such as “Animal – Lion” or “Habitat – Penguin”)

 Uses a dialog box to alert the zookeeper if the monitor detects something out of the normal range (These will be denoted in the files by a new line starting with *****. Do not display the asterisks in the dialog.)

 Allows a user to return to the original options

Specifically, the following critical elements must be addressed:

I. Process Documentation: Create process documentation to accompany your program that addresses all of the following elements:

A. Problem Statement/Scenario: Identify the program you plan to develop and analyze the scenario to determine necessary consideration for building your program.

B. Overall Process: Provide a short narrative that shows your progression from problem statement to breakdown to implementation strategies. In other words, describe the process you took to work from problem statement (your starting point) to the final product. Your process description should align to your end resulting program and include sufficient detail to show the step-by-step progress from your problem statement analysis.

C. Pseudocode: Break down the problem statement into programming terms through creation of pseudocode. The pseudocode should demonstrate your breakdown of the program from the problem statement into programming terms. Explain whether the pseudocode differs from the submitted program and document any differences and the reason for changes.

D. Methods and Classes: Your pseudocode reflects distinct methods and classes that will be called within the final program. If the pseudocode differs from the submitted program, document the differences and reason for changes.

E. Error Documentation: Accurately document major errors that you encountered while developing your program.

F. Solution Documentation: Document how you solved the errors and what you learned from them.

II. Program: Your working program should include all of the specified requirements. The comments within your program will count toward the assessment of the documentation aspects of your submission.

A. Functionality

1. Input/Output: Your program reads input from the user and uses system output.

2. Control Structures: Your program utilizes appropriate control structures for program logic.

3. Libraries: Your program utilizes standard libraries to pull in predefined functionality.

4. Classes Breakdown: Your program is broken down into at least two appropriate classes.

5. Methods: Your program utilizes all included methods correctly within the classes.

6. Error Free: Your program has been debugged to minimize errors in the final product. (Your program will be run to determine functionality.)

B. Best Practices: These best practices should be evident within your working program and process documentation.

1. Formatting Best Practices: Provide program code that is easy to read and follows formatting best practices as defined by the industry, such as with indentation.

2. Documentation Best Practices: Include comments where needed within the program in appropriate detail for communicating purpose, function, and necessary information to other information technology (IT) professionals.

3. Coding Best Practices: Ensure your program supports clean code through descriptive variable names.

Guidelines for Submission: Your process documentation should be approximately 2 to 4 pages double-spaced and in 12-point Times New Roman font. Any resource citations should adhere to the most current guidelines for APA formatting. You will submit the code for your working program in a separate file from your process documentation, though the two will be graded together by your instructor. Submit all files as a ZIP file to Blackboard for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Branching in C#

 

The Software Development Company now requests you enhance the C# console program to display additional data items for all the software developers’ displays: 

For this week’s assignment, build on the Week Two Individual Assignment, “Adding Variables,” by asking the user to enter the names, ZIP Codes, and monthly gross pay of three software developers. The program should display on the console the software developer name, ZIP Code, monthly gross pay, and taxes paid for that month. Taxes are set at 7% of the monthly gross pay. The program should also display the annual gross pay and annual taxes of all three software developers. 

Using Visual Studio® and C# programming concepts, write a program to meet the specifications of the company’s request. The program should have the following characteristics:

  • Compile and Execute without errors
  • Meets specifications by displaying on the console a welcome message along with the following information on all three software developers:
    • Software developer name
    • ZIP Code
    • Gross monthly pay
    • Monthly Taxes
    • Annual gross pay
    • Annual taxes
  • Logic flow is clear, concise, and effective
  • User inputs and outputs should be clear on screen
  • The program code should laid out with appropriate indentation to show program structureIdentifiers logically describe use
  • Naming conventions are consistent
  • Comments and headers to explain processing that is not obvious

Constraints for assignments in this course: Collect all data and store it as the user enters it. When all the data is collected, display the data and any calculated data on the console. Data displayed on the console must be correctly labelled so that the user will be able to understand what it means. After all data has been displayed, the program will prompt the user to press ENTER to continue, and will allow the program to finish (and the console to close), only after the user has pressed the key to dismiss the program.

Zip your Visual Studio® solution project folder so it can be submitted for grading. In Visual Studio®, you can locate the folder with your solution by left clicking on the solution node in the Solution Explorer. Look at the Properties window to find the folder name in the Path property. Locate this folder in File Explorer and zip the folder. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 1: Statement of Work (SOW) Assignment

 Project topic ( Linux Database File System)

Prepare and submit a 1-2-page statement of work (SOW) to describe the need to create, design and implement the database that you are proposing for your project.  

Please Please follow requirements on attachment!!!! 

Attached is also a sample of  SOW.

This will be part one of four parts to this project. 

Ask questions if you need clarity! 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organization Leadership and Decision Making

  

Nationstate Insurance Case Study

Read the Nationstate Case Study on pages 160-164 in the textbook. Expalnation and Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format.

1 ,List and describe all of the potential benefits (and costs) that Nationstate would realize from the establishment of an enterprise wide architecture as envisioned by Jane Denton?

2,  Build a business case for Seamus O’Malley to present to the senior management team at Nationstate to get their buy-in. In addition to benefits and costs, the business case must answer the “what’s in it for me” question that the BU 3presidents all have.

 Seamus O’Malley is rightfully worried about governance (i.e., making sure that the enterprise architectural standards are adopted by all Bus).  Both he and Jane are wary of forced compliance because such measures lead to “architecture police.”  What governance procedures could they put in place that would win “hearts and minds”; that is, BU architects would comply with the enterprise architecture standards because they believe in them – not because they are forced to comply with them? 

Reference

McKeen, J., & Smith, H. (2012). IT Strategy: Issues and Practices. Boston: Prentice Hall.

Use other refences other

4 pages

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now