Learning Goal: I’m working on a cyber security multi-part question and need an explanation and answer to help me learn.
Cybersecurity Scholarship
» Why do you believe more Military & Veterans should be in cybersecurity?
» What are your cybersecurity career goals and how would receiving this scholarship help you attain them?
Goals: multiple certifications, I already have a degree. Please expand
» Why do you deserve this scholarship?
Expand on low income family. Parents no degree from Mexico
Additional Requirements:
Page length should be 2 pages full.
Must include in-text-citation.
APA format style
Category: Cyber Security
Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
Assignment Instructions:
Using Word or a Word-compatible word processor, submit the following deliverables. For written responses, each answer should be 350-400 words (2-3 nice paragraphs/about a page) at a minimum, well-written, and cover the topic fully. Use a standard 12-point font (Calibri preferred), double-space, and use 1” margins all around. If you use information found outside of the text in your answer (this is highly encouraged), cite your source(s). Make sure to number your answers appropriately. If you are skipping an answer, number as usual and note “No Answer” or “Question skipped.”
Assignment Overall Scenario:
Assume you are an entry-level security administrator working for Always Fresh. Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident
response team (CSIRT). As a security administrator, you have been assigned the responsibility of
developing a CSIRT policy that addresses incident evidence collection and handling. The goal is
to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in
court?
Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient
manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not
the individual steps.
Address the following in your policy:
• Description of information required for items of evidence
• Documentation required in addition to item details (personnel, description of
circumstances, and so on)
• Description of measures required to preserve initial evidence integrity
• Description of measures required to preserve ongoing evidence integrity
• Controls necessary to maintain evidence integrity in storage
• Documentation required to demonstrate evidence integrity
Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
Assignment Instructions:
Using Word or a Word-compatible word processor, submit the following deliverables. For
written responses, each answer should be 350-400 words (2-3 nice paragraphs/about a page) at
a minimum, well-written, and cover the topic fully. Use a standard 12-point font (Calibri
preferred), double-space, and use 1” margins all around.
If you use information found outside of the text in your answer (this is highly encouraged), cite
your source(s). Make sure to number your answers appropriately. If you are skipping an
answer, number as usual and note “No Answer” or “Question skipped.”
Assignment Overall Scenario:
Assume you are an entry-level security administrator working for Always Fresh. Always Fresh
Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as
well as two regional warehouses in Nevada and Virginia.
The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its
workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25
workstation computers in the headquarters offices and main warehouse. The network uses
workgroups, and users are created locally on each computer. Employees from the regional
warehouses connect to the Colorado network via a virtual private network (VPN) connection.
Due to a recent security breach, Always Fresh wants to increase the overall security of its
network and systems. They have chosen to use a solid multilayered defense to reduce the
likelihood that an attacker will successfully compromise the company’s information security.
Multiple layers of defense throughout the IT infrastructure makes the process of compromising
any protected resource or data more difficult than any single security control. In this way,
Always Fresh protects its business by protecting its information.
Scenario
Changing access controls can have some undesirable effects. Therefore, it is important to
carefully consider changes before making them and provide mechanisms to reverse changes if
they have unexpected consequences.
Always Fresh management has asked you to develop procedures for changing any access
controls.
The purpose of these procedures is to ensure that staff:
• Understand and document the purpose of each access control change request
Know what access controls were in place before any changes• Get an approval of change by management• Understand the scope of the change, both with respect to users, computers, and objects• Have evaluated the expected impact of the change• Know how to evaluate whether the change meets the goals• Understand how to undo any change if necessaryTasksCreate a guide that security personnel will use that includes procedures for implementing anaccess control change.The procedure guide must contain the steps Always Fresh security personnel should take toevaluate and implement an access control change. You can assume any change requests youreceive are approved. Ensure that your procedures include the following:• Status or setting prior to any change• Reason for the change• Change to implement• Scope of the change• Impact of the change• Status or setting after the change• Process to evaluate the change
Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
Write a paper describing the how you would lead a global project team to launch a global product. My goal for this assignment is for you to have a real, actionable plan. This paper should be two pages double-spaced of your narrative not including the title page, figures/diagrams, references, and the appendix. (Size expectation: 500-800 words)
Scenario:
You have been working at a global company, and you have been promoted. You are now a Project Manager and have been put in charge of launching a product. Pick a company where you would want to have a career. You can pick a good or service that this company could develop. For example: Kale flavored Coca-Cola. Please, do not used that gross example.
You have been given everyone’s contact information and are expected to launch the product by October 1st, 2023. Here are the names and locations of your 16-person team (including yourself):
Bindi – Sydney
Jamal, Zoe, and You – Chicago
Lolita – Prague
Dan, Jiayi, Yan – Shanghai, China
Dieter and Greta – Berlin
Amal and Amir – Dubai
Maryam and Zara – New Delhi
Amani and Mubarak – Nairobi
Based on what you are creating, these team members will need various skills (you can choose).
Part 1 – Leadership Plan
Write a one-page, double-spaced plan detailing how you will lead the 16-person global team. Take special care to spend time and share information with everyone on the team. The natural bias we all have is to have better communication with the people in our physical office (Chicago).
Part 2 – Launch Plan
Write a one-page, double-spaced plan detailing how team will create, market, distribute, and sell the global product being especially mindful of cultural differences across the global marketplaces. Choose a good or service that you would like to create and sell to millions of customers world-wide. Think of this as a one-page, global business plan.
Use as many references as you need to develop your plan. You do not need to use academic references. Please use references from reputable business journals, magazines, newspapers, and other sources.
Create a title page with the title of your paper, your name, the date, and INFO 6250 Information Resource Management.
