Computer Science Homework Help


Questions

# Description Question
19617

Information

 

 

*Discussion forum task for Module 3

* Module 3 assignment 

* Module 3 quiz- 8 question MC quiz

What's in Module 3? Read Carefully.

Module 3 includes contents from:

·         Mainly chapters 4 and 5 of the R. Watson text. Support for SQL related to these chapters is also in Chapter 10.

·         Supplementary content can be found in multiple locations, including:

o    J. Murach, MySQL recommended text: in case you still have trouble installing MySQL server and Workbench, see Appendix A (for Windows) and B(for Mac OS) 

o    J. Murach for MySQL queries: Chapter 4: How to retrieve data from two or more tables.

o    Free online tutorials:

§  Video tutorials at lynda.com, free as a TWU student, but you have to set up an account through TWU

§  At http://www.mysqltutorial.org/  (interactive)

§  Section 5 on joining tables

§  Section 13 on constraints (How to set foreign keys)

If you have questions or need clarification, let your instructor know as soon after the module post. Post questions in the office hour forum. Clarifications and questions may be added to this document as needed.

Tasks for this module

1.  Readings: Extracting Data from Two or More Entities: 

·         A slide outline is provided to guide your reading for each chapter.

o    Outline for Chapter 4: The One-to_Many Relationship

o    Outline for Chapter 5: The Many-to_Many Relationship

o    There is a discussion forum for this  module.

§  You are required to participate in one of the discussion forums.

§  If you missed a discussion forum in a previous module, you may participate for credit in a second discussion forum (i.e. a make-up missed discussion forum opportunity). If you take this opportunity, you must participate in discussion topics from both chapters.

o    You will learn about how tables are related and connected to each other. The diagrams shown in the chapters come from different software packages, and you will notice they are similar but not identical. The idea here is to understand what relationships are and how to make those relationships work in SQL and queries without getting lost in the details of the diagram. In another unit, later in the semester, we will dig into the diagrams (models) themselves, and understand how to create them. For this module concentrate on understanding the relationships between any 2 tables to:

§  Understand from which tables the data you want in query results need to come.

§  How you need to connect those tables (i.e. set foreign key constraints to set the relationships)

§  How to join to tables in a query.

o    For the other elements (fields, aggregate functions, WHERE clause, etc.) those are mostly as in the previous module.

o    You will practice creating, populating and querying 2 or more database tables in this unit. 

§  The discussion forum gives you the opportunity to practice and get feedback on examples. So it's important to participate early in the module time frame. Discussion boards will not be reset.

§  Detailed instructions and topics are listed in the forum.

§  The discussion forums are graded, and participation is required. Access the discussion forum for chapter 3.

·         You will need to create database tables and write some queries. If you do not have the MySQL software in place yet, you can again use an online SQL emulator for this module. However, you will want to have MySQL in place for module 4.

·         (This is a repeat from the Module 3 post) How to work with an SQL emulator:

o    Write and same your SQL code using a text editor. This is IMPORTANT, as a word processor such as MS Word will alter elements of the code.

o    What is a good text editor? There are several free downloadable example available, for example I use Notepad++ or Komodo Edit.

o    Write your code in a text processor, so you can save it. Save any code you write as and sql document. You can copy and paste the text into an SQL emulator.

o    Emulators are available (free) online. Each comes with some sample SQL code (which you can delete). These are the ones I've tried:

§  From codingground (Links to an external site.)Links to an external site. at tutorialspoint.com

§  The one at jdoodle (Links to an external site.)Links to an external site. is also good. 

o    Write or copy your code in the window, and execute. Save your code and results as needed.

2.  Complete the assignment for the module.  The module assignment requires you to apply your knowledge and understanding of concepts presented in the module. Follow the link to access the Assignment for module 3. A direct link to the assignment is also posted in the module.

3.  Complete the module quiz. The module quiz tests your knowledge and understanding of terms, definitions and concepts presented in the module. Fill in the blank questions will be reviewed for correctness manually. 

4. All tasks are due by end-of-day 10/2/2018. Summary of tasks:

·         Discussion forum task for Module 3

·         Module 3 assignment 

·         Module 3 quiz

Discussion:

This is the forum for the discussion question in Module 3, Chapters 4 and 5. Carefully study the examples in the chapters first. Participate EARLY in the module.

From previous module: A step-by-step example of how toDescription: Preview the document create a database, a database table, and populate a database table. The example uses the SHARE entity and data from the text. 

Participate in ONE discussion topics for the chapter as follows.

·         Please REVIEW the post in the Module 3 Overview page on some make-up credit opportunity if you've missed a discussion forum in the past modules.

·         You can use an emulator to generate tables and queries.

·         The discussion forum for this module is progressive. In other words, the tasks in the first topic must be completed, before the queries in subsequent topics can be completed.

Topics for Chapter 4: 

·         C4_CSN: Create the STOCK and NATION database at the beginning of the chapter and populate it with data. Note that the STOCK table is the SHARE table from the previous chapters, with small modifications. You can copy the code for creating and populating the SHARE table and modify it. Populate the tables with data. The initial post should be the code to create the database. Subsequent post in this thread can be the INSERT statements to populate and add data to the tables.

·         C4_QSN: Write and execute 2 of the queries shown in the text on the database created in C4_CSN. Can you repeat a query already posted? Only if your query is different or if there is an error. Otherwise choose different query. If there are no query examples left in the chapter, create a new one on your own (see next topic). Document each query - i.e. explain what output data it generates.

·         C4_MQ-18: Write the SQL for query in slide 18 of the chapter outline on the database created in C4_CSN. You can improve on a posted solution.

·         C4_MQ-27: Write the SQL for query in slide 27 of the chapter outline on the database created in C4_CSN.  You can improve on a posted solution.

Topics for Chapter 5:

·         C5_CMN: Create the example data base used in chapte 5 of the text and populate it with data. The initial post should be the code to create the database. Subsequent post in this thread can be the INSERT statements to populate and add data to the tables.

·         C5_QMN: Write and execute 2 of the queries shown in the text on the database created in C5_CMN. Can you repeat a query already posted? Only if your query is different or if there is an error. Otherwise choose different query. If there are no query examples left in the chapter, create a new one on your own. Document each query - i.e. explain what output data it generates.

Questions?

·         Participation means that you contribute a significant post or a significant comment on one or more posts by others in the thread. Your posts should be detailed, address specific examples or experiences, and documented if possible with URL references. 

·         You must use threaded replies:

o    If you are the first to post on a given topic, start a new thread. Use the thread names listed above

o    Use reply in subsequent posts for the same topic

o    You may use any number of likes

·         The discussion forum is graded: 5 points for the required post. Up to 5 points if you are taking the make-up opportunity.

 

SQL DATABASE
19578

 

You are a book store chain like Barnes and Nobles or 2nd and Charles.

You decide that your current application is not up to date anymore and is not serving your company like it should. To gain more speed and agility you decide to create a new application that will allow for customers to search and buy books online, but also in the store, rang out through a sales person.

The new application will need an up to date database. Design the database so books can be searched very quickly and everything goes fast.

 

 

  • Step 1: Define the Purpose of the Database (Requirement Analysis) ...
  • Step 2: Gather Data, Organize in tables and Specify the Primary Keys. ...
  • Step 3: Create Relationships among Tables. ...
  • Step 4: Refine & Normalize the Design
database design
19565

Hello, I have 1 hour exam after 5 hours, the subject will be about:

- Numerical Methods and MATLAB Fundamentals
- Programming with MATLAB
- Root Finding - Bracketing Methods and Open Methods
- Optimization
- Solving Simultaneous Equations, Gauss Elimination
- LU Factorization, Gauss-Seidel and Newton-Raphson Methods
- Eigenvalues

there is a study guide for the test.

Exam in ADVANCED ENGINEERING ANALYSIS.
19507

Assignment-1

Internet of Things Devices

·         Consider the various types of mobile and Internet of Things (IoT) devices. What are the common risks associated with them?

·         Based on what you have learned this week, would you be comfortable having a “smart home” (a home with many automated/IoT devices)? Why or why not?

Write a one-page paper to summarize your thoughts.

 

Assignment-2

Complete Case Project 8-6 on page 368 of the Ciampa text

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.

