Discussion + Research Paper

 Task 1: Research paper –  Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. 

Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook. 

At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:• 

– Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. 

Task 2:

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization. 

modeule 7

 600 words

In order to find the best design for your documents or site it is important that you have a firm grasp on what your goals are for any piece of writing. Do you want to entertain, to sell, to perform a task, or to teach? You must also keep your rhetorical strategy in mind as you consider document design. Are you planning to focus mainly on logos, pathos, or ethos? Perhaps you are trying to balance all three. What is the age and demographic of your target audience? What are their needs in relation to the document? Do they have a disability? Do they come from a different culture?

Select a technology oriented site (examples: Apple, Amazon, Intel) and review the site in the light of the design principles

Discussion#5 Week 8-2 – Information Governance

Topic:

 We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today. In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Question:

 With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism***************

What service daemon can

  

1. What service daemon can be configured and started so that linuxsupersuser does not have to manage and assign static ip addresses to a network host?

2. The linux firewall daemon iptables can enforce rules on all the following chains except input output route forward

3. As a security measure, all tcp services are protected by tcp wrappers, what two files make up the tcp wrappers?

4. After linux uses the secure shell command to generate a pair of public and private keys what should the user do with the public key?

5. The secure shell daemon, sshd listens whatcp port?

6. A user with the name jsmith will have the default directory ___ assigned to him for private use

7. The first line of a Linux Bash script must be ____

8. When using the chmod command in numeric mode, the permission r– can be represented by what number?

9. You can manage groups by using the following commmnads except___ groupadd,groupmod,groupdel,grouprm

Example Table

Threats to confideliality,intergrity,and availabilty

Create a minimum 1-page table in Microsoft® Word or Word Compatible identifying a minimum of 6 threats, using the column headers and details below:

Column Headers 

  1. Threat 
  2. Threat to Type of Data 
  3. Confidentiality/Integrity/Availability 
  4. Mitigation Suggestion 

Details Within Your Table 

  1. Identify relevant threats. List 1 per column. 
  2. Determine the type of data threatened (data-at-rest, data-in-transit, or processing) in the column. 
  3. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column. 
  4. Describe the mitigation plan in 2 to 3 sentences in the column. 

Example Table 

Example Table

Include a short paragraph that highlights 2 access control techniques or policies that enforce security. 

Cite at least 2 resources to support your assignment. 

Format your assignment according to APA guidelines.

Review Rubric to assure all requirements are met.

Strategy Marketing

  1. Choose an Internet Blog that pertains to Market Research. 
  2. Describe the following:
  • What is the goal of blogging?
  • What makes a successful blog?
  • What are the key components of a blog?

Please find an external source and one from the book attached.

using APA formatting and should include a cover page and reference page with a minimum of 3 resources.  The cover page and resource page are not included in the page count.

Here it is in case you didn’t have it And use this tool to make the APA annotations.

https://www.scribbr.com/apa-citation-generator/new/webpage/

Chapter Note

Need to write about 2 pages (1.5 line spacing and 11 or 12 font size) of summary of chapter, so that it contains:

(part 1) important concepts of the chapter

(part 2) experience/application/opinions of the chapter.  

Due Sep 12, 11:59pm, PT…………20 hours left

What-If Analysis

 

PROJECT 2: WHAT-IF ANALYSIS

OBJECTIVE
The purpose of this project is to demonstrate your understanding of the following course concepts:

1. Analyzing data with Goal Seek.
2. Using What-If Analysis tools.
3. Using Solver.
4. Using Scenarios.
5. Summary Reports.

PROJECT DESCRIPTION
PART 1
The automatic recalculation feature of Excel is a powerful tool that can be used to analyze worksheet data. What-if analysis is a decision-making tool in which changing input values recalculate formulas, in order to predict various possible outcomes. When new data is entered, Goal seek is a problem-solving method in which you specify a solution and then find the input value that produces the answer you want.

You are assisting Tony Sanchez, the office manager at Riverwalk Medical Clinic, with a disaster recovery plan for the medical records at the clinic. As part of that plan you are looking at two options for storing backup medical records. The first option is to purchase a storage facility, and the second is to use a third-party backup storage company that offers off-site small, medium, and large storage areas. In both cases, you want to keep your monthly payments below $17,000. You decide to use Goal Seek to look at various interest rates for purchasing a storage facility and to use Solver to help find the best possible combination of third-party storage areas. You will be working with the attached file: EX_2.1.xlsx.

