Network Infrastructure And Security Essay

Network Infrastructure And Security Essay

Overview

This assignment consists of two sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment. Network Infrastructure And Security Essay

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

ORDER A FREE-PLAGIARISM PAPER NOW

Instructions

Section 1: Infrastructure Document

Write a 5–10 page infrastructure document in which you:

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.

Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.

Create and describe a comprehensive security policy for the company that will:

Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.  Network Infrastructure And Security Essay

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Revised Project Plan

Use Microsoft Project to:

Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with 3–5 new project tasks each consisting of 5–10 subtasks.

The specific course learning outcome associated with this assignment is:

Prepare a design document proposing the configuration of a secure network infrastructure and a security policy to protect company assets.

Network Infrastructure And Security Essay

 

Project Deliverable 6: Final Project Plan

Project Deliverable 6: Final Project Plan

Section 1: Written Project Plan

You are now in the final stage of the project plan development. All previous documentation should be combined into one document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team. The project plan should be very detailed, which is appropriate to accomplish the monumental task of implementation; however, the executive team is only interested in a 30-minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive team that it should move forward with your solution. Project Deliverable 6: Final Project Plan

ORDER A FREE-PLAGIARISM PAPER NOW

Develop a 30–40 page project plan in which you:

Write a 5–10 page executive summary in which you provide a high-level technical overview of your project where you address the following:  Project Deliverable 6: Final Project Plan

Describe the scope of the project and control measures.

Describe the goals and objectives of the project.

Give a detailed, realistically estimated cost analysis of the entire project, including technical resources (human capital) that may be needed to complete the project.

Relate the value of the project plan solution to the competitive advantage that information technology will afford the organization.

Provide all aspects of the information technology implementation into the project plan.

Recommend solution providers who can assist with development and implementation. Include a cost analysis of at least three providers.

Combine all previous documentation for Project Deliverables 1–5 in which you:

Provide all aspects of the information technology implementation into the project plan.

Revise the documentation based on feedback from the earlier evaluation of the deliverable.

Use at least five quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Revised Business Requirements Document

Document all revisions made to the written project plan in the Document Control section of the business requirements document from Project Deliverable 2: Business Requirements. Note: This documentation must outline the revisions made to the previous deliverables required in Section 1: Written Project Plan.

Section 3: Project Plan PowerPoint Presentation

Additional to your detailed executive summary, you must present your findings to the executive team and the venture capital group; that, along with the executive summary, will convince the group that your solution is optimal. Project Deliverable 6: Final Project Plan

Create a 10–15 slide PowerPoint presentation in which you:

Illustrate the concepts from the executive summary in Section 1 of this assignment.

Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.

Use a professional technically written style to graphically convey the information.

Section 4: Finalized Project Plan

Use Microsoft project to:

Finalize your project plan from Project Deliverable 5: Network Infrastructure and Security to include all necessary changes in assumptions, tasks, and subtasks.

The specific course learning outcome associated with this assignment is:

Develop a comprehensive project plan proposal.

Project Deliverable 6: Final Project Plan

Information Systems homework help

Project Part 10: Evidence Collection Policy

Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps. Information Systems homework help

ORDER A PLAGIARISM FREE PAPER NOW

Address the following in your policy:
 Description of information required for items of evidence
 Documentation required in addition to item details (personnel, description of circumstances, and so on)
 Description of measures required to preserve initial evidence integrity
 Description of measures required to preserve ongoing evidence integrity
 Controls necessary to maintain evidence integrity in storage
 Documentation required to demonstrate evidence integrity

Required Resources
 Internet access
 Course textbook

Submission Requirements
 Format: Microsoft Word (or compatible)
 Font: Times New Roman, size 12, double-space
 Citation Style: APA
 Length: 2 to 4 pages

Self-Assessment Checklist
 I created a policy that addressed all issues.
 I followed the submission guidelines.

Measuring Progress And Requirements Essay

Measuring Progress And Requirements Essay

The Recreation and Wellness Intranet Project team is working hard to ensure the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.

Complete the following in a Microsoft® Word document.

Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case.

Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.

Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials. Measuring Progress And Requirements Essay

ORDER A –PLAGIARISM FREE PAPER NOW

The Recreation and Wellness Intranet Project team is working hard to ensure the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.