1.    Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides.

2.    After the presentation, Pomodoro Fresco is trying to decide if they should install a captive portal for their customer WLAN. Create a memo to their management outlining the advantages and disadvantages, along with your recommendation.

 

Assignment-3

Each summer LPCS holds a weekly series of workshops for anyone interested who wants to learn more about securing their computer. LPCS has asked you to make the first presentations of the summer series.

1.    For the first presentation, create a PowerPoint presentation about the basic steps in securing a client computer, why it is important, what antimalware software should be considered, etc. Because the attendees will not have an IT background, the presentation cannot be too technical in nature. Your presentation should contain at least 10 slides.

2.    For the second presentation, create a PowerPoint presentation that covers how to secure a computer from theft. Be sure to cover cable locks, door locks, etc. For this presentation, it should contain 6–10 slides.

 

Assignment-4

Complete Case Project 10-6 on page 466 of the Ciampa text

The Carlyle-Stedman Museum provides patrons with mobile devices that contain prerecorded information that can be listened to while viewing the museum’s artifacts. Recently an incident occurred in which a patron circumvented the security on the device and, because it was not examined after it was turned in, the next patron who tried to use it was exposed to inappropriate content. The executive board of Carlyle-Stedman decided that something must be done to prevent this from reoccurring, and wants to ensure that all employee mobile devices are also secure. They have asked LPSC to make a presentation about mobile device security, and you have been given this assignment.

1.    Create a PowerPoint presentation for the staff about the security risks of mobile technology and steps to be taken to secure mobile devices. Be sure to cover these from the perspective of the organization, the IT department, and the end user. Your presentation should contain at least 8 slides.

2.    After the presentation, the IT director at Peabody has asked LPCS for recommendations on using MDM, MAM, and MCM for the museum. Write a one- page memo listing the features of these tools and how they could be used to help Peabody.

 

 

Cyber security
19444

Publications of CS and MATH Students at Rivier University

Published in The Journal of Computing Sciences in Colleges (June 2011):

Selent, D. "The Design and Complexity Analysis of the Light-Up Puzzle Program," Journal of Computing Sciences in Colleges, Vol. 26, No. 6, 2011, pp. 187-189.

Published in the Proceedings of Winter-2005 Simulation Conference:

Milkovits, M. N. Digital Video Cluster Simulation. In: Proceedings of the 37th Winter-2005 Simulation Conference; M. E. Kuhl, N. M. Steiger, F. B. Armstrong, and J. A. Joines, eds., 2005, pp. 2400-2407. ISBN: 0-7803-9519-0; DOI:10.1145/1162708.1163127; Online: http://dl.acm.org/citation.cfm?id=1162708.1163127

 

Published in the Book of Abstracts of 2013 NES/MAA Fall Meeting:

Maxim Sukharev-Chuyan, Lorenz System Simulation. In: The Book of Abstracts of NES/MAA Fall-2013 Meeting (Wheaton College, Norton, MA, November 22-23, 2013), Mathematical Association of America, New England Section, p. 1. Online: https://sites.google.com/site/nesmaafall2013/

 

Published in the Rivier Academic Journal (Fall 2005 – present):

FALL 2013 (Vol. 9, No. 2)

The Lorenz System Simulation, by Maxim Sukharev-Chuyan, Souhegan High School, Amherst, NH

A Study of Cubic Spline Interpolation, by Kai Wang ‘14G, M.S. Program in Computer Science

Adaptive Bit-rate Streaming, by Ted D. Monchamp, M.S. Program in Computer Science

SPRING 2013 (Vol. 9, No. 1)

Putting Life on Mars: Using Computer Graphics to Render a Living Mars, by Kevin M. Gill ‘11G, Thunderhead.com

Data Visualization Using OpenGL, by Mary Slocum ‘13G, M.S. Program in Computer Science

FALL 2012 (Vol. 8, No. 2)

The Role of Number Theory in Modern Cryptography, by Robert R. Marceau, M.S. Program in Computer Science

Decision Making Using ID3 Algorithm, by Mary Slocum, M.S. Program in Computer Science

SPRING 2012 (Vol. 8, No. 1)

Designing an Easily Modifiable Cipher for Educational Purposes, by Michael Jeffords, M.S. Program in Computer Science

Casting Shadows: Shading Digital Elevation Models Using Ray Tracing, by Kevin M. Gill, Fidelity Investments

FALL 2011 (Vol. 7, No. 2)

Classroom to Cubicle: Hitting the Ground Running in the Real World of Software Development, by Mary Slocum, M.S. Program in Computer Science

Clue Computer Game, by Douglas Selent ‘11G, M.S. Program in Computer Science

Journey to the Cloud, by Venubabu Kunamneni ‘11G, M.S. Program in Computer Science

Improvements in Estimating Software Reliability from Growth Test Data, by David J. Dwyer ‘99G and Paul D’Onofrio ‘10G, Department of Mathematics & Computer Science; BAE Systems, Nashua, NH

SPRING 2011 (Vol. 7, No. 1)

Applying Multimedia Compression Techniques to Ground Penetrating Radar Data, by Michael Jeffords, M.S. Program in Computer Science

An Analysis of the Worst-Case Performance of Quicksort, by Robert R. Marceau, M.S. Program in Computer Science

FALL 2010 (Vol. 6, No. 2)

Advanced Encryption Standard, by Douglas Selent, M.S. Program in Computer Science

Improvements in Automated Reliability Growth Plotting and Estimations, by David Dwyer, Edward Wolfe, and Jonathan Cahill, Department of Mathematics & Computer Science, BAE Systems

FALL 2009 (Vol. 5, No. 2)

RADIUS: A Remote Authentication Dial-In User Service, by Daniel Szilagyi, Arti Sood and Tejinder Singh, M.S. in Computer Science Program

FALL 2008 (Vol. 4, No. 2)

Coding Theory: Introduction to Linear Codes and Applications by Jay Grossman, B.A. in Mathematics Program

SPRING 2008 (Vol. 4, No. 1)

An Overview of Internet Protocol Multimedia Subsystems (IMS) Architecture, by Jhansi Jujjuru, M.S. in Computer Science Program

FALL 2007 (Vol. 3, No. 2)

Network Access Control, by Arti Sood, M.S. in Computer Science Program

Alexander Fleming's Miraculous Discovery of Penicillin, by Stacie L. Derderian, B.A. in Mathematics

Incidence of Antibiotic Resistant Strains of Helicobacter pylori: Can It Explain the Low Cure Rate of the Infection? by Stacie L. Derderian, B.A. in Mathematics

SPRING 2007 (Vol. 3, No. 1)

Introduction to the IEEE 802.16 Standard: Wireless Broadband Access, by Robert J. Zupko II, B.S. in Computer Science Program

Network Design by Using OPNET™ IT Guru Academic Edition Software, by Arti Sood, M.S. in Computer Science Program

FALL 2006 (Vol. 2, No. 2)

Wi-Fi Technology: Security Issues, by Vandana Wekhande, Department of Mathematics & Computer Science

Musician Web-service Using Ruby-on-Rails, SOAP, FLEX, and AJAX, by John Dion, Department of Mathematics & Computer Science

Motivational Study Cases for the Introductory Mathematics Course in Colleges, by Vladimir V. Riabov and Jamie Anderson, Department of Mathematics & Computer Science

SPRING 2006 (Vol. 2, No. 1)

Automated Music Composition: An Expert Systems Approach, by John Dion, Department of Mathematics and Computer Science

Software Reliability Estimations/Projections, Cumulative and Instantaneous, by David Dwyer, BAE Systems

An Overview of Voice over IP, by Ajay Kumar, Department of Mathematics and Computer Science

An Overview of Broadband over Power Line, by Bruce R. Trull, Department of Mathematics and Computer Science

FALL 2005 (Vol. 1, No. 1)

Personal Encrypted Talk - Securing Instant Messaging with a Java Application, by David Snogles

Development of Laboratory Exercises Based On OPNET IT Guru Academic Version, by Ajay Kumar

Using OMNeT++ to Simulate a Heterogeneous Digital Video Cluster Fabric, by Martin N. Milkovits

 

 

PROJECT WORK
19438

There are many different tools available to forensic investigators, law enforcement personnel, and security and network administrators. These tools are used to create, examine, analyze, and classify digital evidence. For this class, Introduction to Computer Forensics, and Computer Forensics Analysis we will utilize tools developed by AccessData Group such as Forensic Toolkit (FTK), FTK Imager, Password Recovery Toolkit (PRTK), and Registry Viewer. 

