access control

Independent Software Incorporated (ISI) is a small software development company with eight employees who work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI’s coding development projects often encompass classified information and personally identifiable information (PII).

Based on the scenario above, write a unique paper where you:
Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CYB

Project 1

Risk Assessment Plan Ungraded, 

After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan.

For this part of the project:

  1. Research risk assessment approaches.
  2. Create an outline for a basic qualitative risk assessment plan.
  3. Write an introduction to the plan explaining its purpose and importance.
  4. Define the scope and boundaries for the risk assessment.
  5. Identify data center assets and activities to be assessed.
  6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
  7. Identify relevant types of controls to be assessed.
  8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
  9. Develop a proposed schedule for the risk assessment process.
  10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 4–6 pages

 Project 2

Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.

The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 4–6 pages

Project 3 

Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.

Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private networks (VPNs) exist between each production data center and the corporate locations.

The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.

For this part of the project:

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart previous operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 6–10 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4 Sort Questions, 100 words each

1.  Demographics and needs vary from state to state and district to district. Research the trends and prevalence of disability categories being served in your state and describe them to the class. Explain where you located this information and discuss what you can conclude about the needs of students in your state based upon this information. Explain how knowing this type of information can help you plan instruction to maximize the learning of all students. In replies to peers, discuss trends, or lack of trends, in the types of disability prevalence and explain why you think these similarities/differences occur from state to state. 

2. Each state department of education provides resources intended for parent training and information. These organizations provide advocacy services and community resources and supports. The contact information for these centers are located in a document, Procedural Safeguards, given to parents/guardians annually, and when there is a critical change in services or placement.

Locate the parent training and information resource center in Tennessee and review the site. Provide the link to your state’s parent information and training center and describe at least three different services this organization provides. Include discussion of how this tool can be used to support families and individuals with disabilities in your future special education settings.

3.  Many have said that Universal Design for Learning (UDL) promotes better teaching practices for all educators. Discuss whether you agree or disagree with that statement and provide specific reasons, facts, and real-world examples to support your ideas.  

4.  Describe how a multi-tiered system of support and response to intervention can support the learning of all students in a classroom. List at least four benefits of using MTSS/RTI with struggling students. Defend your reasons with citations and references. 

Each question requires 100 words and 1 reference 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT543 Unit 4 Assn Part 2

 

Part 2

Part 2 of the assignment will be an individual assignment and is not to be completed as a team effort.

Write a short 4- to 5-page paper on the process of issuing and managing digital certificates. Discuss the weaknesses and vulnerabilities of different approaches and the problems with revoking certificates and possible remedies. Include illustrations of these processes and cite your sources.

Written Assignment Requirements:

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for writing, spelling, or grammar errors are at your instructor’s discretion.

For more information and examples of APA formatting, see the resources in Academic Tools.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 questions

  

Lab 2 Workstation Specifics: List two features that should be enhanced for each of the following: graphic and CAD/CAM workstations, audio/video editing workstations, virtualization workstations, gaming PCs, home theater PCs, and home server PCs.

Lab 1 Beep Code: Identify the BIOS version of your motherboard. Look up the beep codes this motherboard uses on the manufacturer’s website.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Technology Reasearch paper

  

The Research Paper: will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.

Instructions

Each Research Paper must:

· Have a length of 2750–3250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)

· Be formatted according to current APA standards including:

o A properly formatted APA Title Page including paper name, institution, class name and paper date. 

o A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).

o The name of the paper and page number on each additional page (no Running Head).

o Section Headers (i.e. First Level Headers) which are bold and centered

o Indented paragraphs for each paragraph.

o No contractions or use of personal pronouns such as “You, me, your” (except in the Conclusions page)

o Proper APA formatted in-text citations and Bibliography

· Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)

· Include an in-text citation whenever the source to which you refer is changed

· Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text

· Include at least 5 sources for citation, 2 of which must be peer-reviewed journals

