network administration

Although VPNs are relatively secure by nature, endpoints are not. Data entering or leaving the VPN is at risk. An end-user computer could be infected by malicious code that can traverse the VPN link into the company LAN.

Answer the following question(s):

Consider employees who work from home and use personally owned computers to access a company internal network How would you make those computers and connections more secure? That is, how would you prevent malicious code from getting on to the internal network?

Dice_game

need help coding a code on codehs and i think it is looping and there are 1 other assignments i need to be done also  called rock paper scissors 

LIT101 week 8 B

Discussion 8B: Symbolism in Business

No unread replies.No replies.

Businesses use symbols to help consumers identify with their brand. Review the following two articles about how symbols relate to a company’s brand.

Hidden symbols in common food logos: https://www.businessinsider.com/hidden-symbols-in-common-food-logos-2017-3 (Links to an external site.)

Make your brand iconic: The power of symbols in branding: https://stickybranding.com/make-your-brand-iconic-the-power-of-symbols-in-branding/ (Links to an external site.)

Initial Post:

If you started a company today, what would your logo look like?

What symbols would you use to convey your brand? Explain why you would choose that symbol and what that would convey about you or your business.

Responses to Others

Respond to at least two other posts. How was their use of symbolism similar to or different from what you chose to convey your brand?

Assignment

1 page
– Explain network security plan and network security policy and their differences.

– What are some methods for keeping hackers from viewing and changing router and switch configuration information?

Access control q2

Assignment

What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+  and VPN?

requirement:

200-to-300 words

APA format

please cite the text properly with reference

Linux

3-4 PAGES PLEASE

Stick to the deadline kindly 

In the attached file is a template of how the project should be done. 

Below are the instructions of what is wanted.

Previous order you did

https://www.homeworkmarket.com/questions/faster-computing-has-contacted-go2linux-and-requested-a-brief-proposal-presentation-for-migrating-its-systems-from-windows-to-linux

Instructions
 

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

case study, essay type

 

You  are an employee at D&B Investigations, a firm that contracts with  individuals, companies, and government agencies to conduct computer  forensics investigations. D&B employees are expected to observe the  following tenets, which the company views as the foundation for its  success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your  manager has just scheduled a meeting with an important prospective  client, and she has asked you to be part of the team that is preparing  for the meeting. The prospective client is Brendan Oliver, a well-known  celebrity. Last night, Mr. Oliver’s public relations team discovered  that someone obtained three photos that were shot on his smartphone, and  tried to sell the photos to the media. Due to the sensitive nature of  the photos, Mr. Oliver and his team have not yet contacted law  enforcement. They would like to know if D&B can provide any guidance  or support related to the investigation—or, at the very least, if  D&B can help them prevent similar incidents from occurring in the  future. At this time, they do not know how the photos were acquired. The  public relations team is wondering if a friend, family member, or  employee could have gained direct access to Mr. Oliver’s phone and  obtained the photos that way, although the phone is usually locked with a  passcode when Mr. Oliver is not using it. In addition, Mr. Oliver  emailed the photos to one other person several months ago. He has not  spoken with that person in the last few weeks, but he does not believe  that person would have shared the photos with anyone else. 

Your  manager plans to use this initial meeting with Mr. Oliver and his  public relations team to establish rapport, learn more about the case,  and demonstrate the firm’s expertise. The company sees this as an  opportunity to build the future business, regardless of whether they are  retained to help with the investigation of this case.

Tasks

To  help the team prepare for the meeting, your manager asks you (and your  colleagues) to consider and record your responses to the following  questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? 
  • Based  on the limited information provided in the scenario, what is the  rationale for launching an investigation that uses computer forensic  activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What  would you share with the client about how investigators prepare for and  conduct a computer forensics investigation? Identify three to five key  points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale. 
  • What  should the client, investigators, and others do—or not do—to ensure  that evidence could be used in a court of law? Using layman’s terms  explains laws and legal concepts that should be taken into account  during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Required Resources

  • Course textbook
  • Internet access

Submission Requirements

  • Format: Microsoft Word (or compatible) 
  • Font: Arial, 12-point, double-space 
  • Citation Style: Follow your school’s preferred style guide
  • Length: 5–7 pages

Self-Assessment Checklist 

  • I effectively documented the causes for investigation.
  • I effectively documented key points related to the collection, analysis, and presentation of computer forensic evidence.
  • I successfully identified potential sources of evidence.
  • I summarized laws and legal concepts that apply to this case.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.