Assignment:

What other analysis tools are available (our book gives several examples) for organizations to use, who are the developers of those tools (organization/individual/open source), and what is the use of each tool you are reporting? 

Find three different tools used/available. Answer the above questions with a minimum of 1 full page (more pages are certainly acceptable). Set your paragraphs to 1.5 spacing, 0 points before and after. Use Arial or Times New Roman font, size 12 point. You only need to include your name at the top of the document, the rest is content.

COMSC INTRO COMP FORENSICS
19422

One of the major causes of system performance issues is programs that run in the background and are started when the system starts. These programs are usually installed, so they are started from one of two entries in the system registry:

  • HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
  • HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run

As a network administrator, you would like to gather information about these registry entries for all the computers in the network. You have selected Windows PowerShell to write a script for this task. Your plan will result in a document with a script for the tasks involved. Because there are security issues that prevent executing the scripts on remote computers, the script will be distributed to all users on the network as a download link on the company intranet. For purposes of this exercise, security issues can be ignored, so the script is not required to take security issues into account.

  • Prepare a document to submit your work:
    • Use Word.
    • Title Page
      • Course number and name
      • Project name
      • Student name
      • Date
    • Provide well-documented source code for a Windows PowerShell script that will perform the following tasks:
      • Read the registry entries from both of the locations named in the project description.
      • Compare each entry to a list of acceptable entries. The acceptable entry list is from a text file named "Acceptable_Reg.txt" that will accompany the script when the script is downloaded.
      • Produce a text file report that lists all unacceptable registry entries. Save the report using the computer name as the file name.
      • Transmit the report file to the following intranet address:
        • intranet.xyzcompany.com/bad_reg.aspx
  • Name the document yourname_ITSD327_IP4.doc.
  • Submit the document for grading

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Due on friday
19419

Team Project

New Content for Week 3: System Design

For this week's contribution to the overall capstone project, collaborate and discuss with the team's Security Specialist about the security and privacy of the software and hardware solution for Verbania. Provide best security practices and guidelines to implement and follow, as well as the creation of formal security policies and a security plan. Include the following policies in your IT security policy:

  • Disaster recovery
  • Password creation and protection
  • Remote access
  • Routers and switches security
  • Wireless communication
  • Server security
  • Acceptable encryption
  • E-mail

Document the team's security plan, security policy and security solution.

Within the template, prepare 5-7 pages of content addressing the team's System Design. Insert content into the template document under Section Three.

Part 3 - Individual Project - Submit to the Unit 3 IP Area

This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual drop box.

Individual Submission

Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team's Security Specialist.

New Content for Week 3: System Design
19376

1) Compare and contrast the characteristics of classic and modern cryptography.
(Maximum: Half a Page, double-spaced)

(2) Describe the evolution of cryptography by listing the main four stages.
(Maximum: Half a Page, double-spaced)

References and in-text citations must be APA compliant.

Compare and contrast the characteristics
19374

Lab #1 Identifying Threats and Vulnerabilities in an IT Infrastructure

Introduction

The task of identifying risks in an IT environment can become overwhelming. Once your mind starts asking "what if. .. ?" about one IT area, you quickly begin to grasp how many vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for risks across the whole IT environment.

Thankfully, a solution is at hand that simplifies identifying threats and vulnerabilities in an IT infrastructure. That method is to divide the infrastructure into the seven domains: Wide Area Network (WAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Local Area Network (LAN), Workstation, User, System/Application, and Remote Access. Systematically tackling the seven individual domains of a typical IT infrastructure helps you organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.

In this lab, you will identify known risks, threats, and vulnerabilities, and you will organize them. Finally, you will map these risks to the domain that was impacted from a risk management perspective.

Learning Objectives

Upon completing this lab, you will be able to:

Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure.

Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure.

Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective.

Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.

1

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.


 

41 LAB #1 Identifying Threats and Vulnerabilities in an IT Infrastructure

Risks, Threats, and Vulnerabilities

Primary Domain Impacted

Unauthorized access from public Internet

 

Hacker penetrates IT infrastructure through

 

modem bank

 

Communication circuit outaqes

 

Workstation operating system (OS) has a

 

known software vulnerability

 

Denial of service attack on organization's e-

 

mail server

 

Remote communications from home office

 

Workstation browser has software vulnerability

 

Weak ingress/egress traffic-filtering degrades

 

performance

 

Wireless Local Area Network (WLAN) access

 

points are needed for LAN connectivity within a

 

warehouse

 

Need to prevent rogue users from

 

unauthorized WLAN access

 

Doctor destroys data in application, deletes all

 

files, and gains access to internal network

 

Fire destroys primary data center

 

Intraoffice employee romance gone bad

 

Loss of production data server

 

Unauthorized access to organization-owned

 

workstations

 

LAN server OS has a known software

 

vulnerability

 

Nurse downloads an unknown e-mail

 

attachment

 

Service provider has a major network outage

 

A technician inserts CDs and USB hard drives

 

with personal photos, music, and videos on

 

organization-owned computers

 

Virtual Private Network (VPN) tunneling

 

between the remote computer and

 

ingress/egress router

 

Subsequent next steps in the real world include selecting, implementing, and testing controls to minimize or eliminate those risks. Remember that a risk can be responded to in one of four ways: accept it, treat it (minimize it), avoid it, or transfer it (for example, outsource or insurance).

~Note:

Some risks will affect multiple IT domains. In fact, in real-world environments, risks and their direct consequences will most likely span across several domains. This is a big reason to implement controls in more than one domain to mitigate those risks. However, for the exercise in step 6 that follows, consider and select only the domain that would be most affected.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Assessment Worksheet

Aligning Risks, Threats, and Vulnerabilities to COBIT POg Risk Management Controls

Course Name and Number: ___________________________________________________ _

Student Name: _________________________________________________________ _

Instructor Name: ________________________________________________________ _

Lab Due Date: _________________________________________________________ _

Overview

In this lab, you defined COBIT P09, you described COBIT P09's six control objectives, you explained how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you used COBIT P09 to determine the scope of risk management for an IT infrastructure.

Lab Assessment Questions & Answers

1. What is COBIT P09's purpose?

2. Name three of COB IT's six control objectives.

3.       For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure?

4.       True or false: COBIT P09 risk management control objectives focus on assessment and management of IT risk.


 

17

5. What is the name of the organization that defined the COBIT P09 Risk Management Framework?

6. Describe three of the COBIT P09 control objectives.

7. Describe three of the COBIT P09.l IT Risk Management Framework control objectives.

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com

lab worksheet
19367

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

System administration involves a large number of tasks that require access to network servers and workstation computers. Scripting is commonly used for many of these tasks to reduce the labor and to also reduce the likelihood of mistakes. Many of the tasks require administrative access to the computers, and security must be maintained. Your IT group is currently working on a plan to automate as much of the administration work as possible using scripts, but they want to ensure that the security of all systems is maintained. You have been asked to investigate the issues surrounding security and the use of scripts in a network environment and report your findings to the IT group.

  • Use the Library and Internet to find information about maintaining security when using scripting for system administration in a network environment. 
  • As part of your response to the IT group:  
    • Identify at least 2 administrative IT tasks where scripting could be used but security would present an issue. 
    • Describe a solution for each task that will maintain security and still allow a scripted solution for the task. You are not required to write any scripts for this discussion, but you should discuss how the security issues would be resolved if a script was applied to complete the task. 
  • Include at least 1 reference to research sources. 
  • Cite all references using APA format. 
  • Grammar, spelling, punctuation, and format should be correct and professional. 
  • Respond to at least 2 other classmates’ postings during the week.
The Discussion Board (DB) is part of the core of online learning.
19366

One of the major causes of system performance issues is programs that run in the background and are started when the system starts. These programs are usually installed, so they are started from one of two entries in the system registry: 

  • HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run 
  • HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run 

As a network administrator, you would like to gather information about these registry entries for all the computers in the network. You have selected Windows PowerShell to write a script for this task. Your plan will result in a document with a script for the tasks involved. Because there are security issues that prevent executing the scripts on remote computers, the script will be distributed to all users on the network as a download link on the company intranet. For purposes of this exercise, security issues can be ignored, so the script is not required to take security issues into account.