· Use an in-text citation to support any opinion that is not otherwise known as a ‘fact’ by your audience or by the general public. 

o For example, if you state: “…all IT Systems should be reviewed yearly as a best practice…” you need to support that with a citation. Such as ‘According to (source), “all IT systems should be reviewed yearly…”

o If your statement is a known fact such as “Computers are designed for processing electronic information” or “IT Security is important” then you do not need to cite as your audience will likely agree that this is a fact.

o When in doubt, cite! J

 

Each Research Paper: must include these 4 sections in this order as the ‘first level sections’:

1. Research Objectives:

What specifically do you want to learn about or prove as you do this research? 

a. List the research topics that you included as at least 3–4 bullets in the Research Paper: Topic Proposal and Outline at the top of this section. This list is to appear as the first section in your Research Paper

b. After placing your bulleted list on the Research Paper:  you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than in line with your list.

c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your Research Paper:  must be very focused to allow in-depth research in so few words) and remember to include biblical integration as you are able.

d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the Research Paper: develops. But are only to serve as a guide for your paragraphs.

 

2. Literature Search Results:

What do other academic sources say about this subject? 

a. This section will show the depth of your research. 

b. All entries in your bibliography must be cited at least once in this section. 

c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors’ ideas and concepts and must provide the source from which they come. 

d. Remember to link the results to Christian concepts via biblical integration.

e. Often this is the largest section of the Research Paper: The time to state your own ideas will come in the following section.

3. Conclusions:

What have you learned from your research? 

1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Don’t forget to provide biblical integration on the topics when you state your conclusions

2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal and Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed. 

3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.

4. Bibliography:

1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources. 

2. Both the in-text citations and the accompanying bibliographic information must be in current APA format. 

3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources. 

4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources). 

5. You must use resources with a specific technical focus on your topic.

Using the “Tell Them…” Method

One of the most tried and true standards for good quality papers is to use the “Tell Them” model for crafting information. The model is broken out like this:

1. Tell Them what you are going to tell them. (introduction)

2. Tell Them about it (body of the paper)

3. Tell Them what you told them. (conclusions)

To put this into perspective of a research paper, in the introduction you will “Tell Them What you are going to tell them”. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, don’t use the words “I am going to tell you” but make it clear what the purpose of the paper is.

In the body of the Research Paper: you will “Tell them about it.” Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the “Tell Them what you are going to tell them” section, then you should make sure to address all 4 items in detal.

Finally, in the conclusion of the Research Paper: “Tell Them What You Told Them.” This means that you can re-iterate what you talked about (don’t repeat it word for word but summarize the ‘big ideas’). Use this section to tie in each things you said you would talk about into a unified ending to your paper. 

Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Invitation to computer science

Write a 1-2 page paper describing three key concepts you learned from the chapter and how each relates to real world applications.

1.the changes in movie animation techniques caused by computer generated imagery (CGI)

2.how large virtual communities work, and the particular challenges they face

3. how a transformation matrix can model the movement of an object

Due Sunday

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 4


APA FORMAT WITH REFERENCES AND CITATIONS AND 300 words and no plagiarism no ai and no chat gpt

What is Refactoring?  Find an example of refactoring in the literature and tell us about it. Is this procedure a good thing – or would it be better to start over with whatever’s being refactored instead of modifying the existing code? How can you persuade clients to allow you to spend time on refactoring when all they want is new functionality?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Please answer below ask in 3 pages excluding references

Use either the MapR Sandbox Hue interface or the online demo at  http://demo.gethue.com to explore the tools and editors that Hue  provides. Try several different things – for example, explore Hive  queries, Oozie workflow examples, HBase tables, or anything else that  strikes your fancy.  

In this forum, discuss your experience with Hue. Do you think Hue is  useful? Does it lower the barrier to entry for using ecosystem  components? Would you use it to do work, or would you prefer to directly  interact with the tools themselves?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now