Computer Science homework help

Part I: Reflection

  • Reflect on your use of the Big6 Research Model (CO2).
  • What step was the most challenging? How did you overcome the challenge?
  • Using the steps in the Big 6 Research Model, consider your process of locating sources, categorizing, organizing, critiquing, and presenting information for the project. What worked well for you? Computer Science homework help

ORDER A PLAGIARISM – FREE PAPER NOW

Part II: Connecting to Career 

  • How will you use information and digital literacy in your place of work and future career in cyber security  (CO1)?
  • How will you sustain your new knowledge in order to support your career goals?
  • Why is civility important at your place of work and in politics (CO7)? Computer Science homework help

Computer Science PM Assignment

Managing risk is a critical part of project management.

  • Explain how controlling processes can affect project integration, scope, time, cost, quality, and especially risk.
  • Then design a 2-3 page memo outlining the importance of risk management, and the best practices and approaches that should be taken when managing risk. Computer Science PM Assignment
    • Make sure to also explain the necessity of a risk register and risk plan while executing the project.

    Outline your plan addressing these issues and other issues.

  • ORDER A PLAGIARISM – FREE PAPER NOW

Need 7-9 pages in APA format with minimum of 9 peer-reviewed sources. Must include introduction and conclusion. Computer Science PM Assignment

Computer Science homework help

Explore the advantages and limitations of utilizing media-sharing websites, where you can share your photos and videos with others.

ORDER A PLAGIARISM – FREE PAPER NOW

Discuss the potential benefits that come with using these platforms, as well as the drawbacks that users should be mindful of. Share your perspectives on the impact of media-sharing websites on communication, self-expression, and privacy. Engage in a conversation about the pros and cons of these platforms, considering their influence on how we share and consume visual content in today’s digital landscape. Computer Science homework help

Computer Science homework help

Read the following information about a typical dental practice:

  • Community Dental has two offices in the same city — the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.
  • The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager). Computer Science homework help
  • Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.
  • Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.
  • After their treatment, the patient visits the billing clerk’s desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone. Computer Science homework help
  • The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.
  • A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentist’s home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.
  • Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still filed in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.
  • The network infrastructure’s management and maintenance are outsourced.
  • Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted. Computer Science homework help
  • ORDER A PLAGIARISM – FREE PAPER NOW

Answer the following questions incorporated into an  format. Make any sensible assumptions necessary in order to continue your analysis (stating them as needed for clarity). You are welcome to use the discussion board to share your assumptions with others in the class:

  1. What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dental’s two offices?
  2. Assess the practice’s organization. Where are organizational processes most likely to be HIPAA compliant? What changes should be made to move the practice closer to compliance in its business operations?
  3. Assess the practice’s physical and technical safeguards. Where are they most likely HIPAA compliant? What changes should be made to move the practice closer to compliance? Computer Science homework help
  4. Community Dental exchanges data with external service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?

 

Submit your in the usual double-spaced APA-styled report. Content should be a minimum of four double-spaced pages, APA style followed (title page, abstract, table of contents, and references section) to meet expectations.

  • Answers contain sufficient information to adequately answer the questions
  • No spelling errors
  • No grammar errors. Computer Science homework help

Computer Science homework help

For information systems developers, there are many options for building a mobile app. As part of the analysis and design process for your project with Healthy Harvest, you need to determine how to approach the build by creating a use case diagram and a prototype. This diagram should list system requirements and use proper design principles.  Computer Science homework help

ORDER A PLAGIARISM – FREE PAPER NOW

Create a use case diagram to show the system requirements, including all main features and workflow for the mobile app.

Create a prototype using the method of your choice to show the overall proposed look of the app.

Write a 1-page summary that explains both your use case diagram and prototype. Include all system requirements, features, and design elements for the mobile app.

Format references according to APA guidelines.  Computer Science homework help

Assignment Overview – Alternate Processing Site Proposal

Instructions:

Assignment Overview – Alternate Processing Site Proposal

R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:

Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the assignment).

Determine who the company’s stakeholders are. You can adopt the role of an internal or external consultant for your perspective. Assignment Overview – Alternate Processing Site Proposal

ORDER A PLAGIARISM – FREE PAPER NOW

Using the results of your research, develop a technical proposal that best addresses the stakeholder’s requirements and incorporates innovative technologies in the recommendation.