  • Prepare a document to submit your work:  
    • Use Word. 
    • Title Page  
      • Course number and name 
      • Project name 
      • Student name 
      • Date 
    • Provide well-documented source code for a Windows PowerShell script that will perform the following tasks:  
      • Read the registry entries from both of the locations named in the project description. 
      • Compare each entry to a list of acceptable entries. The acceptable entry list is from a text file named "Acceptable_Reg.txt" that will accompany the script when the script is downloaded. 
      • Produce a text file report that lists all unacceptable registry entries. Save the report using the computer name as the file name. 
      • Transmit the report file to the following intranet address:  
        • intranet.xyzcompany.com/bad_reg.aspx 
  • Name the document yourname_ITSD327_IP4.doc. 
  • Submit the document for grading
due on monday
19353

Instructions

Create a 7-10- slide PowerPoint Presentation on the challenges of securing information, and list some of today’s information security attacks. You may use various sources (scholarly), but at a minimum, your textbook must be used. Be sure to cite any sources used in a reference slide with proper APA formatting. (Title and reference slides do not count in the total number of slides).

read and my price will not change
19296

Note:300 words 

due:12 hrs 

please attach turntin report 

 

Chapters 4, 5 and 6 of our book covers approaches to security, protective and physical barriers.  Your discussion subject of this week is to write an initial post on which one of these barriers are most important when it comes to securing a server room?

Please make sure you have an initial post (about 300 words) and a comment/post to one of your friends' posts.

Discussion
19267

Due Week 10 and worth 210 points

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the U.S.
  • They utilize a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.
  • They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.

Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:

1.    Develop an Internal IT Audit Policy, which includes at a minimum:

a.    Overview
b.    Scope
c.    Goals and objectives
d.    Compliance with applicable laws and regulations
e.    Management oversight and responsibility
f.    Areas covered in the IT audits
g.    Frequency of the audits
h.    Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Management Plan
Write a four to six (4-6) page paper in which you:

2.    Explain the management plan for conducting IT audits, including:

a.    Risk management
b.    System Software and Applications
c.    Wireless Networking
d.    Cloud Computing
e.    Virtualization
f.    Cybersecurity and Privacy
g.    BCP and DRP
h.    Network Security
i.    Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 3: Project Plan
Use Microsoft Project or an Open Source alternative, such as Open Project to:

3.    Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

a.    Risk management
b.    System software and applications
c.    Wireless networking
d.    Cloud computing
e.    Virtualization
f.    Cybersecurity and privacy
g.    Network security

Section 4: Disaster Recovery Plan
Write a five to seven (5-7) page paper in which you:

4.    Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

a.    The organization must have no data loss.
b.    The organization must have immediate access to organizational data in the event of a disaster.
c.    The organization must have critical systems operational within 48 hours.
d.    Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.
e.    Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the Sarbanes-Oxley (SOX) act and Committee of Sponsoring Organizations (COSO) framework.
  • Describe the process of performing effective information technology audits and general controls.
  • Describe the various general controls and audit approaches for software and architecture to include operating systems, telecommunication networks, cloud computing, service-oriented architecture and virtualization.
  • Explain the role of cybersecurity privacy controls in the review of system processes.
  • Discuss and develop strategies that detect and prevent fraudulent business practices.
  • Describe and create an information technology disaster recovery plan.
  • Develop an audit plan and control framework that addresses and solves a proposed business problem.
  • Use technology and information resources to research issues in information technology audit and control.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

Term Paper: Managing an IT Infrastructure Audit
19253

Read the assigned resources pertaining to this week’s topics. Conduct a comprehensive literature search and locate six additional scholarly peer-reviewed works that provide sufficient background on the topic of software defined networks (in general). Then construct a thematically sorted, critical annotated bibliography of all the works addressing the items below (for each work).

  • The      work’s purpose
  • A      concise summary of its contents
  • Its relevance      to the topic
  • An      analysis of the contribution’s unique characteristics
  • Your      critical analysis of the study’s strengths and weaknesses

This annotated bibliography should provide sufficient background on the topic to provide a foundation for additional scholarly work.

Also, note that the analysis of the works should not focus on any challenges faced with the technologies’ implementation, development, or application as a technological analysis will be conducted next week.

Finally, write a short introduction that orients your reader to the works and highlights any major findings or common themes.

Lengths: Introduction: 250-500 words (1 page); Annotations: 250-300 words each (half page); Total assignment: 2,500-3,000 words (7-9 pages)

Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards

Spotlight on Skills: Annotated Bibliogr-aphy

For information on annotated bibliographies. visit the Conducting Research and Forms of Wn"ting sections in the Academic Success Center (click the links in the left side navigation area of the Academic Success Center screen). The APA Manual also has examples of an annotated bibliography.

Be sure to review this week's resources carefully. You are expected to apply the information from these resources when you prepare your assignments.

All r-esour-ces for- this week:

Article/Jour-nal

Sarona Lopez, L. l •• Valdivieso Caraguay. A. L, Garcia Villalba. L J •• &. Lopez. D. (2015). Trends on virtualisation with software defined networking and network function virtualisation. lET Networks, 4(5), 255-263.

htte: l/ieeexp 10 reo ieee.o rg,:.eroxy 1. ncu .ed u (d ocu mentl? 2 7 21851

Website link(s)

Purdue OWL (n.d.). Annotated bibliography samples. httQs:/lo\"I.english.Qurdue.edu{0\,"'resource/614{031

lngram Micro Advisor. (n.d.). 5 differences between SON and network functions virtualization (NFV) [Weblog post). lngram Micro Resource Center. htte:/I\',ww.ingrammicroadvisor.com/data-center/5-differences-between-sdn-and-neh-/ork-functions-virtualization

Week 1 - Assignment: Sean:h and Review Ltteeatuee Related to Softwar-e Defined Networ-king (10 Points)

PhD TIM- Search and Review Literature Related to Software Defined Networking
19246

The head of the IT security department expressed her concerns about  series of data breaches that occurred in the company and mentioned that  many employees ignored their system security warnings.  You have been  asked to provide a summary of information to the entire team about data  breaches and suggest proactive and preventative measures for warding off  viruses. Your presentation will be sent out to all company employees,  so the information must be clear, concise, and informative.

  1. To prepare for creating your presentation, use your personal computer to perform the following tasks:
  • Investigate whether you have an anti-virus software running on your  machine and from which company (Norton, Kaspersky, Webroot, etc.).
  • Investigate if a firewall is enabled on your machine and if you need Windows® firewall running in addition, if that anti-virus software is installed on your machine.

2. Create a narrative and include the following in your narrative:

  • Definition of a data breach
  • Ways to determine if your system was infected with a virus
  • At least three preventive measures against data breaches, both physical or digital
  • Step by step instructions to find if anti-virus and firewall software is loaded on your computer
  • Instructions on what to do if a virus has infected your computer

The narrative submitted must be a Word document.

project 5
19210

Week 3 Discussion 1: Initial post due Wednesday by midnight EST

Each of us perceives "ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistleblowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the "unethical person” and any risk involved in "whistle blowing”.

1. Stealing from an employer

2. Falsifying a time sheet

3. Padding an expense account

4. Falsifying any document or record

5. Lying about the conduct of a co-worker

 

Discuss the above topic in 300 words using APA format.

Negotiation and Conflict Resolution(Discussion1W3)
19208

For this assignment, you will discuss the computer forensics presentation guidelines needed to organize, develop, and validate your computer forensics or incident response report with the rest of your forensics or incident response team. You will develop an 8–11-slide presentation detailing the process of how you were able to organize, develop, and validate your forensics or incident response report.

