wk6A

 

Assignment Instructions:
You are tasked as the Cyber Security Analyst at your new organization to prepare a briefing for executive management (comprised of people with anywhere from a basic understanding of Information Technology [IT] to a Chief Information Officer with a vast knowledge of IT). The purpose of the briefing is to let them know after you have analyzed network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of cyberspace how it may impact your organization, and to develop a policy to be prepared for it.

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Background Section
  4. Analysis of current research on the subject matter
  5. Recommendations
  6. Reference Section

MISCELLANEOUS:

  1. Use current and real-world data to make your points, not just the textbook
  2. Your report may focus only on the topic of your choosing – imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.
  3. Your assignment is due by Sunday, not later than 11:59 p.m. Eastern time.

CATEGORY

4

3

2

1

Multiplier

Total

Introduction

The introduction clearly states the main topic and previews the structure of the paper.

The introduction clearly states the main topic but only partially previews the structure of the paper.

The introduction states the main topic but does not preview the structure of the paper.

There is no clear introduction to the main topic or structure of the paper.

X 2.5

Paragraph Construction

All paragraphs include the introductory sentence, explanations or details, and a concluding sentence.

Most paragraphs include introductory sentences, explanations or details, and concluding sentences.

Paragraphs included related information but were typically not constructed well.

The paragraphing structure was not clear, and sentences were not typically related within the paragraphs.

X 2.5

Sequencing

Details are placed in a logical order and correspond to the structure presented in the introduction.

Details are sometimes logically placed but do not correspond to the structure presented in the introduction.

Some details are not in a logical or expected order, and this distracts the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

X 2.5

Transitions

A variety of thoughtful transitions are used. They clearly show how ideas are connected.

Transitions clearly show how ideas are connected, but there is little variety.

Some transitions work well, but connections between other ideas are fuzzy.

The transitions between ideas are unclear or nonexistent.

X 2.5

Supportive Research

Supporting research studies and/or reports are research-based and accurately reported.

Supporting research studies and/or reports are not accurately reported.

Research studies and/or reports do not support the discussion.

Research studies and/or reports are limited and/or inaccurately reported.

X 2.5

Quality of Information

Information clearly relates to the main topic. It includes several supporting details and/or examples. The paper is in APA format, and the body of the paper is between 8 and 10 pages.

The information clearly relates to the main topic. It provides 1-2 supporting details and/or examples. The paper is not completely in APA format, and the body is between 8 and 10 pages.

The information clearly relates to the main topic. No details and/or examples are given.The paper is not completely in APA format, and the body is between 8 and 10 pages.

The information has little or nothing to do with the main topic. The paper is completely in APA format, and the body is between 8 and 10 pages.

X 2.5

Conclusion/

Recommendations

The conclusion effectively summarizes the discussion and provides at least two recommendations for further research.

The conclusion summarizes the paper but provides only one recommendation for further research.

The conclusion partially summarizes the discussion but provides no recommendations.

The conclusion is poorly constructed.

X 2.5

Sources

Citations

References

All sources (information and graphics) are accurately documented in APA. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Two sources are not documented in APA format. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. (Provided less than 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. Provided less than 5 references)

X 2.5

Mechanics

No grammatical, spelling, or punctuation errors.

One grammatical, spelling, or punctuation error.

Two grammatical, spelling, or punctuation errors.

More than two grammatical, spelling, or punctuation errors.

X 2.5

Timeliness

All late submissions have a 10-point (10%) deduction.

10

Total:

100

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Unit 5 Assignment IT 545

 

There are two parts to this assignment. In Part 1, you will analyze the cybersecurity risks related to implementing BYOD into an organization. You will examine this with regard to legal implications, personal use and personal data, sensors, location services, always-connected, mobile device management, and multifactor authentication. In Part 2, you will write an outline for a presentation that you will give to a professional conference on Cybersecurity in the field in which you work. You will discuss who you intend to network with professionally and will evaluate how you can use the conference and the people you meet to advance your career.

Assignment Instructions

Part 1

  1. You are a cyber security analyst for a large healthcare clinic. You understand the cyber risks that exist when using cloud-based and mobile applications. The top executive of the organization wants to introduce BYOD for the employees. 
  2. The CIO has asked you to prepare a report that thoroughly analyzes the threats and risks of BYOD to the organization.
  3.  Be sure to discuss all of the following (create a section for each topic): 
    • legal agreements for data protection
    • personal use and personal data
    • sensors
    • location awareness 
    • always-on always connected
    • multifactor authentication
    • mobile device management 
  4. Make a recommendation to the CIO as to whether or not you think that BYOD should be introduced to the organization. Provide an analysis of both the pros and cons and then your final recommendation.
  5. Be sure the paper has an introduction, conclusion, in-text citations, and reference list.

Part 2

  1. Write an outline for a presentation you might give regarding advanced persistent threats (APT) or newly emerging strains of malware to a professional conference in the field in which you work.
  2. Describe the APT or malware strain.
  3. Discuss the implications of this type of threat for the industry in which you work.
  4. Describe the types of people that you will want to network with at this conference and describe why.
  5. Describe how you can use this conference to further advance your career.

Assignment Requirements

Combine Part 1 and Part 2 into a single Word document

The Part 1 section should be at least 5–6 pages, use 12 pt. Times New Roman, and be in APA format.

The Part 2 section (outline and discussion) should be 1 page, use 12 pt. Times New Roman.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MIT 681

APA FORMAT WITH 300 WORDS AND REFERENCES AND CITATIONS 

Does a company license software using Capex funds, or is it always Opex?  Can you buy hardware with Opex or is it always Capex?  What things can you capitalize and what things require operational funding?  Where does Capex money come from and where does Opex money come from?  If you run out of Opex can you just use Capex?  What’s the difference here?  Can you sort all of this out? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project report

 The report should include the project’s background and motivation and a brief overview of related and similar work, with at least 3 references. This formal report will be a culmination of previous reports submitted and should include a detailed description of the implemented system, including what it does, how it works, and how it is used. The report should address all the feedback provided in previous submissions. The report should also detail the group’s accomplishments and reflect on their experience.  

