Unit 5 IP Network Security

 Description

Key Assignment

  • Security Management Document
    • Use Word
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of Contents (TOC)
      • Use an autogenerated TOC.
      • This should be on a separate page.
      • This should be a maximum of 3 levels deep.
      • Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
    • Section headings
      • Week 1: Introduction to Information Security
        • This section will describe the organization and establish the security model that it will use.
      • Week 2: Security Assessment
        • This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
      • Week 3: Access Controls and Security Mechanisms
        • This section examines how to control access and implement sound security controls to ensure restricted access to data.
      • Week 4: Security Policies, Procedures, and Regulatory Compliance
        • This section will focus on the protection of data and regulatory requirements that the company needs to implement.
      • Week 5: Network Security
        • This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

  • Include cover, outline, abstract, and Reference pages. (FINAL PROJECT MUST INCLUDE THIS)

The case study company has expressed a desire to have a secure company-wide network infrastructure. Because the network has to be re-evaluated from the beginning, the company wants to ensure that the new network has as many reasonable security controls and mechanisms in place. What solutions can you propose to support these initiatives? Create the following section for Week 5:

  • Week 5: Network Security
    • Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the new proposed expansion.
    • Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.
    • Describe the access controls and how the company can ensure that devices and the topology are effective and working to protect the company infrastructure.
    • Review and describe the need for intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) based on research of the latest elements of intrusion detection and prevention available.
    • Discuss how they can effectively be used in a network operations setting.
    • Ensure that there is an appropriate use of the IDSs and IPSs in the network diagram.
  • Section 5 should be 4–5 pages long (2–3 pages of network topology, 1–2 pages of IPSs and IDSs).
  • Name the document “CS651_FirstnameLastname_Final.doc.”

——- THIS IS ALSO PART OF THE FINAL PROJECT ————-

  • As a final deliverable to the management team, create a Power Point presentation that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Remember that the presentation is for the management team and should contain the appropriate level of detail.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer System Evolution Part

Respond to each question minimum 50 words:

While you are reading this week’s lesson material and considering this discussion question, I thought to share that I am personally amazed at the advancement of wearable technologies. While wearable devices such as Virtual Reality (VR) and Augmented reality (AR) gadgets, Fitbit, Smart Watch, and Smart sports accessories products which may or may not appeal to everyone, I do think that wearables that have health care functions can offer lifestyle improvement to those who need them. Examples including using Apple Watch to gather data from patients during their cardia rehabilitation program by providing heart rate and heart rhythm notifications, Jabra hearing aids that can be remotely programmed for each individual user, PatientPoint has a monitoring product that enables medical staff to identify health trends of their patients to adjust treatment plans and provide preventive cardia care, etc.

What are your thoughts with wearable devices?

I think the biggest advancement in the last decade and a half would have to be smartphones. Ten to fifteen years ago we still had flip phones and blackberries. Although they had more capabilities than cell phones in previous years, smartphones have advanced by leaps and bounds, each year becoming faster and faster and either smaller or with a bigger vivid display. The screens have more visual effects and some can even fold.

What new capabilities do you consider looking at when purchasing a smart phone and in the near future do you foresee a significant change?

NO AI

NO CHAT GPT

NO PLAGIARISM

SITE REFERENCES

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Computing (ITS-532) – Week4 paper

Text book: Cloud Computing ISBN: 9781284199017 Dr. Kris Jamsa, Jones & Bartlett Learning, Publication Date: 2012-03-22

Chapter 9 identified the advantages and disadvantages of using a cloud-based provider.  Additionally, you read about common security threats to cloud-based environments.  

Question: Your task this week is to write a research paper that defends the following statements and provide one real-world example for each statement: 

  • A difficult security threat to mitigate is a malicious employee.  
  • A cloud-provider’s data center is still at risk from natural disasters such as floods, fire, and earthquakes.  

Research Paper Requirements:

  • The paper should be four pages long, not including the title and reference pages. 
  • Use Times New Roman, size 12 font throughout the paper. 
  • Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.
  • A minimum of two scholarly journal articles (besides your textbook) are required.
  • Writing should demonstrate a thorough understanding of the materials and address all required elements. 
  • Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free. 

Note: plagiarism check required, APA7 format, include References, within 8hrs 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science 2 Assignments & 1 Discussion

Operational Excellence – Assignment

Org Leader and Decision Making: Discussion

Org Leader and Decision Making: – Assessment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Q1# “Discussion 3: diffusion Q2# Test 1: ChatGPT Training

Q1# Discssuion

Diffusion models are one of the most influential generative modeling techniques for image generation and, across many benchmarks, they outperform state-of-the-art GANs. 

  1. Explain your opinion on the reasons for the popularity of diffusion models.
  2. What is the real difference between diffusion models and GANs? 

