Project Paper (2.5 pages)

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§  Understand and document the purpose of each access control change request

§  Know what access controls were in place before any changes

§  Get an approval of change by management

§  Understand the scope of the change, both with respect to users, computers, and objects

§  Have evaluated the expected impact of the change

§  Know how to evaluate whether the change meets the goals

§  Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§  Status or setting prior to any change

§  Reason for the change

§  Change to implement

§  Scope of the change

§  Impact of the change

§  Status or setting after the change

§  Process to evaluate the change

Required Resources

§  Internet access

§  Course textbook

Submission Requirements

§  Format: Microsoft Word (or compatible)

§  Font: Times New Roman, size 12, double-space

§  Citation Style: APA

§  Length: 2 to 4 pages

Self-Assessment Checklist

§  I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§  I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

§  I followed the submission guidelines.

Cloud computing

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.Your presentation will include an executive summary along with the following from previous steps:

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

 Please use power point to answer the question and add references 

SECURITY POLICY & STANDARTS

The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.

Answer the following question(s):

1. What is an advantage of organizing IT security policies by domain?

2. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

The influence of music.

Can anyone write me a five page paper on how music can influence people in life. I need this paper done by Wednesday Morning. MLA Format. No PLAGIARISM PLEASE!!!!!!!!!!!

Security Architecture and Design – Project paper

  

In the following scenario, you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate its entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

  

Length: Minimum of 600 words

Computer and Information Networking

  Please answer these questions : (No plagiarism )

1. Explain the layers of the OSI, TCP/IP, and the Internet models in detail, and elaborate on their similarities and differences.

2. Explain the concept of Capsulation/De-capsulation.

3. Explain TCP and UDP, their differences, and their applications. Which one is better and why?

4. Explain in detail the hub, active hub, switch, and routers, and their purposes, similarities, or differences.

5. List and explain guided and unguided mediums and give a couple of examples of each.

6. Explain the difference between wire and fiber optic and list the advantages and disadvantages of each one in detail. 

7. Assume that you have a wired network. Explain how you would covert this system to a fiber optic system.

8. A RF amplifier has a power gain of 30 dB. How many times does this amplifier amplify the incoming signal? Show your calculations step-by-step.

9. Explain how analog signals are converted into digital.

10. Explain how wireless networks work. 

Project

 

I require a code for the classification of mushrooms for this dataset https://www.kaggle.com/uciml/mushroom-classification  I want the code to perform classification if the mushroom is edible or not using SVM, Decision tree, Random Forest, and Naive Bayes with their f-precision, recall, accuracy. I also want cross validation on the mentioned methods.

I also need a project report that is 4 pages, which details in the first page – 1 The problem description and task

In the second page – The attributes, the preprocessing being done on them and features.

In the third page – The models being used which and how we used it 

Fourth Page – I need the experiment results and the cross validation with the models

Question

Server System

in 250 words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.

 in 250 word summary to include (a) security measures applies to protect information systems and security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place, and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed. 

Discussion 13- Exe Project

Assigned Readings:Chapter 13. Project Evaluation and Control Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. It has been said that Earned Value Management (EVM) came about because the Federal Government often used “Cost-plus” contractors with project organizations.  Cost-plus contracting allows the contractor to recover full project development costs plus accumulate profit from these contracts.  Why would requiring contractor firms to employ earned value management help the government hold the line against project cost overruns?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text 

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19