Within your proposal you must also consider cost and what R&D Media, LLC can afford.

Develop and document the requirements for R&D Media, LLC’s alternate processing site building upon the concepts addressed in class materials and discussion topics.

Assignment Checklist – Be sure that you capture the following eleven sections in your report:

The needs of R&D Media, LLC’s stakeholders are considered within the plan.

List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means. Assignment Overview – Alternate Processing Site Proposal

New technologies for Alternate Processing Sites are utilized.

A plan for updating alternate processing site software during normal operation.

Documentation showing a simple rack diagram and a network diagram.

A network configuration overview (IP, DNS, etc.).

Information security architecture (firewalls, VPNs).

Network bandwidth estimates.

Power consumption estimates.

Plan for cutting over to the alternate plan during a recovery scenario.

Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.

Scenario:

R&D Media, LLC

R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity. Assignment Overview – Alternate Processing Site Proposal

Local Area Network and Workstation Description

The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work.  There are also servers  to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon® servers running Red Hat® Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.

The desktop systems consist of Apple® Mac® Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange®, web server, and file and print service. Assignment Overview – Alternate Processing Site Proposal

Remote Devices and External Network Connectivity

Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, business partners, and clients may visit R&D Media, LLC’s office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

The network has the following additional specifications:

The network is all TCP/IP based using Cisco routers and switches.

All desktop computers include email, web, database access, and office productivity software.

All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office. Assignment Overview – Alternate Processing Site Proposal

The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.

ORDER A PLAGIARISM – FREE PAPER NOW

A load-balancing dual firewall connects the network to the Internet.

Security Policy Details

All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.

All network resources and equipment must be password protected.

Company equipment may not be used for personal business and only limited personal use.

All Windows-based PCs must run approved anti-malware programs. Assignment Overview – Alternate Processing Site Proposal

Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.

The mail server must be configured not to forward email that originated on the Internet.

Password aging must be enforced on all servers and desktops.

All server configurations must be readily available to rebuild a failed system.

Offsite backup is required, with 24/7 access to that location.

All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership. Assignment Overview – Alternate Processing Site Proposal

Requirements:

Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abstract, and reference pages. Be sure to document your content with proper APA in text citations that match your reference list.

Answers contain sufficient information to adequately answer the questions . Assignment Overview – Alternate Processing Site Proposal

No spelling errors

No grammar errors

Computer Science homework help

Instructions:

Examine the architecture and configurations of computing systems by writing a brief paper describing your ideal personal computer. State your main use of the computer. For example, the following may be some of the main reason(s) you need a computer: Internet, word processing, email, graphics, or multimedia. Make sure you describe a workable computer! Include all the hardware components and software you will need to be completely functional. NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES. Your paper should be at least a page long. Use the special feature buyers guide as a reference or any of the following links: TigerdirectCompusa, Microcenter,  and Mysuperpc.

 

ORDER A PLAGIARISM – FREE PAPER NOW

  • Identify the computer purpose or use (NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES.)
  • Identify the computer hardware components needed to make your computer operational (NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES.). Computer Science homework help
  • Identify the computer system software needed to make your computer operational (NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES.).
  • Identify the application software needed to make your computer operational (NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES.)
  • Identify the computer peripherals needed to make your computer operational (NOTE: This paper is a narrative with explanation of why you are selecting different features–PLEASE DO NOT JUST PROVIDE A LIST OF COMPUTER FEATURES.). Computer Science homework help

Cybersecurity Computer Science homework help

A.  Describe two WLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.

B.  Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.

C.  Summarize the steps for mitigating each  identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation. Cybersecurity Computer Science homework help

D.  Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.

E.  Recommend a solution for the company’s BYOD approach, including research to justify your recommendation.

ORDER A PLAGIARISM – FREE PAPER NOW

F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G.  Demonstrate professional communication in the content and presentation of your submission. Cybersecurity Computer Science homework help

INTRODUCTION

As wireless and mobile technologies continue to grow in presence and popularity, the world is becoming more and more connected. Unfortunately, this also means that devices and networks are becoming more and more vulnerable to outside threats. Businesses must identify and mitigate these vulnerabilities and threats in order to protect employees’ personal information and ensure the organization is secure from passive leaking of proprietary information.

