Question 7

  

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

1. Provide a high-level overview/ summary of the case study

2. Note how constructive intentionality impacts innovation implementations

3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 4 pages in length (not including title page or references)

· APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Client Supported Commands Server Reaction and response Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully” Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove

 

Client Supported Commands Server Reaction and response   Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully”   Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove all occurrences x from the inputValues list 2- Respond with “removed

 

  Client Supported Commands Server Reaction and response   Add: x where x can be any integer value (e.g., Add: 74) 1- Add x to the inputValues list 2- Respond with “added successfully”   Remove: x where x can be any integer value (e.g., Remove: 2) 1- Remove all occurrences x from the inputValues list 2- Respond with “removed successfully”   Get_Summation 1- Calculate the summation of values in the inputValues list 2- Respond with “The summation is x” where x is the summation of all values in the list. If empty list or all elements are zeros, x in the message equals null   Get_Minimum 1- Search for the minimum number in the inputValues list 2- Respond with “The minimum is x” where x is the minimum value in the list. If empty list or all elements are zeros, x in the message equals null   Get_Maximum 1- Search for the maximum number in the inputValues list 2- Respond with “The maximum is x” where x is the maximum value in the list. If empty list or all elements are zeros, x in the message equals null    

Exit. This is the only command that terminates the interactive communication.

No action or response required    

JAVA PROGRAM. 

import java.io.*;
import java.net.*;

class Server {

   public static void main(String args[]) {
        try {

           // Create server Socket that listens/bonds to port/endpoint address 6666 (any port id of your choice, should be >=1024, as other port addresses are reserved for system use)
            // The default maximum number of queued incoming connections is 50 (the maximum number of clients to connect to this server)
            // There is another constructor that can be used to specify the maximum number of connections
            ServerSocket mySocket = new ServerSocket(6666);

            System.out.println(“Startup the server side over port 6666 ….”);

           // use the created ServerSocket and accept() to start listening for incoming client requests targeting this server and this port
            // accept() blocks the current thread (server application) waiting until a connection is requested by a client.
            // the created connection with a client is represented by the returned Socket object.
            Socket connectedClient = mySocket.accept();
 

           // reaching this point means that a client established a connection with your server and this particular port.
            System.out.println(“Connection established”);

            // to interact (read incoming data / send data) with the connected client, we need to create the following:

           // BufferReader object to read data coming from the client
            BufferedReader br = new BufferedReader(new InputStreamReader(connectedClient.getInputStream()));

           // PrintStream object to send data to the connected client
            PrintStream ps = new PrintStream(connectedClient.getOutputStream());

            // Let’s keep reading data from the client, as long as the client does’t send “exit”.
            String inputData;
            while (!(inputData = br.readLine()).equals(“exit”)) {    
 

                System.out.println(“received a message from client: ” + inputData);   //print the incoming data from the client

               ps.println(“Here is an acknowledgement from the server”);              //respond back to the client
 

            }
 

            System.out.println(“Closing the connection and the sockets”);

           // close the input/output streams and the created client/server sockets
            ps.close();
            br.close();
            mySocket.close();
            connectedClient.close();

       } catch (Exception exc) {
            System.out.println(“Error :” + exc.toString());
        }

   }
} /*********************************/

import java.io.*;
import java.net.*;
import java.util.Scanner;

class Client {

   public static void main(String args[]) {
        try {
 

            // Create client socket to connect to certain server (Server IP, Port address)
            // we use either “localhost” or “127.0.0.1” if the server runs on the same device as the client
            Socket mySocket = new Socket(“127.0.0.1”, 6666);

            // to interact (send data / read incoming data) with the server, we need to create the following:
 

            //DataOutputStream object to send data through the socket
            DataOutputStream outStream = new DataOutputStream(mySocket.getOutputStream());

           // BufferReader object to read data coming from the server through the socket
            BufferedReader inStream = new BufferedReader(new InputStreamReader(mySocket.getInputStream()));

            String statement = “”;
            Scanner in = new Scanner(System.in);
 

            while(!statement.equals(“exit”)) {
 

                statement = in.nextLine();              // read user input from the terminal data to the server
 

                outStream.writeBytes(statement+”n”);        // send such input data to the server

                String str = inStream.readLine();         // receive response from server

               System.out.println(str);                // print this response
 

            }

           System.out.println(“Closing the connection and the sockets”);
 

            // close connection.
            outStream.close();
            inStream.close();
            mySocket.close();
 

        } catch (Exception exc) {
            System.out.println(“Error is : ” + exc.toString());

       }
    }
}

Discussion10

150 words+

What do you think Aritfical Intelligence do for: education, medicine, manufacturing or transportation. Pick one to address.

SE492 week 6 A

 

Dear Students,
After you review all course materials attached below please answer the following question.

Assignment:

 Discuss different types of cost estimates and methods for preparing them.

how much would it cost to have the following assignment done?

