Network diagram

Security

 

  1. Objectives
  • To practice the formal procedure of system/network security analysis and planning.
  • To examine the vulnerability and security needs of a private organization.
  • To devise strategies to overcome potential malicious attacks, threats, and risks.
  1. Target Network

You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent. 

Network diagram

The network specifically contains:

  • 2-Switches
  • 1-Web/FTP server with Linux operating system using port 80 and port 21
  • 1-Email Server with Exchange 2010 using port 25
  • 2-Active Directory Domain Controllers (DC) with Windows Server 2016 operating system
  • 2-Domain Name Service (DNS) Servers with Windows Server 2016 operating system
  • 2-Windows file servers using port 21
  • 3-Wireless Access Points (WAP) encrypted with WEP protocol.
  • 100 – Desktop/Laptop computers with Windows 10 operating system
  • 2- Multifunction printers (print, copy, scan, fax)
  • 1- Voice Over IP (VOIP) telephone system with 100 IP phones

The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin.  A single security guard is located on the second floor of the building.  The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees.  The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.

  1. Assignment Details

The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.

Write a four to six (4-6) page paper in which you:

  • Analyze five (5) or more specific potential malicious attacks and/or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the five (5) or more selected malicious attacks.
  • Propose at least nine (9) – 3 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected potential malicious attacks.
  • Analyze three (3) or more potential risks for data loss and data theft that may exist in the documented network and applications.
  • Explain in detail the potential impact of the three (3) or more selected risks for data loss and data theft.
  • Propose at least three (3) – 1 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected risks for data loss and data theft.
  • List and provide a product overview of only two (2) alternatives for each logical/technical security control for both data loss/theft and malicious attacks. Include web links to the products and why those products should be considered.

Expectations

  • Use at least five credible and quality resources. Your external resources should not be more than two to three (2-3) years old.

Note: Wikipedia and similar websites do not constitute as credible and quality resources.

  • Single Word document
  • Double spaced
  • Times New Roman, size 12 font
  • One-inch margin on all sides
  • Citations and references must follow APA format
  • Include a cover page containing:
    • Title of the assignment
    • Student’s name
    • Professor’s name
    • Course title
    • Assignment due date

Note: The cover page and reference page are not included in the assignment page length requirement.

question

MPEG 21 is organized into several independent parts to allow various slices of the technology. Discuss this issue and provide five different examples of such components.

Exp19_Word_Ch02_ML2 – Dentist 1.1

  

Exp19_Word_Ch02_ML2 – Dentist 1.1

Exp19 Word Ch02 ML2  Dentist 1.1

Word Chapter 2 Mid-Level 2 – Dentistry 

  

Project Description:

In the following project, you will use Word to prepare a letter promoting an informational session for a pediatric dentist. You will insert a picture and use text and paragraph formatting to improve the appearance of the letter.

     

Start Word. Download   and open the file named Exp19_Word_Ch02_ML2_Dentist.docx.   Grader has automatically added your last name to the beginning of the   filename. Ensure that nonprinting characters are displayed.

 

Change the   capitalization of the recipient, ms.   nancy lancaster, and her address to Capitalize Each Word, and change the   capitalization of the state abbreviation to UPPERCASE. Also capitalize her   first name in the salutation. Change the name Dr. Lockwood on the last line of the letter to Mia   Grant. Type   [email protected] on a new line below Mia Grant. (Do not press ENTER after   typing the email address.)

 

Change the alignment   of body paragraphs beginning with On   behalf and ending with seeing you   on September 11 to Justify.

 

Apply a right arrow   bullet to the paragraph mark under the first body paragraph. Type the   following items, pressing ENTER after each of the first three   lines. Do not press ENTER after the last item in the list.
 

Finding hidden toothbrushes in the dental office
Participating in the dental crossword puzzle challenge
Writing a convincing letter to the tooth fairy
Digging through the dental treasure chest

 

Change the paragraph   spacing of the text from the salutation Dear   Nancy through the last paragraph that ends seeing you on September 11 to 12 pt Spacing After. Remove the   paragraph mark just after the Dear   Nancy paragraph.

 

Change the font of Dr. Lockwood Pediatric Dentistry Office in   the first body paragraph to small caps.

 

Select the lines of   text beginning with Date: and   ending with Richmond, VA 23005.   Increase the left and right indents to 1.25 and change paragraph   spacing to 0 pt Spacing After. Do not deselect the text.

 

To the same   selection, apply a Box border, selecting a double line   (seventh in the list), with a line width of 3/4 pt.

 

Delete the extra tab   formatting marks to the left of the lines containing September 4, 2021; 4:00 p.m.; and Dr. Lockwood   Pediatric Dentistry Office to align them with other text in the bordered   area. 

 

Delete the paragraph   mark before the paragraph that begins Please   call our office.

 

Change the paragraph   spacing of the paragraph containing Funville,   VA 23000 to 6 pt Spacing After. Change the paragraph spacing of the line   containing Sincerely to 6 pt   Spacing Before. Add paragraph spacing of 6 pt Spacing Before to the paragraph   beginning Dr. Lockwood is pleased to   let you know.

 

Change the font of   the entire document to Bookman Old Style. Change the font size of the entire   document to 12 pt.

 

With the insertion   point at the beginning of the document, insert an Online Picture using the   keyword tooth and then insert an appropriate image from the   results. Select and delete any additional text boxes that may display when   the image is inserted. To avoid file size limitations, compress the online   picture once it is inserted.
 
