Categories
Computer Science homework help

Identify the problems associated with the topic you selected.

Topic ((How Secure are VPNs?))
Identify the problems associated with the topic you selected.
Identify a company/organization that is/has dealt with these problems with the topic you have selected.
Select the major problems with the topic that is selected.
Suggest all possible solutions to these major problems.
Recommend the best solution to be implemented.
Detail how this solution should be implemented.
Use the following outline to complete your Project:
1. Synopsis/Executive Summary
Outline the purpose of the Project (What are you trying to solve?)
Outline the issues and findings of the project without specific details.
Identify the theory that will be used.
Note any assumptions made (you may not have all the information you’d like so some assumptions may be necessary e.g.: “It has been assumed that…”, “Assuming that it takes half an hour to read one document…”).
2. Findings
Identify the problems found in the project by:

analyzing the problem, supporting your findings with facts given in the case, the relevant theory, and course concepts.
searching for the underlying problems

This section is often divided into sub-sections.
3. Discussion
Summarise the major problem/s.
Identify alternative solutions to this/these major problem/s.
Briefly outline each alternative solution and evaluate its advantages and disadvantages.
There is no need to refer to theory or coursework here.
4. Conclusion
Sum up the main points from the findings and discussion.
5. Recommendations
Choose which of the alternative solutions should be adopted.
Briefly justify your choice explaining how it will solve the major problem/s.
This should be written in a forceful style as this section is intended to be persuasive.
Here integration of theory and coursework is appropriate.
6. Implementation
Explain what should be done, by whom, and by when.
If appropriate include a rough estimate of costs (both financial and time).
7. References
Make sure all references are cited correctly.

Categories
Computer Science homework help

What is its main purpose, and what are the target users?

Perform a usability evaluation of an existing e-commerce Website.
Including images is highly encouraged to demonstrate the usability issues within the site.
Use the following points as guidelines when writing the Website Review:
1. System Identification: What Website are you evaluating? What is its main purpose, and what are the target users?
2. Tasks and Activities: As an evaluation participant, what are you trying to complete with the system? Be sure to identify at least three use cases. Upon identification, complete each identification path you are trying to identify, including the strengths and weaknesses of each task and activity.
3. Metrics: As much as possible, use measurable criteria as you’ve read in the Preece text. Identify those methods you’ve applied in your review of the Website.
4. Application: Using the Nielsen 10 heuristics for usability design, explain how each task can be improved.
5. Assessment: Recommend five changes the Website platform selected can make to improve its usability posture.

Categories
Computer Science homework help

What work is completed (bulleted format)?

Using the CITM-504 Progress Report Template, provide your instructor with information on your progress toward completing the capstone project. The template asks the following questions:
Provide a brief overview of your capstone project work.

Provide a quick overview of your capstone project work.
What work is completed (bulleted format)?
Provide a short description of the work in progress.

Using the template form (the date automatically updates), submit the report using the assignment submission page. Please provide your name in the text box.
Please refer to the 3.3 Progress Report and 3.4 Paper Outline (Attached) and compile it further.

Categories
Computer Science homework help

How does the verse in Philippians potentially apply to your efforts on this project

We are called to be diligent and get the job done. Philippians 3:14(new tab) says, “I press on toward the goal for the prize of the upward call of God in Christ Jesus” (English Standard Version, 2001/2016).  We are to press forward, be diligent, and carry through to the end. That applies to every area of our lives. The Bible calls us to press on with our faith. We can apply that to other areas of daily life.
Reference
English Standard Version. (2016). Bible Gateway. https://www.biblegateway.com/versions/English-Standard-Version-ESV-Bible/(new tab) (Original work published 2001)
Instructions:
1. Review the material in the Getting Started section above, including the specific Bible passages
2. Be sure to address the following prompts in your paper:
How does the verse apply to your worldview?
How does the verse in Philippians potentially apply to your efforts on this project
Your paper should be at least 250 words in length.

Categories
Computer Science homework help

What are your reflections on finishing your degree program?