1. Open the fie EX_2.1xlsx and save it as Project2.1_Records.xlsx.
2. With the Purchase Sheet active, use Goal Seek to find the payment for an interest rate of 5.75% on a Loan amount of $750,000 for 60 months. Use an additional loan amount of your choice with an interest rate of 6% to find the monthly payment for 48 months.
3.  Activate the Rental Sheet. Open Solver, then use the Set Objective To option to maximize the storage amount in cell B12. (Hint: Select Max in the Set the Objective To area.).
4. In Solver, use the quantity, cells B6:D6, as the changing cells.
5. Add a constraint to Solver specifying the quantity in cells B6:D6 must be integers.
6. Add a constraint specifying that the total monthly payment amount in cell B11 is less than or equal to 17,000.
7. Generate a solution using Solver and accept Solver’s solution.
8. Save the workbook and submit to the Assignment Folder.

PART 2
As a senior financial analyst at North Shore CPA Services, you are researching various options for financing a $250,000 loan for the purchase of a new estate-planning facility. You haven’t decided whether to finance the project for three, four, or five years. Each loan term carries a different interest rate. To help with the comparison, you summarize these options using a Scenario Summary. You will be working with the file EX_2.2.xls.

1. Open the fie EX_2.2.xlsx and save it as Project2.2_Loans.xlsx.
2. Create cell names for cells B4:B11 based on the labels in cells A4:A11, using the Create Names from Selection dialog box.
3. Use Scenario Manager to create scenarios that calculate the monthly payment on a loan amount of your choice under the three sets of loan possibilities listed below in Figure 1. For instance, in Figure 2 below, the loan amount of $250,000 was used. Note: You cannot use the loan amount of $250,000. (Hint: Create three scenarios, using cells B5:B6 as the changing cells.

FIGURE 1: SCENARIO, INTEREST RATES & TERMS

SCENARIO NAME

INTEREST RATE

TERMS (MONTHS)

5% 5 year

5

60

4% 4 year

4

48

3% 3 year

3

36

FIGURE 2: NORTH SHORE CPA SERVICES

NORTH SHORE CPA SERVICES

Financing Options

Loan Amount

$250,000.00

Annual Interest Rate

5.00%

Term in Months

60

Monthly Payment:

$4,717.81

Total Payments:

$283,068.50

Total Interest:

$33,068.50

4. View each scenario and confirm that it performs as intended, then display the 5% 5 Year scenario.
5. Generate a scenario summary titled Finance Options. Use cells B9:B11 as the Result cells.
6. Format the range B9:B11 as currency with two decimal places.
7. Delete the Current Values column in the report and the notes at the bottom of the report, Row 1, and column A.
8. Rename the sheet Estate Planning Project and assign a color of your choice.
9. Enter your name in the center footer section of both worksheets.

Excel_5E_Sports_Schedule

Excel_5E_Sports_Schedule

     

Start Excel. Download, save, and   open the workbook named Student_Excel_Sports_Schedule.xlsx.   

 

Go To cell M82, and then insert   a COUNTIF function to count the number of Staff referees using the range M1:M80 in the formula. In   cell K82, type Events with Unassigned Referees.

 

Move to cell A1, and then from   the files you downloaded for this project, Open the file e05E_Referee_Requests. Switch windows, and then make your 5E_Sports_Schedule the active window.   Arrange the two files horizontally.
 

  Mac users, do not open the file, or if you have opened the e05E_Referee_Requests workbook, close   the file. In your 5E_Sports_Schedule   file, click cell M48, type Danny Litowitz and then make cell A1 the active cell. Skip Steps   4 and 5, and then continue with Step 6.

 

In your 5E_Sports_Schedule workbook, Go To cell A82, Split the window,   and then click in any cell above the split in column C. Use Find to locate   the first Event # request from the e05E_Referee_Requests worksheet, and then   in cell M48 in your 5E_Sports_Schedule,   type Danny   Litowitz to   assign him as the Referee.

 

Close the Find and Replace dialog box, and then Close the e05E_Referee_Requests workbook.   Maximize your 5E_Sports_Schedule worksheet,   and then remove the Split.

 

Insert a new blank row 1. In   cell A1, type Schedule of Sports Events with Unassigned Referees and then Merge & Center the   title across the range A1:M1. Apply the Title cell style.

 

Create a New Table Style named Sports   Schedule and   format the First Row Stripe with a Fill—in the last column, the third color.   Set the style you created as the default table style for this workbook. 

 

Select the range A2:M81 and   apply the Custom table style—Sports Schedule.

 

AutoFit columns A:M. Set the   Orientation to Landscape, set the Width to 1 page, and center the worksheet   Horizontally. Insert a footer in the left section that includes the file   name, and in the right section, insert a page number. 

 

In Page Break Preview, break   Page 1 after row 49 to end Page 1 with TENNIS   and begin Page 2 with TRACK.   Return to Normal view. Set Print Titles to repeat row 2 at the top of each   page.

 

 

In cell J2, Insert a Hyperlink   to your student data file e05E_Sports_Coaches.   Create the ScreenTip Click here for contact information and then test your hyperlink.   Close the e05E_Sports_Coaches file.

 

Save your workbook and then   close Excel. Submit the workbook as directed.