CIS320 Assigment

Follow the lab instructions to:

Create a standard IP access list using Notepad. 

Configure the standard IP access list and apply it to the appropriate interface. 

Use the correct show commands to monitor the standard IP access list. 

Test the standard IP access list. 

Provide screenshots illustrating your answers to the lab questions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 8

Please see the attached discussion Word document for questions.   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 9

 Please see the attached discussion Word document for questions.   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Computer Security – Assignment

Address the following system security domains by providing in-depth analysis and details about implementation and strategic planning for an online system:

> Identify a strategy to manage personnel security.

> Adhering to laws, regulations, and compliance.

> Protecting the security of assets from online malicious access.

> Identify goals from using cryptographic tools

Need 6-8 page report in APA format with minimum 9 peer-reviewed citations besides the attached chapters. Must include introduction and conclusion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RESEARCH PAPER

  

The Research Paper: will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.

The Research Paper:  will allow exposure to technical literature for exploration of the body of research as a whole, as well as practice navigating your way around it. Thus, a well-written paper will show your ability not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.

Instructions

Each Research Paper:  must:

· Have a length of 2750–3250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)

· Be formatted according to current APA standards including:

o A properly formatted APA Title Page including paper name, institution, class name and paper date. 

o A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).

o The name of the paper and page number on each additional page (no Running Head).

o Section Headers (i.e. First Level Headers) which are bold and centered

o Indented paragraphs for each paragraph.

o No contractions or use of personal pronouns such as “You, me, your” (except in the Conclusions page)

o Proper APA formatted in-text citations and Bibliography

· Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)

· Include an in-text citation whenever the source to which you refer is changed

· Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text

· Include at least 5 sources for citation, 2 of which must be peer-reviewed journals

· Use an in-text citation to support any opinion that is not otherwise known as a ‘fact’ by your audience or by the general public. 

o For example, if you state: “…all IT Systems should be reviewed yearly as a best practice…” you need to support that with a citation. Such as ‘According to (source), “all IT systems should be reviewed yearly…”

o As a graduate student, you are not yet considered an expert in your field but are striving to become one by your degree. 

o If your statement is a known fact such as “Computers are designed for processing electronic information” or “IT Security is important” then you do not need to cite as your audience will likely agree that this is a fact.

o When in doubt, cite! J

 

Each Research Paper:  must include these 4 sections in this order as the ‘first level sections’:

1. Research Objectives:

What specifically do you want to learn about or prove as you do this research? 

a. List the research topics that you included as at least 3–4 bullets in the Research Paper: Topic Proposal and Outline at the top of this section. This list is to appear as the first section in your Research Paper:  

b. After placing your bulleted list on the Research Paper: , you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than inline with your list.

c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your Research Paper:  must be very focused to allow in-depth research in so few words) and remember to include biblical integration as you are able.

d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the Research Paper:  develops. But are only to serve as a guide for your paragraphs.

 

2. Literature Search Results:

What do other academic sources say about this subject? 

a. This section will show the depth of your research. 

b. All entries in your bibliography must be cited at least once in this section. 

c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors’ ideas and concepts and must provide the source from which they come. 

d. Remember to link the results to Christian concepts via biblical integration.

e. Often this is the largest section of the Research Paper:  The time to state your own ideas will come in the following section.

3. Conclusions:

What have you learned from your research? 

1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Don’t forget to provide biblical integration on the topics when you state your conclusions

2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal and Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed. 

3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.

4. Bibliography:

1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources. 

2. Both the in-text citations and the accompanying bibliographic information must be in current APA format. 

3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources. 

4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources). 

5. You must use resources with a specific technical focus on your topic.

Using the “Tell Them…” Method

One of the most tried and true standards for good quality papers is to use the “Tell Them” model for crafting information. The model is broken out like this:

1. Tell Them what you are going to tell them. (introduction)

2. Tell Them about it (body of the paper)

3. Tell Them what you told them. (conclusions)

To put this into perspective of a research paper, in the introduction you will “Tell Them What you are going to tell them”. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, don’t use the words “I am going to tell you” but make it clear what the purpose of the paper is.

In the body of the Research Paper, you will “Tell them about it.” Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the “Tell Them what you are going to tell them” section, then you should make sure to address all 4 items in detal.