  Position the picture in the top-right corner of the document, just below the   header area. Change the wrapping style to Square. Change the height to 1.1”.   Apply a picture style of Beveled Oval, Black and choose the Chalk Sketch   Artistic Effect.

 

At the end of the   document, insert a Next Page section break. In Section 2, change the   orientation to Landscape, the paragraph spacing to 6 pt Spacing After, and   the font size to 14.

 

In Section 2, center   the first paragraph. Type Wellington Water Park & Slide Fun Day! Press ENTER and type September   11, 2021.   Press ENTER and change the alignment to Left. Change the font size to 12.

 

Set a left tab stop   at 2” and a right tab stop at 7”. The right tab stop should include a dot   leader. Type the following text, with the first column at the 2” tab stop and   the next column at the 7” tab stop.
 

Check-in 9:00
Wave pool 9:30-11:00
Lunch at the pavilion 11:00-12:00
Bungee 12:00-2:00
Water slide 2:00-3:00
Parent pickup at the gate 3:00-3:30

 

 

Format the text Wellington Water Park & Slide Fun Day!   on page 2 as a WordArt with the style Gradient Fill: Purple, Accent color 4;   Outline: Purple, Accent 4 (second row, third column). Change the wrapping   style to Top and Bottom, and the font size of the WordArt object to 24. Drag   to center the object horizontally on the first line.

 

No material for   public distribution should contain errors. You check for and correct any   spelling and grammar mistakes because it speaks to professionalism and   influences how patients perceive Dr. Lockwood and his staff in the dentist’s   office. Ignore the suggestions for Funville   and include, and any other   suggestions on your computer. 

 

Save and close Exp19_Word_Ch02_ML2_Dentist.docx. Exit   Word. Submit the file as directed.

blog post

make a blog post of 250 words on HTML forms 

1. please attach pictures

2. do not plagiarize 

2. cite references 

Activity 7B- Project Process

Activity 1: 

Both Waterfall (Predictive) and Agile(Adaptive) methdologies are built based upon core tenets.  Describe one core tenet for Waterfall and one core tenet for an Agile methdology of your choice and explain why you feel it is necessary for the methdology.    

Activity 2: 

Case Study Overview:

In conventional business and government megaprojects–such as hydroelectric dams, chemical-processing plants, or big-bang enterprise-resource-planning systems–the standard approach is to build something monolithic and customized. Such projects must be 100% complete before they can deliver benefits: Even when it’s 95% complete, a nuclear reactor is of no use. On the basis of 30 years of research and consulting on megaprojects, the author has found two factors that play a critical role in determining success or failure: replicable modularity in design and speed in iteration. The article examines those factors by looking at well-known megaprojects, both successful ones, and cautionary tales.

Case Study Link

Better Project Management | Harvard Business Publishing Education

Paper Requirements: 

Question 1:  In the article Agility Hacks, they talk about processes that can be used to “tackle immediate challenges quickly”.  Using your knowledge of Project Management Processes, what is the impact to the organizaton by not using a “formalized process” and what do you feel is the different between an “agility hack” and a hybrid methdology 

Text

Title: Effective Project Management ISBN: 9781119562801 Authors: Robert K. Wysocki Publisher: Wiley Publication Date: 2019-05-07 Edition: 8th Edition 

Importance of data in an Organization

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for this topic. Needs to be 4 pages in length. 

Cloud computing solution for the below attached document organization

a. For your Cloud Computing Final Project, complete a case study to provide a practical reference to help enterprise Information Technology (IT) and business decision-makers adopt cloud computing to solve business challenges. The case study provides a way to evaluate the market from the point of view of your organization to select a cloud architecture and an implementation approach through the use of house staff, cloud vendor(s), or both. An organization is expected to have any or all of the Cloud Computing models, depending on its needs for speed of execution, available resources, data protection and security needs, and an array of other reasons. Based on your case study, choose the most efficient cloud service and deployment model for your organization. As the organization’s consultant, provide accurate guidance to decision-makers on the selection of cloud service and deployment models. Take into consideration the organization’s size, IT Infrastructure, and other needs. Follow the Step-by-Step Cloud Computing Prescriptive Series to guarantee a successful cloud deployment from the perspective of the cloud service consumer. During the Intersession, you completed steps 1-7 of your project for review. Use the feedback from the intersession assignments as you write your final analysis. Additionally, add steps 8-10 to your final analysis.Step-by-Step Cloud Computing Prescriptive Series:

  1. Assemble your team
  2. Develop a business case and an enterprise cloud strategy
  3. Select cloud deployment model(s)
  4. Select cloud service model(s)
  5. Determine who will develop, test, and deploy the cloud services
  6. Develop governance policies and service agreements
  7. Assess and resolve security and privacy issues
  8. Integrate with existing enterprise services
  9. Develop a proof-of-concept (POC) before moving to production
  10. Manage the cloud environment

Your written case study analysis must be at least 5 pages and follow proper APA format. Be sure to thoroughly address all of the items listed above, including steps 8-10.

b. Prepare a presentation on your Cloud Computing Final Project case study. Your presentation must be:

  • at least 12 slides, not including the title or reference slides;
  • between 5-10 minutes in length; and
  • engaging and provide a thorough review and summary of all components of your written case study.

Slides must be concise and uncluttered. Use various graphic and visual enhancements when appropriate. Provide APA-style citations for any references and images used.

Discussion topic: Big data visualization (350-400 words)

 Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.