Structure and execute the presentation in the following manner:

Provide a training presentation (with the following format):

  • Title slide  
    • Case identifier (Use C001 or if incident response, use I001)  
    • Case investigator (student name)  
    • Date of report
  • Slides 2–3: How the forensic or incident response documentation was organized  
    • Note: This should include how you organized your analysis, evidence logs, investigator notes, witness statements, and digital evidence. 
  • Slides 3–4: How to develop the forensics presentation  
    • Note: This should show how an investigator should organize the presentation to show investigator actions and results (what actions were conducted, why they were conducted, and the results of the actions)  
      • Summary of analysis against evidence items identified in either section of the reports 
  • Slides 5–6: How to create the report  
    • Note: Describe how the investigator will communicate the results of the case/incident in a report and if computer forensics tools can be used to automate the report generation. 
  • Slides 7–8: Report technical validation  
    • Note: Describe how the other forensics team or incident response members should review and validate the evidence analysis and findings in the report. 
  • Slides 8–9: Report archiving procedures  
    • Note: Describe how the case must be archived and how the chain of custody must be maintained to include any reports, notes, working papers, and digital evidence. 
  • Provide an audio recording, starting on Slide 3, summarizing the main points for each slide, and embed the audio on each slide up to the conclusion.

Additional slides may be needed to respond to the requirements above. Please use no more than 11 slides to complete this assignment.

Use APA format with references used either on the slide or in the speaker notes.

Use the slide speaker notes to amplify the bullets stated on the slide. 1–3 paragraphs are usually written in the speaker notes to amplify the bullets on the slide.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Use the tools below to implement your audio:

Proceed with one of the options in the table below to create your MP3 file of your audio presentation.

(Note that the Sound Recorder may already be on your computer. All Windows systems loaded in the last 15 years should already have this simple piece of software. Look in your programs. On many systems, it is located under All Programs > Accessories > Entertainment > Sound Recorder.)

The following table contains different programs that can be used to create an MP3 audio file, as well as links to download the programs and instructions for using them:

   

Program

 

Windows

 

Mac

 

Ease of Use

 

Free Sound Recorder 2010

 

Download instructions/
User instructions 

 

Not Available

 

Very Easy

 

RecordPad (14-Day Trial)*

 

Download instructions/
User instructions 

 

Download instructions/
User instructions 

 

Easy

 

Audacity

 

Download instructions/
User instructions 

 

Download instructions/ User instructions 

 

Difficult

*Note: If you intend to use this program, do not download it until you are ready to complete your assignment.

Complete the following steps for this assignment after recording your presentation:  

  • Name the document "yourname_ITDI373_IP4.doc."   
  • Submit the final procedures manual document for grading. 

Use this link to review a tutorial on recording your presentation. 

iscuss the computer forensics presentation guidelines
19192

CS 166 02

Exercise Assignment Chapter 02

10 Points

Name _______________________________

 

Due:      Tuesday, September 4, 2018

 

Complete Exercise 2-1 on pages 61-62.  If you haven’t copied the programs from the Instructor drive, you need to do that before starting this assignment.

 

To keep a clean copy of your program, you might want to create a folder for this assignment and copy the program to it.  This way, you can then copy this folder to the instructor drive as explained below.

 

Add the following comments to the top of the code:

·         Name

·         Class and section (CS 166 02)

·         Assignment (Chapter 02)

·         Due Date (see above)

·         Description of the program

 

In order to receive credit, complete the following:

·         Print the source code

·         Attach this sheet to the front of the source code

·         Copy the folder you created for this assignment to your folder in the I:\kopp\inbox\CS 166 02 folder.

Object Oriented Programming in Java homework
19188

I have attached files. need to complete 3 of them.

1)  Discussion Question --- assignment.docx

2) Need to response1 to classmates discussion. 

3) Need to response2 to classmates discussion.

For more info refer attached need to need to response1&2.docx

1. Using expected value, is it economically better to make or buy the component? 

Organization buys each part for $60 

Then, the cost for 10,000 sections is $720,000 by that time. 

Cost is $50,000 

Setup cost = $100,000 

Unrefined material cost for 1 area = $40 

Rough material cost for 10,000 segments = $400,000

No. of deficient parts = (0/100) (10/100*10,000) + (10/100) (20/100*10,000) + (20/100) (30/100*10,000) + (30/100) (25/100*10,000) + (40/100) (15/100*10,000) = 2150 

Cost to repair 1 deficient part is $120 

Cost to repair 2150 deficient parts is 2150*$120 = $258,000 

Adding up the cost of 10,000 parts is $100,000 + $400,000 + $258,000 = $758,000 

Cost for total buying= 72*10,000= $720,000.

In this case, it is economically better to buy the component, instead of manufacturing it on our own, because we can save $38,000 if we buy the component.

2. Strategically thinking, why might management opt for other than the most economical choice?

For vitally reasoning, few short-lived and long time targets are associated to get a sort of lucrative beneficial house ventures. If the target of one's venture commit game a short-lived objective for XYZ Company, and after that, the main cost-effective alternatives may possibly pass their scheme. But most of your companies who're the main sorters within the free-trade area, the long time intentions and sustainability are the aphorism for his or her institution (Harold, 2013). 

According to Kerzner (2013), as Jonathan cited in his examination, “Today, the contest for industrial creation has changed into aggressive. Companies experience passing through the wheel of life phases of centralizing all activities, in particular, operation functions…”

Organizations want Teloxy operation may commit to carrying out the components private in the event that they have faith which the long run marketplace for the particular products passion know rich to call for and internal erection passion produce expertise inside the close to long term. Learning by action passion again make a bigger transaction of quit willing components inside the long run. In-house assembling determination not simplest cut back the colony of out-sourcing for creating the completed products but more, a character sure the longer term continuous venture leave components omission or long run sharper redeem sell for. In this type, Teloxy care may again make a contribution for earnings time by transferring the bi-products and/or unused and may rank the infrastructure/expertise. In probability, within the flood industrial ambience, the diplomatic supervision is critical and can be a ground for the belief of your continuous evolution of a company, and thus- of one's deduction and network as a whole (Blaine, 2015).

References

Blaine, B.W. (2015). Technology management advanced program & project management. Retrieved from,

http://www.bridgeport.edu/files/4914/2055/1028/TCMG506_BoxwelSp2015.pdf

Harold, K. (2013). A systems approach to planning, scheduling, and controlling. Retrieved from,

http://honestyets.pbworks.com/f/Project+Management+-+A+Systems+Approach+-+10thEd.pdf

 

NOTE: All initial postings must have at least one citation or reference and it must be in APA format. please make sure they're in APA format. Need to be atleast 180 word.

 

Read the case study "Teloxy Engineering (A)" on page 948 and answer the corresponding questions on the same page.

 

NOTE: All initial postings must have at least one citation or reference and it must be in APA format. please make sure they're in APA format. Need to be 350 words

1. Using expected value, is it economically better to make or buy the component?

In the event that Teloxy is arranging and deliver the part inside their capacity, the whole is apparently near the arranged cost, yet this will be their immediate association and the probability of flawed rate is considerably higher and this raises the alarm. The average estimation of the meander is the aggregate base cost of the task and the aggregate cost of repairs for the part. At an opportune time, setup required is 10,000 dollars, the Raw material cost for each segment is 40 dollars and the cost to repair each part is around 120 dollars. The cost of buying the thing is 720,000 dollars. The cost of making the segments with inadequate and repair the thing it will be around 758,000 dollars. This makes us less unpredictable to purchase the area as opposed to making the part to keep up a fundamental partition from the likelihood of making any hurt sections and spending more to repair portion.

2.  Strategically thinking, why might management opt for other than the most economical choice?

Deliberately considering, Teloxy administration has constantly expected to choose to which the higher expenses are related what the parts are making in the house if the dependably trust that there will be an interest for their item. Their major and future assembling can continually cut the cost additionally down which will diminish the quantity of flawed parts which they can pick up the wasteful aspects a can move in the expectation to absorb information. Extra to the key reasoning they continually continuing assembling in the house will greatest lessen the conditions on all the outside hotspot for making the completed item which shields the Teloxy from every one of the parts which are un-accessibility or for the future with higher buy cost. It is better that teloxy designing settles on an unnecessary choice since it solidifies into house making units. This will open piece of chances for the alliance and it can regulate issues like material overseeing, prepare upkeep, and waste affiliation. In like way, at long last, we compartment balance making their individual finicky area tendency remain additional shrewd, for instance, took a gander at set out toward getting it from the pariah.