 

In this task you will assume the role of an IT professional who is responsible for identifying wireless and mobile vulnerabilities, as outlined in the scenario below. You will then present your findings and recommend solutions to mitigate these risks and prevent future threats.

SCENARIO

You are a network professional on the IT team at Alliah Company, a new but fast-growing social media provider. One year ago, Alliah launched a social media website aimed at young professionals. The company also released a mobile app for accessing the site from cellular devices.  Cybersecurity Computer Science homework help.Alliah was able to launch its website with money generated by a crowd-funded campaign, but most of the funds were spent on the site and app development, with relatively little money (and time) devoted to the internal office network infrastructure.

 

Alliah has 35 full-time employees, all of whom have offices or shared work spaces in a three-story building that serves as the company headquarters. The building is an old warehouse that was converted for office use and is approximately 10,000 square feet. Currently, the employees occupy only two floors; the third floor is vacant and available for expansion.

 

The Alliah WLAN has a gigabit managed switch, a multiservice wireless LAN controller, and seven wireless access points strategically located to provide coverage to office staff. One access point services a large back patio area for employee use. The network is protected by a firewall. The Alliah website servers are located in a data center 100 miles from Alliah headquarters.

 

Five employees are account representatives who are on the road at least 80 percent of the time, and each rep has a company-issued laptop, tablet, and smartphone. They use a large, shared office in the headquarters building when they are not traveling. Cybersecurity Computer Science homework help

 

Employees use company-owned computers that connect to the WLAN, and, in an effort to control costs during the launch, Alliah has a bring your own device (BYOD) policy.

 

The IT staff consists of five employees; three are devoted to website maintenance, one manages the headquarters’ computers and network, and another employee assists with the website and the office network. IT staff uses wired Ethernet connections to remotely access the website servers.

 

The Alliah website is successful, attracting more and more visitors each month. Jennifer, the CEO, anticipates hiring more employees and is considering a strategy that would take the company public within a few years. In preparation, she wants to ensure that Alliah’s wireless networking infrastructure is highly secure, especially because it may need to grow quickly in a short period of time, and she wants to understand the security risks the company faces. She also wants to decide if Alliah should continue allowing BYOD or restrict network access to company-owned devices only, or if a compromise solution is available.

REQUIREMENTS

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. Cybersecurity Computer Science homework help

 

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

 

  1.  Describe twoWLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.
  2.  Describe twomobile vulnerabilities that present risks for Alliah, based on the details in the scenario.
  3.  Summarize the steps for mitigating each identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation.
  4.  Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.
  5.  Recommend a solution for the company’s BYOD approach, including research to justify your recommendation. Cybersecurity Computer Science homework help
  6.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

 

  1.  Demonstrate professional communication in the content and presentation of your submission.

 

Rubric

A:WLAN VULNERABILITIES

COMPETENT Answer

The submission describes two plausible WLAN vulnerabilities that present risks for Alliah, based on the details of the scenario.

 

B:MOBILE VULNERABILITIES

 

COMPETENT Answer

The submission describes two plausible mobile vulnerabilities that present risks for Alliah, based on the details of the scenario.

 

 

C:STEPS TO MITIGATE VULNERABILITIES

 

COMPETENT Answer

The submission summarizes the steps that should be taken to mitigate each identified vulnerability and includes the specific tools and documentation that will be needed for mitigation. Cybersecurity Computer Science homework help

D:PREVENTIVE MEASURES

 

COMPETENT Answer

The submission recommends preventive measures that will maintain the security posture of WLAN and mobile environments in small businesses, referencing federal, state, or industry regulations that justify these measures.

 

 

E:BYOD APPROACH

 

COMPETENT Answer

The submission recommends a secure solution for the company’s BYOD approach and includes reliable, academic, or industry-respected research to justify the recommendation.

 

F: SOURCES

 

COMPETENT Answer

The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.