We are in the last workshop of this course and of your degree program as well. You have been persistent and are about to finish. Even God’s Word has something to say about completing what we start: “Blessed is the man who remains steadfast under trial, for when he has stood the test he will receive the crown of life, which God has promised to those who love him”  (English Standard Version, 2001/2016, James 1:12(new tab)).
The writer of the book of James from the Bible is talking about faith and our reward of an eternity with Him, God, in Heaven. It also says something about completing any task or project, even life, that we take on with serious intent.
Reference
English Standard Version. (2016). Bible Gateway. https://www.biblegateway.com/versions/English-Standard-Version-ESV-Bible/(new tab) (Original work published 2001)
Instructions:
Review the material in the Getting Started section above, including the specific Bible passages.
Be sure to address the following prompts in your paper:

What are your reflections on finishing your degree program? How does that compare to other tasks or projects from your past?
Considering our life journey, what does the Bible say about finishing that journey? Share your thoughts on your life’s spiritual journey.

Your paper should be at least 250 words in length.

Categories
Computer Science homework help

What controls can you set up to minimize contract employees’ access to your network?

Case Project 6-2: Setting Up Remote Access for Contractor, Page 251
Scenario: Several new projects are being staffed by outside contractors, who will be working on servers in the contractors’ office, not in the company building, and will have their own VPN server. The contracting company has informed your company that none of its employees will be working weekends. What controls can you set up to minimize contract employees’ access to your network?
Writing Requirements:
1-2 pages
2-3 Scholarly references
APA format, for citations and references

Categories
Computer Science homework help

What is the role of the Systems Analyst to propose new Data Management solutions?

Research a scholarly paper on “Databases, Warehouses and Advanced Data Management Systems” and reflect on one of the following topics:
“DM Types”: What determines which type of Data Management System is being used?
“Importance”: How important is the Data Management system in conducting SAD?
“SA”: What is the role of the Systems Analyst to propose new Data Management solutions?
NOTE:
You must copy and paste the topic (“DM Types” or “Importance” or “SA”) at the start of your paper to provide a context for your answer.
This paper must be between at least one full page in length explaining what caught your eye and reflecting on what you read.
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.
You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.

Categories
Computer Science homework help

How does terrorism differ from natural disasters and man-made hazards?

Emergency Management and the Terrorist Threat: How does terrorism differ from natural disasters and man-made hazards? What is the goal of emergency management in regard to the threat of terrorism, and what are basic progressive measures necessary to prevent, hinder, or respond to the propensity of terrorism to occur?
Note: Please follow the instructions attached.

Categories
Computer Science homework help

Why is this important to consider within your project’s system solution?

Part 1.  What is an ethical dilemma that your systems analysis and design project in this course can solve?  Using thorough Biblical support, write a detailed purpose statement that clearly articulates how your system problem solves an ethical dilemma.
Part 2.  Embed at least two unique class diagrams as a video from your systems analysis and design project in this course.  One class diagram should be of the old system and one class diagram should be of the new system.
Consider how Biblical principles can be applied to an efficient, optimized, secure, and healthy information system.  What elements in the new class diagram apply to the ethical dilemma outlined in the part 1?  Why is this important to consider within your project’s system solution?

Categories
Computer Science homework help

Describe the flow of data through the network, citing specific, credible sources.  

Week 4 Assignment – Defense in Depth
Introduction
The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in  layers, which, in many cases, requires a network that is designed  accordingly. The specific course learning outcome associated with this assignment is:
Recommend best security practices to achieve business objectives based on risk assumptions.
Instructions
Design a network that incorporates the following:
One corporate site (Chicago).

All servers exist here (web server, file server, print server, mail server, FTP server).
Connection to the Internet (50 MBps).
300 employees who only need access to local corporate resources and the Internet.

One remote site (8 miles away).

20 employees who need access to all resources at corporate, plus the Internet.
Connection to the Internet (3 MBps).

Part 1
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:
Create a network diagram with defense in depth in mind, citing  specific, credible sources that support the design and depicting at  least four-fifths of the following:

All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
The interconnections between network devices.
Connections to end-user (client) devices (desktops, laptops).
Connections from the Internet cloud to the network input.

Part 2
Write a 6–10 page paper in which you:
Describe the flow of data through the network, citing specific, credible sources.

Assume data begins at the remote site.
Data flow may be monitored by an IDS.

Explain all three elements of the CIA triad and how isolating by  network functions helps deliver a layered approach, citing specific,  credible sources that support your assertions and conclusions.
Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.

Cite each source listed on your source page at least one time within your assignment.