Complete the following in a Microsoft® Word document.

Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case.

Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.

Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials.

Measuring Progress And Requirements Essay

 

Challenges With Cloud-Based Reputation

Challenges With Cloud-Based Reputation

One of the big challenges with cloud-based reputation checks is  performance. Users do not typically want to wait a few seconds while the  reputation of potential URLs is checked. Most of us have come to expect  that websites are at the immediate tips of our fingers and that access  and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service  exists in the cloud, the challenge can be summed up as, “How can a  reputation be securely retrieved without slowing Web access down so much  as to create a poor user experience?”
Answer the questions with an APA-formatted paper, in-text citation(Title page, body and  references only). Response should have a minimum of 600 words. A minimum of two references are required. Challenges With Cloud-Based Reputation

ORDER A –PLAGIARISM FREE PAPER NOW

One of the big challenges with cloud-based reputation checks is  performance. Users do not typically want to wait a few seconds while the  reputation of potential URLs is checked. Most of us have come to expect  that websites are at the immediate tips of our fingers and that access  and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service  exists in the cloud, the challenge can be summed up as, “How can a  reputation be securely retrieved without slowing Web access down so much  as to create a poor user experience?”
Answer the questions with an APA-formatted paper, in-text citation(Title page, body and  references only). Response should have a minimum of 600 words. A minimum of two references are required. Challenges With Cloud-Based Reputation

 

Web Traffic Protection Sample Paper

Web Traffic Protection Sample Paper

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode  and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an  always connected, but highly personalized device?
Answer the question with a minimum of 300 words in APA format with in-text citation. A minimum of two references are required. Web Traffic Protection Sample Paper

ORDER A –PLAGIARISM FREE PAPER NOW

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode  and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an  always connected, but highly personalized device?
Answer the question with a minimum of 300 words in APA format with in-text citation. A minimum of two references are required.

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode  and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an  always connected, but highly personalized device?
Answer the question with a minimum of 300 words in APA format with in-text citation. A minimum of two references are required.

Web Traffic Protection Sample Paper

 

Data Visualization Paper

Data Visualization Paper

This week you watched  Big Data Visualization (YouTube Video) and  Information is Beautiful where you learned about how good designs are the best way to navigate information overabundance.

Discussion:
David McCandless turns complex data sets (like worldwide military spending, media buzz, Facebook status updates) into beautiful, simple diagrams that tease out unseen patterns and connections. Choose ONE of the graphics to discuss from Information is Beautiful and then answer the questions below. Be sure to indicate in your response, which of the graphics you have chosen to analyze. Data Visualization Paper.

ORDER A PLAGIARISM-FREE PAPER NOW

Questions: 

  1. Which of the graphics did you choose?
  2. What ideas or pieces of information does the author present? List as many as you can.
  3. Identify the main conclusion told in the graphic. This should not just be the title, but what conclusion you can make from the information provided.
  4. Describe how the author represents data in the graphic. Example, using color to represent two things.
  5. What other ways does the author tell the audience about the key message(s)?
  6. What do you like/dislike about the graphic?

 Topic 2: Infographics
Discussion:
An infographic is a visual representation of information, data, or knowledge meant to present complex information quickly and clearly. Infographics exist on nearly any topic you can imagine, proliferating in the digital age with social media.
Response #1:
Locate an infographic which relates to ONE of the topics covered within this course: (no more than two postings related to the same topic will be permitted). Examples of topics covered in this class are: Fake News, Privacy & Security, Digital Divide, etc.

Responses will need to include, but are not limited to:

  • Title of Infographic (if not available then subject it relates to)
  • URL
  • Topic covered in class that the infographic relates to
  • Detail how the Infographic relates to the topic
  • Analysis and recommendations for adjustment

Minimum Topic Response: PLEASE RESPOND IN THREE OR MORE SENTENCES PER TOPIC.
NOTE 1: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered.
NOTE 2: Please do not attach a file to the conference–enter your reply into the text area provided.
NOTE 3: After you post your response, please review it to make sure it is formatted correctly and is easy to read.

 

Stored Procedures And Triggers Essay Paper

Stored Procedures And Triggers Essay Paper

Group Project

For the group project, you will be creating a database system to solve a business problem of your choice. The database system must meet the criteria shown below. In addition to the database solution, each student will prepare a system summary.