Finally, in the conclusion of the Research Paper, “Tell Them What You Told Them.” This means that you can re-iterate what you talked about (don’t repeat it word for word but summarize the ‘big ideas’). Use this section to tie in each things you said you would talk about into a unified ending to your paper. 

Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 1

APA FORMAT THREE HUNDRED WORDS WITH REFERENCES AND CITATION, NO PLAGIARIS, NO A I, NO C H A T G P .

The term Internet of Things was first introduced in 1999.  Kevin Ashton, a British technology visionary, first used it to describe objects connected to the internet-any type of object. 

Discuss two challenges created by the Internet of Things (IoT) and possible solutions.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Big Data Architecture Components

 

You are working as an analytics developer for a growing manufacturing company. The leadership team realizes that it is time to update its data processing systems for a variety of reasons and would like to learn more about something called a “big data architecture”.

 Project:

Create a digital artifact (student choice: video, animation, multimedia presentation, storyboard, technical report, infographic, etc.) that illustrates the common components of a Big Data architecture and includes a description for each component.

 Any digital artifact over 5MB, please upload to a cloud storage space and submit a link. Be sure to set the permissions to allow viewing. Include a sentence that describes what is being linked to. Consider uploading videos to YouTube or Vimeo.

 

  • Any digital artifact over 5MB, please upload to a cloud storage space and submit a link. Be sure to set the permissions to allow viewing. Include a sentence that describes what is being linked to. Consider uploading videos to YouTube or Vimeo.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

350 – 400 WORDS No Plagiarism Due By Today 12 am EST

 In your initial post this week, role play that you are working as a digital forensics investigator for a private cybersecurity firm. As the lead investigator, you have been assigned to investigate a data breach that occurred at a small company named Lindsey’s Technical Solutions, Inc. Key Facts:

  • Lindsey’s Technical Solutions, Inc. has approximately 50 employees. They provide services to various clients, including financial institutions, and government agencies.
  • Sensitive client data, including financial reocrds, intellectual property, and personally identifiable information (PII), was potentially exposed. 
  • The breach occurred over a three month period and was first suspected in January 2023. Suspicious activities were reported by several clients and revealed the breach.
  • Lindsey’s Technical Solutions, Inc. is a cybersecurity firm that specializes in providing advanced solutions to its clients. 

Discussion QuestionsYour task as the lead investigator is to conduct a digital forensics investigation to gather evidence that can be used in court if necessary. For this discussion, we will use the following as an outline for completing a forensics investigation and the initial post.

  1. Evidence aquisition – Document the steps you would take to secure and preserve the digital evidence, include the creation of the chain of custody log and ensuring the integrity of the evidence. Identify the potential sources of evidence and describe why they are considered.
  2. Data analysis – Describe the hardware and software tools you wo-uld use for acquiring data from various sources (e.g., computers, servers, mobile devices, external drives, etc.). 
  3. Timeline reconstruction – What will you include in your timeline reconstruction?
  4. Legal considerations – What legal and ethical aspects should be considered in a digital forensics investigation?
  5. Evidence presentation – Prepare a post that summarizes your findings of the above steps. You may include visual aids, such as timelines, charts, and/or graphs. Your presentation should be in a clear and understandable manner. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Recognition of prior learning assessment (IT Audit and Risk Management)

 

As an IT professional, I am taking a skill assessment under the recognition of prior learning assessment will be required with by a skill assessment body.

I have six years of relevant work experience in the IT Audit, IT Risk Management, and internal controls testing domain in my past work history.  I am required to demonstrate how I acquired MY Information and Communication Technology knowledge by submitting 2 Project Reports. Each report must describe a career episode in your employment history with sufficient detail of evidence in applying the claimed ICT knowledge in a working situation. The projects must relate to the employment being assessed. Of the two reports, one must apply to a project undertaken within the last three (3) years and the other to a project within the previous five (5) years. Sufficient detail must be provided to demonstrate the depth and breadth of your ICT knowledge gained during your ICT employment. The Recognition of Prior Learning Project Report must not be plagiarized. 

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Should be 350-400 words With References and No plagiarism

Follow this link to watch the TedTalk Dare to Disagree video: https://www.ted.com/talks/margaret_heffernan_dare_to_disagree.

After watching the video, identify two theories or concepts from Brewer and Westerman (2018) and apply them to the content in the video.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now