Application Security Project – Assume Scenario 1 and answer Tasks in 2 pages (APA Format References)

 Overall Scenario 

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information. 

Scenario 1

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

System Requirements- IOT

 

This is a required assignment, worth 100 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment.

Create a list of requirements. Details on the Project:  Project2 Smart Systems Assignment.pdf Project2 Smart Systems Assignment.pdf – Alternative Formats

You must use the following Template for your solution:  Project2 Requirements template.docx Project2 Requirements template.docx – Alternative Formats

Use the following Template when writing your paper:  Project2 Paper template.docx Project2 Paper template.docx – Alternative Formats

A 20% penalty will be applied if the templates are not used

Discussion 10- Org Behavior

Assigned Readings: Chapter 10. Understanding Work Teams Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. You are on a team which features individuals high in openness and emotional stability. What is the likely result of task conflict within your team? Why is this?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Research Paper

need 3000-4000 words Research paper on ChatGpt with minimum 10 APA references with intext citation as well. 

how technology shift will eliminate the writers and online writing business in upcoming years? 

Discussioon 250 words

 

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.

HELP

 

This assignment consists of two parts, with the first part concentrating on identifying risks, issues, assumptions, and dependencies. Creation of this initial document is a core responsibility of the project manager role. The second part of this assignment is the creation the critical document known as the resource plan. With the knowledge gained from the creation of these two documents, projects are better prepared to course correct when changes occur.

Create a RAID log with clear explanations as to why the individual items are identified and included. Use the project proposal outline created in the previous assignment to identify potential risks that could occur in the process of executing and implementing the project. Log all assumptions made during the project proposal outline creation for the outline to be feasible. Log all issues that will need to be addressed before the project kickoff. Document all dependencies that impact the project completion. For all dependencies in the RAID log, identify relationships between logged items (i.e., successor and predecessor), as well as if these dependencies are internal to the project and the team or external.

Next, create a resource plan that aligns with the skills needed to complete the scope of the project, while also addressing the risks defined in Part 1. Describe the necessary skills needed to complete your proposed solution consider diversity, effectiveness, and responsiveness to organizational needs (e.g., contractor or full-time employees). Additionally, identify ways to mitigate risks through appropriate resource planning.

Submit your assignment using the following Excel spreadsheet format:

  1. Sheet 1: RAID Log

  1. Sheet 2: Resource Plan

Assignment 3

 Chapter 5: Questions for Discussion #1 through #4

  • What is an artificial neural network and for what types of problems can it be used?
  • Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
  • What are the most common ANN architectures? For what types of problems can they be used?
  • ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode

Chapter 5: Exercise 6 and Internet Exercise 7

  • Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.
  • Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Chapter 6: Questions for Discussion #1 through #5

  • What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
  • List and briefly explain different learning paradigms/methods in AI.
  • What is representation learning, and how does it relate to machine learning and deep learning?
  • List and briefly describe the most commonly used ANN activation functions.
  • What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Chapter 6: Exercise 4

  • Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

Important Note:  In cases if any websites or links do not work, select another respective exercise of choice to replace. ????When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.  Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 2.Important Note:  When I see similarity indexes over 20%, I will review the similarity report to determine if points are going to be docked for plagiarism issues and as a tip, do not include or write the actual questions or exercise directions within these papers.  In other words, all work must be original and not copied from any source and very high similarity indexes will be reported to the University. 

PPT 3 slides help

Read two academically reviewed articles on “Applying traffic management” in Net Neutrality and prepare 3 PPT slides

Bullet points only! No paragraphs. Use PPT notes section if you need to explain more.

Slide 4: academically reviewed article listing

Cloud Computing

 We have a cloud computing course project. I uploaded the file with requirements. We need 1 PowerPoint presentation and 2 page description. But the thing is we need to present the instance; how its running, how the system works etc. I also stated a link from the last semester’s presentation. I do not know but we need to meet with the person who does this project so we can present it by ourselves at the day of the presentation.