Unit 4 Asignment

Instructions:

Assignment Overview – Alternate Processing Site Proposal

R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:

Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the assignment).

Determine who the company’s stakeholders are. You can adopt the role of an internal or external consultant for your perspective.

Using the results of your research, develop a technical proposal that best addresses the stakeholder’s requirements and incorporates innovative technologies in the recommendation.

Within your proposal you must also consider cost and what R&D Media, LLC can afford.

Develop and document the requirements for R&D Media, LLC’s alternate processing site building upon the concepts addressed in class materials and discussion topics.

Assignment Checklist – Be sure that you capture the following eleven sections in your report:

The needs of R&D Media, LLC’s stakeholders are considered within the plan.

List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.

New technologies for Alternate Processing Sites are utilized.

A plan for updating alternate processing site software during normal operation.

Documentation showing a simple rack diagram and a network diagram.

A network configuration overview (IP, DNS, etc.).

Information security architecture (firewalls, VPNs).

Network bandwidth estimates.

Power consumption estimates.

Plan for cutting over to the alternate plan during a recovery scenario.

Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.

Scenario:

R&D Media, LLC

R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

Local Area Network and Workstation Description 

The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work.  There are also servers  to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon® servers running Red Hat® Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.

The desktop systems consist of Apple® Mac® Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange®, web server, and file and print service.

Remote Devices and External Network Connectivity

Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, business partners, and clients may visit R&D Media, LLC’s office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

The network has the following additional specifications:

The network is all TCP/IP based using Cisco routers and switches.

All desktop computers include email, web, database access, and office productivity software.

All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.

The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.

A load-balancing dual firewall connects the network to the Internet.

Security Policy Details

All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.

All network resources and equipment must be password protected.

Company equipment may not be used for personal business and only limited personal use.

All Windows-based PCs must run approved anti-malware programs.

Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.

The mail server must be configured not to forward email that originated on the Internet.

Password aging must be enforced on all servers and desktops.

All server configurations must be readily available to rebuild a failed system.

Offsite backup is required, with 24/7 access to that location.

All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.

Requirements:

Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abstract, and reference pages. Be sure to document your content with proper APA in text citations that match your reference list.

Answers contain sufficient information to adequately answer the questions

No spelling errors

No grammar errors

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions, 2 Research Papers

Discussions – 300 Words each

Research paper – 4 Pages each

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dispute resolution and contracts.

 

In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 8Review Question #4 on page 261 and then answer the following question:The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?Chapter 9Apple, Inc. and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to black-out restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement. 

Question 4  

The new age of technology presents much opportunity for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.

The plaintiff in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.

Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?67

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

algorithms

 Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a 128-hash value. MD5 is now considered obsolete because of the “birthday problem”. Notice the increase from 160-bit to 128-bit. Do you think more bits for the hash value makes the algorithm better? Explain your position. 

The second question must be on a Word document.

The hash value of a message is a one-way “unique value” that can be extracted from the message using algorithms like MD5 and SHA-x. In this paper, you are going to use a hash calculator (the best way to find one is to google hash calculator). Cut and paste the message below into a hash calculator and compute the MD5 or SHA-1 hashed value. Once you have the hashed value, store it in a text file (notepad). Now, search for an AES encryption tool on the Internet (google: AES encryption tool). Paste the hashed value into the AES tool (note that you will need to create a secret password/key to use the EAS Encryption tool. Once the encryption is completed, explain the resulting value (what is it?). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Alternative environment

Research and describe 2-3 intrusions that have occurred in alternative environments (SCADA, real time systems, critical infrastructures). Explain how and why the intrusions occurred. What can organizations do to prevent such threats?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Paper

Imagine you are working for the CIA or FBI, and before you start on a mission, both national organizations want to verify your ability to identify the motivation and capabilities behind cyberterrorism and information warfare. In a report paper to both organizations
Explain the developmental perspective on the problem of and changes to cyber victimization.
Evaluate two current issues, trends, or problems in cybercrime and cyberterrorism.
Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups.
Explain why interconnectivity is important in today’s connected environment.
Evaluate the two biggest threats against the national interests of the United States, including critical infrastructure.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SYNTHESIS OF INFORMATION

 

Information and digital literacy impacts the decision-making process in multiple ways from academic research to personal interest. More than ever before, information is at our fingertips and coming at us with lightning speed. How do we sift and use this information (CO1)? Step 4 of the Big 6 model relates to our use of information and the process of engaging and extracting relevant information. Next, Step 5 of the Big 6 approach focuses on synthesis of information (CO8).

Find an article online about health and wellness, buying a car, hobbies, or planning for a vacation. Read the article and consider the following: 

  • How will you synthesize and present the content of the article to share?
  • What do you want the class to know and what do they need to know?
  • How will you share the information so that the content is clear and concise?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Com120boo3

 

Instructions

Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources.

Description: 
During the Week 3 Assignment, Project Plan, you chose a topic and created your project plan. In the Week 3 Lesson, you read about location and access and in Week 4, you learned about organizing your digital information and storing that information responsibly. Now it is time to take the work you did in the Week 3 Assignment, Project Plan, and locate and evaluate sources  (CO2 & 5) that that will lead to your Week Week 7 Assignment, Final Project. 

Please follow these instructions: 

  • Download the Source Evaluation Worksheet template (in Word).
    Complete Parts I and II in the worksheet.
  • Find a minimum of three (3) sources. One (1) source must be an academic source and from the APUS Trefrey Library and the other sources must be credible and appropriate for college research.
  • Please include robust source summaries in your own words that explain the contents of the source and the relevance of the source to your topic.

Consider the following: 

  • Once you complete the Source Evaluation Worksheet, please upload the completed worksheet.
  • See the COMM120 Week 5 Source Evaluation Rubric for grading guidelines.

Attachments

Source Evaluation Worksheet Template.docx(16.19 KB) 

IVE ATTACHED WEEK THREES OUTLINE

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

w5linux

 

  1. Locate an automated assessment tool and detail what attackers use the tool for, the information it provides, and how organizations can protect themselves from it. don’t use Nessus or noggin and Linux and automated CDs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Labs

 Hello Everyone

  • Complete Lab #1 – Assessment Worksheet.
  • Complete Lab #2 – Assessment Worksheet.
  • Complete Lab #7 – Assessment Worksheet.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now