 

There are various resources where you can find information on recent cyber threats, for example:

Have a look at these resources, (or any other resources that you identified). Write an article discussing 5 threats that you found interesting.

The article should include the following information:

  • Choose 5 topics from list below, and describe one interesting threat on each topic:
    • Physical security
    • IAM
    • Asset (including data, operating systems, endpoints, etc)
    • IoT
    • Web application
    • Network
    • Malware
    • Others (you may decide yourself)
  • For each threat, describe:
    • Resources you used;
    • What is it about, which topic (see the list above) it covers;
    • Why interesting;
    • Which vulnerability is involved;  what is its CVSS value? use the calculator (https://www.first.org/cvss/calculator/3.0) ; motivate the CVSS values;
    • Describe at least one incident associated with this threat;  explain its impact on CIA; and give suggestion on possible mitigations.

Each threats should be described at about two A4 pages.  So in total, the body of this document should be about 10 pages, excluding citations.

Project

 

  1. Final Project – This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.

Required Source Information and Tools

The following tools and resources are needed to complete this project:

  • A web browser and access to the Internet to perform research for the project
  • (Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft Visio

Learning Objectives and Outcomes

  • Apply core competencies learned throughout the course to a single project.
  • Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
  • Demonstrate logical reasoning and decision-making skills.

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.

Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.

You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. 

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Project Part 1: Network Design

Scenario – The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

  • Current infrastructure elements
  • A logical topology that separates the Accounting and Sales departments
  • Redundant communications
  • Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

  1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
  2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.
  3. Include a high-level plan that ensures communications are available 24/7.
  4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
  5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.
  6. Create a draft report detailing all information as supportive documentation.
  7. Cite sources, where appropriate.

Required Resources

  • Internet access
  • Course textbook

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I determined the best network design to ensure the security of internal access while retaining public website availability.
  • I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.
  • I created a plan that ensures communications are available 24/7.
  • I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
  • I created a basic network diagram that illustrates the current network and enhancements.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 2: Firewall Selection and PlacementScenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

  1. Research and select firewalls for the Corporation Techs network.
  2. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.
  3. Address network, server, and workstation firewalls.
  4. Describe a plan for creating a DMZ, and explain how it makes the network more secure.
  5. Research network authentication and create a high-level plan for secure authentication to internal network resources.
  6. Create a draft report detailing all information as supportive documentation.
  7. Cite sources, where appropriate.

Required Resources

  • Internet access
  • Course textbook

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and selected firewalls.
  • I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.
  • I addressed network, server, and workstation firewalls.
  • I described a plan for creating a DMZ and explained how it makes the network more secure.
  • I created a high-level plan for secure authentication to internal network resources.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

  1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.
  2. Recommend any other forms of remote access that are relevant and describe how they would be used.
  3. Create a draft report detailing all information as supportive documentation.
  4. Cite sources, where appropriate.

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and recommended an appropriate VPN technology.
  • I described the VPN technology and explained why it is the best choice.
  • I recommended other forms of remote access that are relevant and described how they would be used.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Project Part 4: Final Network Design Report

Scenario

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks

For this part of the project, perform the following tasks:

  1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.
  2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.
  3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Submission Requirements:

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: APA style
  • Length of final report: 10–16 pages, including executive summary and network diagram

Self-Assessment Checklist for Final Report

  • I developed a network design that meets the requirements.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
  • I described technology recommendations, provided justification for those recommendations, and described methods to measure the success of each major network enhancement.
  • I included an executive summary and a final network diagram.
  • I included citations for all sources used in the report.
  • I followed the submission guidelines.

Additional Instructions

  • The papers must include exactly all four parts of the project. Make sure your submission includes ALL the deliverables as requested.
  • DO submit only the deliverables listed under Tasks.
  • DO NOT submit the information in the self-assessment checklist. That is just to make sure your paper is completed and includes all the requested information.
  • Make sure you adhere to the format, font, citation style, and length requirements, listed under Submission Requirements.

Please let me know if you can actually take this project seriously and do it

Scholarly abstract of Qualitative Analysis

Question: Scholarly abstract of Qualitative Analysis(5 pages with below requirements in the same order)

Requirements

Each paper should contain the below in the following order:

1. Bibliographic Citation – use the correctly formatted APA(APA7) style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5.Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data(surveys, tests, interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Cybersecurity

As cloud computing increases in popularity, enhanced features are continually being added. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five features. What are the advantages of each? What are the disadvantages? Which would you recommend? Why?

Now that you have compared the cloud features, use the Internet to research different options for encrypting and securing email. Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why? Write a one-paragraph explanation along with your table.Write a one-paragraph explanation along with your table.

Remember to include the at least a one page paper on the cloud features, and the paragraph and table regarding the different options for encrypting and securing email.

Discussion 250 words

 If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?