Reference:

Kerzner, H. (2009). Project Management: A Systems Approach to Planning, Scheduling and Controlling.

Simon, C. (2013). Strategic sophistication of individuals and teams experimental evidence. Retrieved from,

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4047612/#bib28

NOTE: All initial postings must have at least one citation or reference and it must be in APA format. please make sure they're in APA format. Need to be atleast 180 word.

 

PM Assignment 5
19176

Discussion Forum -

1-1 History Discussion

·         Find an interesting historical fact about Distance Learning.  Where did you found it (URL). Why was it of interest to you? Why is this a reputable source?

·         Also answer these questions What do you see as some of the disadvantages of distance learning? Advantages? What sources help IT professionals understand the concept of distance learning and required related IT support?

 

 

Scoring Rubric: 

 

Possible Points 

Your Points 

Discussion Forum (History)

 

Found and posted interesting history fact 

 

 

 

Provided a source(s) for the fact (.5); why is it reputable (.5)? 

 

Explained why it was of interest to you 

 

Listed at least 2 advantages and 2 disadvantages to distance learning – 1 point for each 

 

Comment on 2 other students post with more than I agree 

 

 

 

 

Assignment 1-2: Page (Web based education (WBE)

 

You are serving on a committee to provide the company with some background information as they move to deliver training online. You quickly notice that people aren’t using the correct terms or they have different meanings to the terms. The committee asks you to provide definitions of the following terms as well as what technology the company may need to implement the training online.

·         Pick one of these terms Terms.docx and define it using the course TermsPage. DO NOT REPEAT ONE ALREADY DEFINED. FIRST COME: FIRST SERVE.

·         Add your term to the TermsPage followed by yourname

·         Define the term, list the required technology to implement that concept, and provide a source for the definition. Include other terms that may be used for this concept.

·         Edit at least one classmate’s definition by adding something of note. Follow your edit with your initials (IJ)

 

 

 

Rubric 

Selected a term according to the guidelines (no one to use the same term)

 

1.0 pts

This criterion is linked to a Learning OutcomeAdded the term (1) and the definition to the terms page (2), listed the related technology required (2), and a source (2)

 

5.0 pts

This criterion is linked to a Learning OutcomeEdit at least 1 classmate's term with something of note ie another source, clarifying the definition, adding an example, image and so forth (4)

 

4.0 pts

 

 

IT homework
19141

In this assignment you will develop simple scripts to manage the user and file system whilst developing some expertise in managing a complex file system. The Assignment should be submitted on Turnitin.



Part 1: Automated Account Management (3 marks)



You have been asked by your boss to prepare two shell scripts which manage user information:



You are to prepare a simple shell script which reads a text file called users.txt. The file is in the form


dfs  /home/dfs Daniel Saffioti



and creates these users on the system without any interactive input. To do this you will need to use the adduser(1) and passwd(1) commands. You will need to randomly produce the password and report this to the administrator.



            You can assume the fields being username, home directory and GCOS string are separate by a single white space.



            You can assume all users are in the same group. The program should output the username and generated password once created.



Management of users is important particularly there removal. Write a shell (.sh) script that takes a single argument being a username, looks fo the account in /etc/passwd, deletes the accounts, and archives there home directory into a tar.gz file. You will receive more marks if you avoid using the standard user management tools.


Part 2: Designing File Systems (3 marks)



You work for the Information Technology Department in your University and you have been asked to build a server to store user data (home directories).



The volumes can grow without bounds, so it was felt that the ZFS file system should be used for each volume. The operating system itself need not be on a ZFS volume.



All volumes including the operating system should be engineered in such a way to ensure the best data protection is afforded in the event of local disk failure. It is expected that no more than 1 hours worth of data will be lost.



The volumes required are as follows:

uni0 with mount point /users/ug& quota of 200G.
uni1 with mount point /users/pg& quota of 200G.
uni2 with mount point /users/deleted& reservation of 100G.
uni3 with mount point /users/staff& reservation of 100G.
uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes outlined above are provisioned whilst ensuring there data protection. Document this accordingly along with a suitable rationale for your design.



Part 3: Implementing the Filesystem (3 marks)



Given the strategy defined in part two, your job is to implement the storage system.



1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to ensure the networking is bridged and the root portioning is managed appropriately. You will need to add additional virtual disks to meet the storage needs above.



2. Install the ZFS package and configure it such that pools of storage are created to meet the above requirements including redundancy and backups. To achieve this use the mirroring and snapshot features of ZFS.



Part 4: Making the File System accessible and roboust (3 marks)



The next step is to create another virtual machine (running the same Linux distribution). You job is to:

1. Mount a NFS exported volume from the server outlined in Part three, on this newly created server.

2. Backup all the data on the ZFS volumes on the server in part three to this new instance. You can either use ZFS or another tool/ technique to do this.



Document the steps taken.



Part 5: File System Management with Scripts (3 marks)



Now that you have a plan for the storage there are a few house keeping matters to take care of because users tend to be somewhat liberal with their storage.



Write a script to make sure that user home directories are owned and only accessible by the owner. The script can assume home directories are descendants of /users.
Finally write a script which takes as an argument the filesystem name e.g. /home and looks for objects which do not belong i.e. end with the extension


a. mp3

b. aac

c. mp4

d. mov

e. avi

f.  vid


When these files are found a summary should be produced including where they are and the size. The script should also remove the files.



Rationale
back to top

This assessment task will assess the following learning outcome/s:

be able to apply technical knowledge to manage servers.
be able to investigate the layout of server file systems.
be able to plan, create and manage information services.
be able to design and write scripts to automate various server management tasks.
be able to justify an appropriate protection strategy for data and services.
In this assignment you will develop simple scripts to manage the user and file system whilst developing some expertise in managing a complex file system.

File Systems and Advanced Scripting
19124

Please respond to the following questions with at least one paragraph for each question. Thank you.

 

  

PGP and VPNs

1. Imagine that you work for a federal law enforcement agency and your manager has tasked you with researching Pretty Good Privacy (PGP). Examine three (3) advantages and three (3) disadvantages of PGP and recommend whether or not the agency should use it. Post your findings. Provide a rationale for your response. Use Internet references published within the past [1] year.

 

2. Compare the major advantages and disadvantages of a Virtual Private Network (VPN) and briefly summarize your findings in a post. Recommend two (2) organizations that would benefit the most from a VPN. Provide a rationale for your response. Use Internet references published within the past [1] year

PGP and VPNs
19112

Week 6 Assignment 4 - Submit Here

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 4: VoIP Part 2 (Gantt and PERT Charts)
Due Week 6 and worth 100 points

Update the Microsoft Project file you created in Assignment 3: VoIP Part 2 (Work Breakdown Structure) with the following changes:

·         Set property values to denote progress in at least fifteen (15) of the line items. 

·         Set properties so that at least one (1) of the main tasks is behind schedule.

·         Create a Gantt chart for your project.

·         Take a screenshot of the Gantt chart which can later be inserted into your written paper.

·         Create a PERT diagram that identifies the critical path.

·         Take a screenshot of the PERT chart which can later be inserted into your written paper.

Note: If you need a tutorial on taking a screen shot, visit one of the following locations: (PC users: http://www.take-a-screenshot.org/) (MAC users: http://binged.it/1xriOcN).

Write a two to three (2-3) page paper in which you:

1.       Compare and contrast the information that one receives from a Gantt chart, versus that of a PERT diagram.

2.       Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other. Justify your response.

3.       Assess the importance of the critical path in project management.

4.       Insert the screenshots of the Gantt and PERT charts you created based on the provided criteria. Elaborate on the status of the VoIP deployment project based on the updated information.  Note: The graphical representations do not count toward the overall page requirement.

5.       Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

·         Import completed diagrams, charts, or screenshots into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

·         Distinguish among various time management techniques such as CPM, Gantt charts, and the PERT method.

·         Use project management and graphic software to plan and manage a project throughout the project life cycle.

·         Use technology and information resources to research issues in IT project management.

·         Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 100

Assignment 4: VoIP Part 2 (Gantt and PERT Charts)

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Compare and contrast the information that one receives from a Gantt chart, versus that of a PERT diagram.