Please, i want the document in word document file.
Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
Explain the basic principle of separation of duty.
Discuss how cryptography/encryption can be used to implement separation of duty
2–3 pages
Coversheet
List of References Page.
Proofread – Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other reputable resources.
Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
Why is Compliance Important to Cybersecurity?
Cite your sources using APA format with links
Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
BEFORE TAKING ON THE TEST MAKE SURE YOU HAVE THIS BOOK? https://www.jblearning.com/catalog/productdetails/…
ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
Current infrastructure elements (include all hardware listed above; use max 10 computers instead of 50)
A logical topology that separates the Accounting and Sales departments
Redundant communications
Justification for continuing with IPv4 or upgrading to IPv6
TasksFor this part of the project, perform the following tasks:
Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, router) and their locations within the private and protected network segments.
Include a high-level plan that ensures communications are available 24/7.
Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. I prefer you use the Cisco Packet Tracer software for your diagram. You will update this design later in the project. Instructions for acquiring Packet Tracer software are below.
Create a draft report detailing all information as supportive documentation.
Cite sources, where appropriate. Self-Assessment ChecklistI determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network hardware and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Install and Use Packet Tracer In your browser, navigate to netacad.com/campaign/ptdt-4. You will be taken to an Introduction to Packet Tracer screen. Click on Sign up Today. You have to enter your name, school email address, and text verification to enroll in the course. Open the confirmation email and confirm your email address. Configure your account. You will need to remember your username and password. Now click on the Introduction to Packet Tracer tile. Now you can download and install the software. Download the latest version 7. If you need help with the download and install, launch the course and navigate to Chapter 1 beginning with section 1.2. If you are unfamiliar with using Packet Tracer, you can go through chapters 2 and 3 in the tutorial. Most students have already used this product in CIST 1401 and 2451.
ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
Current infrastructure elements (include all hardware listed above; use max 10 computers instead of 50)
A logical topology that separates the Accounting and Sales departments
Redundant communications
Justification for continuing with IPv4 or upgrading to IPv6
TasksFor this part of the project, perform the following tasks:
Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, router) and their locations within the private and protected network segments.
Include a high-level plan that ensures communications are available 24/7.
Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. I prefer you use the Cisco Packet Tracer software for your diagram. You will update this design later in the project. Instructions for acquiring Packet Tracer software are below.
Create a draft report detailing all information as supportive documentation.
Cite sources, where appropriate.
Required ResourcesInternet access
Course textbook
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your preferred style guide
Length of report: 2 pages
Self-Assessment ChecklistI determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network hardware and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Install and Use Packet Tracer
In your browser, navigate to netacad.com/campaign/ptdt-4. You will be taken to an Introduction to Packet Tracer screen. Click on Sign up Today. You have to enter your name, school email address, and text verification to enroll in the course. Open the confirmation email and confirm your email address. Configure your account. You will need to remember your username and password. Now click on the Introduction to Packet Tracer tile. Now you can download and install the software. Download the latest version 7. If you need help with the download and install, launch the course and navigate to Chapter 1 beginning with section 1.2. If you are unfamiliar with using Packet Tracer, you can go through chapters 2 and 3 in the tutorial. Most students have already used this product in CIST 1401 and 2451.
Please post about the importance of using IS for enhanced decision making. What technologies and techniques are organizations using to make faster, better, data driven decisions? What technologies are being used by organizations to collect, analyze, and use data to make better decisions?
Instructions:
Each primary post must include at least two research references (cited in primary post) and be at least equal to 600 words minimum.
All research needs to be cited at the end of the primary post and PDF articles must be attached
All articles must be derived from Google Scholar and must be “empirical studies” on the topic. Empirical studies must have three components: (research model, survey, and statistical tables and graphics). Article files must be turned in as PDF files only and the PDF file names must be the same name as the article.
I have already completed most of the work. I need someone to go ahead and Add more to my part 3 and part 4. at least one page for each. I can provide you the instructions and documents upon matching, Thanks.
Part 3, Information Visualization Report (Part 3 of 4)
ET
Submit a report (No minimum or maximum length) showing your visualizations of your data and information.
Interpret the visualizations and describe how the results reflect your initial hypothesis. Make sure to establish the
foundation for your visualization, such as audience needs and requirements. Also, describe why you selected the
visualization techniques you used. Consider the following:
1. Develop Visual Models
• Data visualization is the graphical representation of information and data. By using visual
elements like charts, graphs, and maps, data visualization tools provide an accessible way to
see and understand trends, outliers, and patterns in data.
• Data visualization tools and technologies are essential to analyze large or complex
AIT-664
Page 5
data/information sets in support of data-driven decisions.
• Data visualization helps the identification of trends, correlations, and outliers. Many forms of
data and information are difficult to interpret without some form of visualization. Multiple visual
“views” may aid in identifying data and information relationships.
Part 4, Project Recap & Lessons Learned
(Part 4 of 4)
Due week 8,
ET
Submit a summary of your overall analysis, including your initial requirements and hypothesis, data acquisition,
data preparation, information modeling, and information visualization. This final report should encapsulate your
full semester’s effort. Report on the effectiveness of your analysis and whether you met your initial goal of
demonstrating your hypothesis. Explain the challenges you faced, what went right and what went wrong, and
what you might have done differently to improve on your analysis if you were to do it again. Consider the
following:
1. Report Results
• Restate your initial hypothesis.
• Report your analysis results.
• Describe your overall approach to your analysis effort.
• Determine how effective your analysis was.
• Describe if and how you demonstrated your hypothesis or the null hypothesis.
• Describe any lessons you learned from the analysis project