Database System Requirements (Group Work):

  • Create a database and name it ITCO630_GPx where “x” is your group letter. Populate your database with appropriate test data.
  • Include all of the scripts in a single file called ITCO630_GPx.SQL where x is your group letter.
  • Create at least 3 related tables in the database.
  • Create at least 2 stored procedures and a script to use each of them Stored Procedures And Triggers Essay Paper.
  • Create at least 1 view (using a script).
  • Create at least 1 trigger.
  • Create at least 5 useful queries. At least one of these queries should use a subquery and at least 1 of the queries should use an aggregate function.
  • All scripts should be well-documented Stored Procedures And Triggers Essay Paper.

    ORDER A PLAGIARISM-FREE PAPER NOW

Individual Summary:

In addition to the group work described above, each group member will prepare a summary document with the following information. This document will be submitted as a separate item along with the ZIP of the database and the associated files. Do not submit a single group document. This document must be created individually, and copying from other group members is not allowed. Your assignment must include the following:

  • A Word document describing the system
  • An ERD or other graphical representation of the system
  • A description of the views, stored procedures, triggers, and queries
  • Step-by-step instructions on how to run the queries that will demonstrate the functionality of the system
  • A summary of strengths and weaknesses of the system, as designed

Each student will submit the database, log file, and query files in a zip file called ITCO630_GP.ZIP, and his or her own individual summary document as a separate submission. Please detach the database before creating the zip file Stored Procedures And Triggers Essay Paper.

Please add your file.

For assistance with your assignment, please use your text, Web resources, and all course materials Stored Procedures And Triggers Essay Paper.

Advanced Programming Concepts paper

Advanced Programming Concepts paper

Implement in Java with a GUI the game Minesweeper with the following restrictions:

1. Board size: you should give the option to the user to choose at the start of the game between “Beginner”, “Intermediate” and “Advanced”. The board size and number of mines for each of these three choices are the following: Beginner: board 7×9 and 10 mines, Advanced: board 13×18 and 35 mines and finally Expert: board 22×25 and 91 mines

2. your game should have a timer that displays the number of seconds played so far, if the clock reaches 1 minute for Beginner, 3 minutes for Advanced or 10 minutes for Expert then the game is lost and the mines should explode Advanced Programming Concepts paper

ORDER A FREE-PLAGIARISM PAPER NOW

3. Implement some small animation of mines exploding and at the same time the game should also make an exploding sound. Obviously only the not yet uncovered mines should explode,the ones that were marked as mines should not explode. Furthermore your program should point out with a red X the locations where the player marked as mine and were not correct.

4. the control of the game should be done completely by mouse clicks: left click uncovers that location, right click marks as mine in that location, a second right click erases the mine marking for that location

5. BONUS for +2p a second click on a revealed location that has the number of mines adjacent to it marked will uncover automatically all the cells adjacent that are supposed to not have any mines.

As an example of what you should implement try this implementation of minesweeper: http://www.freeminesweeper.org/minecore.html Advanced Programming Concepts paper

 

ARP Poisoning Lab sample paper

ARP Poisoning Lab sample paper

Understanding the functionality of basic Linux systems and the ease in which network attacks can be performed provides students with a foundational understanding of network security and its importance.

Part 1:

Complete the following:

  • View the “ARP Poison Lab” video, located in the Class Resources.
  • Conduct a MAC Spoof and provide a screenshot.
  • Conduct an ARP poisoning attack, change your MAC address, and provide a screenshot of the MAC address change command functioning.
  • Provide screenshots of Windows ARP table, highlight the MAC address of the router and Kali Machine, the ARP spoofing command actively working, and the changed ARP address highlighting the duplicated MAC address.

    ORDER A FREE-PLAGIARISM PAPER NOW

Part 2:

Write a 250- to 500-word lab report and include a title page, table of contents, overview, and summary. Address the following in the summary:

  • Provide your current MAC address and your IP address.
  • Provide the name and IP address of a website.
  • Define a MAC address, ARP, DNS, and spoofing in your own words.
  • Explain why conducting an attack on your roommate or place of work without their permission is illegal or unethical.
  • Explain why conducting an ARP attack on your virtual machine is legal.

ARP Poisoning Lab sample paper