Weight: 20%

Did not submit or incompletely compared and contrasted the information that one receives from a Gantt chart, versus that of a PERT diagram.

Partially compared and contrasted the information that one receives from a Gantt chart, versus that of a PERT diagram.

Satisfactorily compared and contrasted the information that one receives from a Gantt chart, versus that of a PERT diagram.

Thoroughly compared and contrasted the information that one receives from a Gantt chart, versus that of a PERT diagram.

2. Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other. Justify your response.

Weight: 20%

Did not submit or incompletelyexamined the advantages of using a Gantt chart over a PERT chart and vice versa. Did not submit or incompletelydetermined when it is appropriate to use one over the other. Did not submit or incompletely justified your response.

Partially examined the advantages of using a Gantt chart over a PERT chart and vice versa. Partially determined when it is appropriate to use one over the other. Partially justified your response.

Satisfactorily examined the advantages of using a Gantt chart over a PERT chart and vice versa. Satisfactorily determined when it is appropriate to use one over the other. Satisfactorily justified your response.

Thoroughly examined the advantages of using a Gantt chart over a PERT chart and vice versa. Thoroughly determined when it is appropriate to use one over the other. Thoroughly justified your response.

3. Assess the importance of the critical path in project management.

Weight: 20%

Did not submit or incompletely assessed the importance of the critical path in project management.

Partially assessed the importance of the critical path in project management.

Satisfactorily assessed the importance of the critical path in project management.

Thoroughly assessed the importance of the critical path in project management.

4. Insert the screenshots of the Gantt and PERT charts you created based on the provided criteria. Elaborate on the status of the VoIP deployment project based on the updated information.

Weight: 25%

Did not submit or incompletelyinserted the screenshots of the Gantt and PERT charts you created based on the provided criteria. Did not submit or incompletelyelaborated on the status of the VoIP deployment project based on the updated information.

Partially inserted the screenshots of the Gantt and PERT charts you created based on the provided criteria. Partially elaborated on the status of the VoIP deployment project based on the updated information.

Satisfactorily inserted the screenshots of the Gantt and PERT charts you created based on the provided criteria. Satisfactorily elaborated on the status of the VoIP deployment project based on the updated information.

Thoroughly inserted the screenshots of the Gantt and PERT charts you created based on the provided criteria. Thoroughly elaborated on the status of the VoIP deployment project based on the updated information.

5. 2 references

Weight: 5%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

 

·         Week 8 Assignment 5 - Submit Here

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 5: VoIP Part 3 (Quality)
Due Week 8 and worth 100 points

Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quality control team tracked forty (40) of the deployments. The following problems were documented:

·         Five (5) of the deployments experienced delays due to the unique configuration of the office space which required modification to install the proper wiring.

·         Twelve (12) of the users called the help desk to get additional training on the new system. 

·         Two (2) of the new devices were defective.

Prepare a fifteen to twenty (15-20) slide digital presentation with the software of your choice (e.g., PowerPoint, Google slides, Prezi, etc.) in which you:

4.                    Explain quality and its importance to project success.

5.       Explain quality management planning.

6.       Contrast quality assurance and quality control.

7.       Describe the different quality activities involved in this project and each of their outcomes.

8.       Describe Pareto diagrams and their use in project management.

9.       Present the data in the provided scenario using a Pareto diagram (Use the software of your choosing to prepare the diagram).

10.    Use appropriate key points and / or graphics to professionally convey the information.

11.    Include presenter notes to explain each slide.

12.    Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

·         Include the title of the assignment, the student’s name, the professor’s name, the course title, and the date in the presentation.

·         Include the references used in the assignment in the presentation.

·         Import charts, graphs, and / or the Pareto diagram into the presentation. The completed works must be imported into the presentation.

The specific course learning outcomes associated with this assignment are:

·         Explain and defend the various quality factors in project quality.

·         Use technology and information resources to research issues in IT project management.

·         Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

 

 

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 100

Assignment 5: VoIP Part 3 (Quality)

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Explain quality and its importance to project success.

Weight: 10%

Did not submit or incompletelyexplained quality and its importance to project success.

Partially explained quality and its importance to project success.

Satisfactorily explained quality and its importance to project success.

Thoroughly explained quality and its importance to project success.

2. Explain quality management planning.

Weight: 10%

Did not submit or incompletelyexplained quality management planning.

Partially explained quality management planning.

Satisfactorily explained quality management planning.

Thoroughly explained quality management planning.

3. Contrast quality assurance and quality control.

Weight: 10%

Did not submit or incompletelycontrasted quality assurance and quality control.

Partially contrasted quality assurance and quality control.

Satisfactorily contrasted quality assurance and quality control.

Thoroughly contrasted quality assurance and quality control.

4. Describe the different quality activities involved in this project and each of their outcomes.

Weight: 15%

Did not submit or incompletelydescribed the different quality activities involved in this project and each of their outcomes.

Partially described the different quality activities involved in this project and each of their outcomes.

Satisfactorily described the different quality activities involved in this project and each of their outcomes.

Thoroughly described the different quality activities involved in this project and each of their outcomes.

5. Describe Pareto diagrams and their use in project management.

Weight: 10%

Did not submit or incompletelydescribed Pareto diagrams and their use in project management.

Partially described Pareto diagrams and their use in project management.

Satisfactorily described Pareto diagrams and their use in project management.

Thoroughly described Pareto diagrams and their use in project management.

6. Present the data in the provided scenario using a Pareto diagram (Use the software of your choosing to prepare the diagram).

Weight: 20%

Did not submit or incompletelypresented the data in the provided scenario using a Pareto diagram.

Partially presented the data in the provided scenario using a Pareto diagram.

Satisfactorily presented the data in the provided scenario using a Pareto diagram.

Thoroughly presented the data in the provided scenario using a Pareto diagram.

7. Use appropriate key points and / or graphics to professionally convey the information.

Weight: 10%

Did not submit or incompletely used appropriate key points and / or graphics to professionally convey the information.

Partially used appropriate key points and / or graphics to professionally convey the information.

Satisfactorily used appropriate key points and / or graphics to professionally convey the information.

Thoroughly used appropriate key points and / or graphics to professionally convey the information.

8. Include presenter notes to explain each slide.

Weight: 10%

Did not submit or incompletely included presenter notes to explain each slide.

Partially included presenter notes to explain each slide.

Satisfactorily included presenter notes to explain each slide.

Thoroughly included presenter notes to explain each slide.

9. 2 references

Weight: 5%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

 

 

Week 9 Assignment 6 - Submit Here

 

Using the Delphi technique, your team constructed the following risks register for the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.

 

#

Risk

Likelihood (1-5)

Impact (1-5)

Response Type

Response

1

Project Delay due to lack of resources

3

5

 

 

2

Project runs out of funds before completion

1

5

 

 

3

Users reject new system

2

4

 

 

4

Defective Hardware

1

5

 

 

5

New government regulations introduced during deployment increase the cost of running VoIP.

2

3

 

 

6

A Yearly Renewal Fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized.

 

Write a three to five (3-5) page paper in which you:

1.       Explain risk management and its associated activities and defend the need for a risk management plan.

2.       Describe the Delphi technique used to identify risks and infer n types of projects where this technique is most accurate.

3.       Examine the four (4) types of risk response (ie., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

4.       Complete the table with the risk response type (i.e.., avoidance, acceptance, transference, and mitigation) and a description of the response.

5.       Create a decision tree diagram with the software of your choice (Word, PowerPoint, Visio, etc.) and make an OFFICE document or PDF to address Risk Number 6.

6.        Assume that when you check the schedule on day 60 of the project, it becomes evident that two additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one engineer – 80%; With both engineers – 98%.

7.       Fully explain your rationale in the document you create. How does your decision tree flow? What are your decision points, and most importantly, what is your recommendation and how did you arrive at this conclusion? Is there a point of diminishing return where it would be so expensive that it wouldn’t be worth it to employ the additional resources? Why or why not? Be sure to use proper business communication and consider your audience to be business leaders in the organization at which you are employed. Remember, 100% original work is required. Research on the Internet is fine, but do not submit work that is not your own, and do not submit work that you’ve submitted anywhere previously. Plagiarism detection tools will be used to ensure originality.