 

 

G: PROFESSIONAL COMMUNICATION 

 

 

COMPETENT Answer

Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding. Cybersecurity Computer Science homework help

ORDER A PLAGIARISM – FREE PAPER NOW

Task 2 Tips

 

  • Task 2 addresses mobile and WLAN issues at the fictional company, Alliah.
  • You need to identify 2 mobile vulnerabilities and 2 WLAN vulnerabilities.
    • Read the scenario carefully, go get a sandwich, then come back and read it again. Details are important!
    • Consider not only technical vulnerabilities, but potentially physical vulnerabilities as well.
  • Make sure to differentiate between preventative and mitigating solutions in your narrative and state how your solution will be used as a preventative or mitigating solution. (Aspects C and D)
    • Preventative – meant to stop something happening in the first place or at least reduce likelihood that it will.
    • Mitigating – meant to address something that has already happened or will inevitably happen.
  • Make sure you reference a governmentalregulation to justify your solutions for Aspect D.
    • Chapter 4 of the text has a helpful section on regulation.
    • Consider the company has stated plans of going public. Cybersecurity Computer Science homework help
    • Consider what types of data the company is collecting from its users.
    • Remember NIST/ISO/CISAare not regulations.
  • Leveraging various standards/frameworks such as NIST/ISO/CISA is often the “how” for regulatory compliance, but regulations themselves are the “why”. This task is looking for a regulation to be identified as the “why” behind the preventative measures you’re recommending.
  • Refer to items noted in Task 1 Tips regarding research and documentation, as those apply here as well.

 

Supplemental Wireshark Materials

 

 

 

Computer Science homework help

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not? Computer Science homework help

ORDER A PLAGIARISM – FREE PAPER NOW

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

  1. Sarbanes-Oxley and
  2. PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS) Computer Science homework help

IT Disaster Recovery: Ensuring Business Continuity In The Face Of Adversity

Please use this outline. “Title: IT Disaster Recovery: Ensuring Business Continuity in the Face of Adversity

Abstract:

The field of information technology (IT) is constantly evolving, bringing new challenges and opportunities for organizations. However, with the increasing reliance on technology, the risk of IT disasters also escalates. In this paper, we explore the importance of IT disaster recovery planning and its role in ensuring business continuity. Through an analysis of real-world examples, we highlight the critical components of an effective IT disaster recovery plan and provide insights into the best practices for successful implementation. IT Disaster Recovery: Ensuring Business Continuity In The Face Of Adversity

ORDER A PLAGIARISM – FREE PAPER NOW

1. Introduction:

In today’s digital age, organizations heavily rely on their IT infrastructure to perform day-to-day operations. However, various factors such as natural disasters, cyber-attacks, hardware failures, and human errors can lead to IT disruptions. This paper aims to discuss the significance of IT disaster recovery planning and provide practical insights into its implementation.

2. Understanding IT Disaster Recovery:

2.1 Definition of IT Disaster Recovery

2.2 Objectives of IT Disaster Recovery

2.3 Key Components of an Effective IT Disaster Recovery Plan

3. Real-World Examples of IT Disasters and Recovery Strategies:

3.1 Example 1: The XYZ Company Data Breach and Recovery Measures

3.2 Example 2: Hurricane ABC’s Impact on Local Businesses and Their Recovery Efforts

3.3 Example 3: Server Failure at Company DEF and the Swift Recovery Process. IT Disaster Recovery: Ensuring Business Continuity In The Face Of Adversity

4. Best Practices for Implementing an IT Disaster Recovery Plan:

4.1 Risk Assessment and Business Impact Analysis

4.2 Creating a Detailed Recovery Strategy

4.3 Establishing Communication Channels and Emergency Procedures

4.4 Regular Testing, Training, and Updates

4.5 Documentation and Continuous Improvement

5. Conclusion:

IT disaster recovery planning is essential for organizations to mitigate risks and ensure business continuity. By learning from real-world examples and implementing best practices, organizations can effectively recover from IT disasters and minimize the impact on their operations.” IT Disaster Recovery: Ensuring Business Continuity In The Face Of Adversity

References: (APA compliant)

[List out the references you have used for your paper following the APA citation style.]