 

Final Report Outline: 

  • Introduction – Brief summary of your project, context and motivation  
  • Process Overview – brief description of your approach, tools and artifacts used, including summary of individual contributions 
  • Requirements Specification – summary of functional and non-functional requirements 
  • Project Design – architecture and implementation of your project and how it works 
  • Project Evaluation: Testing strategy, Test Plan and Results, Validation  
  • Design and Alternate Designs – changes made to the source code due to testing results 
  • Development History: Project timeline 
  • Discussion: Lessons learned, design strengths, limitations and suggestions for future improvement 
  • Conclusion 
  • Acknowledgement (optional) 
  • References 
  • Appendix 
    • System specification: technical specifications, minimum hardware requirements of the project implemented 
    • User Guide 
    • Other appendices (optional) 

Guidelines for the format and submission of the paper are as follows: 

  • The paper should be 15-20 pages in length. (This minimum and maximum length should not include the title page, appendix, separate figures and tables, or the list of references); 
  • The paper should include a cover page containing the project’s title and the names of project team members. All team members should submit the same document to the assignment submission area. 
  • Careful attention should be given to source citations, and a proper listing of references. 
  • The paper should be well formatted and well organized with proper formatting of all graphs, images, tables etc. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5 Goal attainment

 An innovative and rapidly changing project management environment is characterized by factors including faster delivery, flexibility, and increased productivity and uncertainty. Based on the readings and your professional experiences, compare, contrast, and prioritize those factors with respect to the project management life cycle (PMLC) approach. Defend your position with specific examples or references. 

I provided one of the readings in the file but the other reading i posted credentials for below.. if you are unable to get anything from the readings please go off professional experiences

 ONE OF THE READINGS FOR THE WEEKS CREDENTIALS!!!

it was too much to copy and paste 

Title:  How to manage project opportunity and risk: Why uncertainty management can be a much better approach than risk management 

Author: ward, S., & Chapman, C.

Eidtition 3rd

Publication date 2011

publisher: john wiley  sons

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybercrime and compliance

 In this discussion, we want to examine the relationship between cybercrime and compliance. For example, in public industries, how does the Sarbanes–Oxley Act of 2002 reduce the chance of financial crime for publicity-traded firms? What are some of the requirements organizations need in order to be in compliance? Another example is that many states now have notification laws: when someone’s identity is possibly stolen, some action must be taken by the company to alert the individual. Provide interesting case(s) of cybercrime committed in violation of regulations and compliance

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SQL Injection

 

The Open Web Application Security Project (OWASP) has periodically compiled and published (2013, 2017) the OWASP Top 10 The Ten Most Critical Web Application Security Risks. SQL Injection has remained the number one security risk for web applications for more than 6 years. It is the mechanism behind many high-profile internet attacks.

As a security consultant, what advice or recommendations would you give clients to help them understand the risk posed by SQL Injection and what countermeasures they may take or build into their web application development process to help avoid or mitigate the risk.

200-250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wireshark

 

  • What uses can you think of for a network traffic analyzer? In a few sentences, describe how Wireshark assists investigators. describe what the basics of Wireshark is about. Learning to master Wireshark can be done online. What Internet sites could you use as a resource for learning this valuable open source tool? Provide links to any useful resource you find.

200-250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

communication through teamwork

 

(3-4 paragraphs):

  • Given that project teams are made up of people with varying ways of absorbing information, what is the value of the team communicating in different ways?
    • If you were in charge, how would you suggest to others that using different channels and forms of communication is essential to project success?

  • What advice would you give to others about starting and completing this process in the real world?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Process flow diagram

 

Overview

You just received a memo from the Project Manager with updates and a request for a process flow diagram. Read the memo below.

Memo from the PM:
We have decided to buy space on Amazon Web Services (AWS) and maintain our own e-commerce applications and databases there. This was based partly on your recommendation and the recommendation of the other team members.
What does this mean for you?
We’ll need your part of the project to go into a Business Requirements Document for the project plan to be sent up to the CEO for final approval. The CIO and I will review your work, so please be detailed in your responses so that we can allocate resources appropriately.

Instructions

You will need to create a process flow diagram for the project plan, showing how you want things to go with the new system. 

You have all the Microsoft products available to you in the marketing department, so feel free to use any Microsoft product to create the process flow diagram. Visio is very popular, so feel free to create the process flow diagram using Visio, but you can also use MS Word, PowerPoint, or whatever you’re comfortable with, as long as the output is a PDF or a Microsoft document.

Your process flow diagram should include each of the following elements:

  • Easy-to-read formatting, including a font size that is large enough to easily read, simple language that is easy to understand quickly, and a clearly visible title that identifies the process being diagrammed.
  • A clear start and end to the process flow. All items are in the proper sequence with arrows or other directional objects used to indicate that sequence. Flow is logical throughout.
  • Distinct shapes for each necessary action, and are identified clearly through a legend.

Take a look at the example and template for reference.

In addition to the process flow diagram, you will also need to use the Word template to submit a written description of the diagram to ensure that the PM and any others reading the diagram will know what is being communicated. Your description, much like your diagram, will be specific to the process you are supporting in the project based on your area of expertise.

Your description should respond to the questions below that align with your role (cybersecurity) in the project and should address all parts of the process flow diagram:

Cybersecurity: Access control, malware concerns, physical and logical access, forensic investigation, etc.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now