 

Your assignment must follow thee formatting requirements:

 

·         Be typed, double-spaced, use Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA Style Guide (Edition 6).  Check with your professor for any additional instructions.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

·         Include the decision three diagram created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.

 Click here to view the grading rubric for this assignment.

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 100

Assignment 6: VoIP Part 4 (Risk Register)

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Explain risk management and its associated activities and defend the need for a risk management plan.

Weight: 10%

Did not submit or incompletelyexplained risk management and its associated activities and did not submit or incompletelydefended the need for a risk management plan.

Partially explained risk management and its associated activities and partially defended the need for a risk management plan.

Satisfactorily explained risk management and its associated activities and satisfactorily defended the need for a risk management plan.

Thoroughly explained risk management and its associated activities and thoroughly defended the need for a risk management plan.

2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.

Weight: 10%

Did not submit or incompletelydescribed the Delphi technique used to identify risks and did not submit or incompletely inferred on types of projects where this technique is most accurate.

Partially described the Delphi technique used to identify risks and partially inferred on types of projects where this technique is most accurate.

Satisfactorily described the Delphi technique used to identify risks and satisfactorily inferred on types of projects where this technique is most accurate.

Thoroughly described the Delphi technique used to identify risks and thoroughly inferred on types of projects where this technique is most accurate.

3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.

Weight: 10%

Did not submit or incompletelyexamined the four (4) types of risk response and did not submit or incompletelydetermined the appropriate situation where each should be used.

Partially examined the four (4) types of risk response and partially determined the appropriate situation where each should be used.

Satisfactorily examined the four (4) types of risk response and satisfactorily determined the appropriate situation where each should be used.

Thoroughly examined the four (4) types of risk response and thoroughly determined the appropriate situation where each should be used.

4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.

Weight: 15%

Did not submit or incompletelycompleted the table with the risk response type and a description of the response.

Partially completed the table with the risk response type and a description of the response.

Satisfactorily completed the table with the risk response type and a description of the response.

Thoroughly completed the table with the risk response type and a description of the response.

5. Create a decision tree with the software of your choice to address risk number 6 of the provided information.

Weight: 20%

Did not submit or incompletely created a decision tree with the software of your choice to address risk number 6 of the provided information.

Partially created a decision tree with the software of your choice to address risk number 6 of the provided information.

Satisfactorily created a decision tree with the software of your choice to address risk number 6 of the provided information.

Thoroughly created a decision tree with the software of your choice to address risk number 6 of the provided information.

6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.

Weight: 20%

Did not submit or incompletelyexplained the methodology utilized to create a decision tree and did not submit or incompletely recommended the appropriate action to take based on your decision tree from criterion 5.

Partially explained the methodology utilized to create a decision tree and partially recommended the appropriate action to take based on your decision tree from criterion 5.

Satisfactorily explained the methodology utilized to create a decision tree and satisfactorily recommended the appropriate action to take based on your decision tree from criterion 5.

Thoroughly explained the methodology utilized to create a decision tree and thoroughly recommended the appropriate action to take based on your decision tree from criterion 5.

7. 2 references

Weight: 5%

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

8. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

 

 

 

Each week must SAVED AS WEEK 6, WEEK 8, WEEK 9
19083

Each of us perceives "ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistleblowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the "unethical person” and any risk involved in "whistle blowing”.

 

1. Stealing from an employer

 

2. Falsifying a time sheet

 

3. Padding an expense account

 

4. Falsifying any document or record

 

5. Lying about the conduct of a co-worker

 

     Requirements (please read)

 

 For each discussion, you are required to write an initial post (300 words). For your initial post, you must have two academic peer-reviewed articles for references.  You must get them from the library.  

All discussions must include in-text citations and references in APA style formatting. If you do not use in-text citations or they are not in APA format you will lose 3 points.  If you do not have references or if they are not in APA format, you will lose 5 points

Each of us perceives "ethics” from our own point
19082

SEC 420 Discussion (no copy work)

 

Question 1. "Buffer Overflow” Select the following case and discuss in no less than three paragraphs:

 

· Explain one of the challenges that a hacker faces when attempting to cause a segmentation fault by overflowing a buffer. Further, discuss the main ways in which an attacker can avoid detection of No Operations (NOPs) by an intrusion detection system, and examine the primary reasons why avoiding such detection is beneficial for executing the attack.

Question2. have response at least one paragraph to (only one paragraph).

· Any current topic or article related to penetration techniques.

====================================================+=====

COM 201 Discussion week 10 (no copy work)

Tracking Your Improvement

Use what you’ve learned this week to respond to the following:

· Go back to Week 2 and watch your first speech again. Use the online rubric to evaluate your first speech. Share your evaluation.

· After you complete Assignment 4 and the self-review, compare your evaluation to the one for Assignment 1. What skills improved the most?

· When you review your self-reviews of your speeches, do you notice any common themes? What does that say about the course and your own development?

++++++=========+++++++++++=============+==========+++++++++++++++================

The following is one of the student  response and need you look it as a sample response:

 

In speech quality, my presentation was generally clear and consistent. I did have a few drops in volume when I turned my head away from the camera to glance at my notes.  In visual quality, the speech was ok, but I did not have a backdrop up, so there were some distractions in the background.  The speech topic focus was good.  Regarding the time requirement, I completed my speech in the 2-3-minute range without having to make too many adjustments.  My delivery was fair, but I needed to work on my eye contact and have more of the material memorized so that I could focus on my delivery and not look at my notes so much.  In overall effectiveness, I thought it was good, but many areas needed work. 

I believe I improved the most in eye contact and using notes during the speech.  I worked on using them as just a quick reference instead of a guideline.  With a proper backdrop, this speech was also less distracting to watch on video.  In watching this video, I thought I looked more at ease than the first video, which makes sense because I know that I felt calmer during this speech than I did the first one. 

I do see common themes. I see areas that I have not mastered and need more work.  But, I do see progress across multiple areas, and I know that I feel more comfortable now developing and delivering a speech than I did nine weeks ago.

Discussion question com 201 and CIS 420
19081

The research report must include materials found in at least 2 chapters of the assigned Wharton textbook.
The research report must be based on your reading of the assigned textbooks and literature research (peer reviewed journals and conference proceedings, etc.).
Write an original research report consisting on  Virtual Organizations.

Your research report topic area is to include a comparative analysis of at least 4 organizations that have either succeeded or failed. Success and failure should be measured according to factors that you establish and reasonably supported by the literature. NOTE: NO ARTICLE PUBLISHED ON THE INTERNET THAT IS NOT DIRECTLY CONNECTED TO AN ESTABLISHED PEER-REVIEWED PROFESSIONAL CONFERENCE, JOURNAL OR MAGAZINE IS ACCEPTABLE AS A CITED REFERENCE SOURCE. Your paper is to have a title page, introduction, well defined literature review (body), findings, conclusion, and reference pages. The paper must be at least 2,500 words. Always keep in mind the intended reader(s) of your research paper when developing and writing your paper. The reader must receive value from your research and what you write. Utilize graphs, charts, tables or figures if it enhances the point(s) you are making. Plagiarism will be checked and if found, will result in a zero grade for the Research Report

Research Paper 2500 words (APA Style and NO PLAGARISAM)
19080

In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting the terrorist once his hostages are released?

Requirements (please read)

 For each discussion, you are required to write an initial post (300 words).  For your initial post, you must have two academic peer-reviewed articles for references.  You must get them from the library.  There are directions at the top of our Moodle page showing how to utilize the library.

    Grading for discussions.

  • All discussions must include in-text citations and references in APA style formatting. If you do not use in-text citations or they are not in APA format you will lose 3 points.  If you do not have references or if they are not in APA format, you will lose 5 points.
NACM W-3 D-2
18994

Your company wants to implement a Virtual Private Network for employees that work remotely. Research remote virtual computing software products not covered in Chapter 10. Then, in 750-1000 words, provide a report to the company's CIO that includes the following:

  1. Compare the top VPN products on the market.
  2. Find out how the security features of VPN products may benefit the organization.
  3. Provide three suggestions for VPN products for the company. Explain your ideal choice for the corporation.

Note: You must use at least one credible reference.

VPN essay

©2016 Web Design And Development by TrendPro Systems Limited Teach online | Contact us