Q2# Test 1: ChatGPT Training

ChatGPT is a tool that allows users to interact with their suite of large language models through a conversational interface. Describe the training process for ChatGPT and suggest which tool/network would you use for each part of the training process and justify your suggestion: 

  1. Supervised fine-tuning / training tool / explanation
  2. Reward modeling / training tool / explanation
  3. Reinforcement learning / training tool / explanation 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Party Flyer

Create a flyer for an upcoming DANCE PARTY! Create a 1-page, single-sided, ORIGINAL flyer (topic of your choice) using a recent version of InDesign (version CS5 or higher) or “approved” alternate electronic publishing software (contact me if you are not sure). You must submit the completed project file.
 

Party Details

Party Name: Come up with a name for your party (e.g. Back to School Party). This is a dance party – people will be dancing. Make sure your flyer meets this requirement.
Location: You determine the location.
Theme: You determine the dance theme.
8pm to 2am.
June 8, 2021.
Party Type: Dance
Cost: $20 (in advance) – $30 (at the door).
Party Sponsor: Creative Genius
Music by?: DJ or Live Band (You decide).
Contact Information: Include your name as the contact person, web site (www.cg.com), and phone number (555-123-4567)
Dress Code: Dress to Impress!
Design Elements: Include one or more of the following, as appropriate, to demonstrate, visually, that this party is a dance party: (DJ, turntable, records, music notes, boom box radio, speakers, musical band, or disco ball).

 

Submission Requirements

Please submit the following:
1. Submit a PDF (Portable Document Format) version of your flyer to your Assignments Folder.
2. Submit the original file of your completed work (.indd document if using InDesign).
3. Submit ALL images, graphics, photos, clipart, or text files used in creating your work.

InDesign’s Package feature places all the resources, including photos, images, clipart, and fonts, used in a document into one centralized folder. It also creates a PDF version of the document, which you need to submit  

 Project Reflection
Post an answer the following questions when you submit your assignments files.
a. Who is the audience for your flyer?
b. What is the purpose of your flyer?
c. What issues or challenges did you face creating this project?
d. What software programs did you use to create your flyer?

You can submit your reflection as a Microsoft Word document

Please follow instructions thoroughly.
 

created in MS Word, MS Publisher, Adobe Photoshop, Adobe Illustrator, or MS Works (or similar word processing software applications) will not be accepted.

NOTE 3: You can not use a template or other pre-formatted design to complete your project, in whole, or in part. You must create your flyer from “scratch”, starting from a empty page.

Your flyer must include all of the required elements listed below:

REQUIRED ELEMENTS

DescriptionPage Margins: Set at 0.5 inches (or equivalent picas, points, etc.) on the top, bottom, left, and right.Page Orientation: Portrait (Tall)Paper Size: Letter – 8.5 inches (wide) x 11 inches (high)Pages: One page – Single Side PrintGraphic Elements: Include at least 1 “professional” clipart image, photo, or graphic (appropriate for the flyer…examples are DJ, dancers, people dancing, disco ball, etc). All graphic elements are required to be high-quality, well-designed, non-pixelated, not cartoonish, and visually appealing.Colors: Include at least 2 different colors in your design.Fonts: Use at least 2 different fonts in your design. Good font choices (sizes and types).Party Details: All of the required elements, including all party details should be included in your flyer design. Your flyer should look like a “real” flyer.

NOTE 5: All design elements must fit the purpose and theme of the flyer.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science rules assignment

The “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” (1) is one of the most comprehensive studies on the applicability of international law to cyberspace conflict, and thus cyber operations. In this study, multiple legal experts derived 154 rules from existing law. Several opinions on these rules were divided, so the interpretation of the rules remains open for discussion.

In this paper make sure you evaluate Rules 4 and 9.
For each RULE (4 & 9):
Describe the laws and rules that govern sovereignty
Explain why a state would want to collect intelligence, why it might be required ethically, and whether cyber operations that collect detailed intelligence on another state violate its sovereignty
Describe the laws and rules that govern territorial jurisdiction
Explain whether cyber operations that collect detailed intelligence on another state may exercise jurisdiction over data that traverses its territory, citing specific,

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

questions

Write a paper in which you

Explain the differences in threat, vulnerability, and exploit assessments for information systems and define at least two tools or methods to perform each type.
Describe at least two tools or methods used to implement both physical and logical security controls (four in total), then identify the type of security personnel that would be used to implement each and discuss their roles and responsibilities.
Describe three considerations when translating a risk assessment into a risk mitigation plan, then discuss the differences between a risk mitigation plan and a contingency plan.
Explain the two primary goals to achieve when implementing a risk mitigation plan and discuss the methods of mitigation for common information system risk

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risk

Write a paper in which you:
Discuss at least three rationales for performing an information systems security risk assessment.
Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
Describe at least five common tasks that should be performed in an information systems security risk assessment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Generating a TCO Approximation for Azure

Generating a TCO Approximation for Azure

If you and your company are looking into using Azure-based services to replace the existing non-cloud-based systems it currently uses, how could you go about generating a TCO approximation for Azure?

  • Is there a tool designed to help estimate costs?
  • What items would you include in your TCO figures?

200-250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now