wk14 07212021

NOTE: **** post replies in separate documents for each Question

      **** Please follow the instructions to the poin

feedback DUE 5/1/23

AFTER READING THIS POST RESPOND BY COMING UP WITH FOUR QUESTIONS OR YOUR OPINION TO THE POST……

 

Point-to-point topology directly links two nodes together. Point-to-point is east to implement. It has higher speeds when compared to other topologies because only two nodes are using the link. However, if the link fails, the network goes down. A bus topology has all of the devices on a network on a single cable running in one direction from one end of the network to the other. Bus topologies are a cost-effective choice for smaller networks since all of the devices are connected by a single cable. If the cable experiences a failure, then the whole network goes down. A ring topology links each node with another node to form a closed network. Data moves from one node to another in this topology. Ring topology’s circular flow of data minimizes packet collisions and can it can also handle a large number of nodes and heavy traffic. A single failure of a cable in a ring topology can disrupt the overall network operations. In a star topology, all nodes are connected to a central hub using a communication link. Every node needs a separate wire to establish a connection with the hub. Since each node has its own cable, network maintenance and management are easier. It is easier to add new devices in a star topology. If the central hub fails, it brings down the entire network. In a mesh topology, all of the nodes are interconnected and can send and receive their data from other nodes. Mesh topologies are redundant because if there are any failures in the nodes or links, it only affects a minimum number of endpoints. Mesh topologies are costly to implement and the installation and maintenance can be time-consuming. 

At the healthcare agency I worked at, they used a star topology. I think this worked best for that office because it was a small office. There weren’t too many people that worked there. There was one day where the central hub failed and no one in the office could use their computers. Even though nobody could work that day, I believe that a star topology was the right choice. This was in the middle of hurricane season in Florida and it had been raining for a few days straight. 

Write an algorithm for

  Write an algorithm for the add method that will add at the end of the list instead of the beginning. What is the time complexity of this algorithm? 

Modify the algorithm from the previous exercise so that it makes use of a rear reference. How does this affect the time complexity of this and the other operations?

Cybersecurity Policy Review

 Cybersecurity Policy Review 

Section 1: 

Using the Internet and/or the Library, research, and complete the following: 

In a minimum of 1,000 words, explain the role cybersecurity policy plays in securing private organizations, public organizations, government organizations, and the nation’s infrastructure. 

Section 2: 

In 200 or more words for each answer, respond to the following: 

  • What are the main categories of an in-depth cybersecurity policy?
  • How would a well-designed cybersecurity policy program help secure a government agency, such as the Department of Homeland Security (DHS)?
  • What are some challenges to making sure everyone in an organization follows the cybersecurity policy? 

Exp22_Word_Ch03_Cumulative – Tourism

 Exp22_Word_Ch03_Cumulative – Tourism 

 Exp22 Word Ch03 Cumulative Tourism 

Word Chapter 3 Cumulative – Tourism

Project Description:

As a member of a local chapter of the Audubon Society, you are involved with an outreach to promote ecotourism, which encourages travel to natural habitats while conserving the environment in the process. You will finalize a short flyer that identifies eight unique destinations for ecotourism, describing them in a Word table. Business sponsors have agreed to support the effort and will be distributing flyers, so you plan to include each business name and contact in the flyer.

     

Start Word. Download and open   the file named Exp22_Word_Ch03_Cumulative_Tourism.docx. Grader has automatically added   your last name to the beginning of the filename.

 

Place the insertion point at the   end of the document. Insert a 2×1 table. Adjust the width of the first column   to 2 inches. Apply a table style of   List Table 2 – Accent 6 (row 2, column 7 under List Tables).

 

Center the newly created table   horizontally. Select the table and apply shading of Gray, Accent 3, Lighter 80% (row 2, column 7).

 

Insert a row between the first   and second rows of the first table (under the Eco-Friendly World Destinations row). Type Destination in the first cell on the new   row. Type Description in the next cell. Type C2 Rating in the last cell on the row.

 

Insert a column at the right of   the last column in the table. Type Approximate Visitors/Year in the last cell on the second   row. Type data in the final two columns of the table as follows:
 

  C2 Rating Approximate Visitors/Year
8  250,300
7 524,000
9 2,000,700
6 34,900
9  190,000
10 3,500
7 145,000
8 348,000

 

Select the first table. Select a   border style of Double solid lines, ½ pt, Accent 3 (row 3, column 4). Apply the selection to outside   borders. AutoFit contents of the table

 

Select the first row of the   first table and merge cells. Center text in the first row. Apply shading of   Light Gray, Background 2, Darker 50% (row 4, column 3). Change font color of text in the   first row to White, Background 1. Bold text in the selected row and change the font size to 14.

 

Select rows 2 through the end of   the table and apply shading of Light Gray, Background 2 (row 1, column 3). Use Border   Painter to copy the double-line format from an outside border and apply it to   each vertical gridline within the table.

 

Apply Align Center alignment to   all text in the second row so that contents are both horizontally and   vertically centered. Apply Align Center alignment to all text in the first   and third columns. Select all numbers in the last column and apply Align   Center Right alignment.

 

Include a caption that reads   Table 1:   Data provided by the National Conservation Fund below   the first table.

 

Select rows 3 through the end of   the first table. Sort the rows in ascending order by Column 1. All   destinations should be shown in alphabetical order.

 

Insert a row at the bottom of   the first table. Type Average in the second cell on the last row. Choose Align Center Right   alignment and bold the entry.

 

Include a function in the third   cell on the last row (below the C2   Rating column) that determines the average of the values in the column   above. You do not need to select a number format.

 

Include a function in the last   cell on the last row (below the Approximate   Visitors/Year column) that determines the average of the values in the   column above. You do not need to select a number format.

 

Begin a mail merge process,   selecting Letters as the mail merge type and selecting a recipient list from Members.xlsx. Data is located in Sheet1$ of the workbook. Note, Mac   users select the text file Members.csv   as a recipient list, responding affirmatively if asked to confirm any file   conversion activities.
 

  Edit the recipient list to include a business you left off, as follows:
 

Sloan   Outfitters 171 Wood Avenue Anderson SC 34408  Serena Blake [email protected]

 

Sort the recipient list in   ascending order by Business, and filter results to show only those from SC.

 

Click in or select the first   cell of the last table on the page (following Thanks for Supporting Us!). Insert the Business merge field. In the second cell   of the table, insert the Contact merge field. Preview results and finish the merge, editing   individual documents and merging all. The merged document should contain six   pages.

 

Select all of the merged   document and copy the selection. Display Exp22_Word_Ch03_Cumulative_Tourism,   move the insertion point to the end of the document, and insert a page break.   Click the new blank page and paste all copied text, resulting in an 8-page   document.

 

 

Save and close Exp22_Word_Ch03_Cumulative_Tourism.docx.   Close all other open documents without saving. Submit Exp22_Word_Ch03_Cumulative_Tourism.docx as directed.

 

Journal 6

Each week you are to enter content into an online journal provided in Blackboard that briefly summarizes (1) the tasks you performed during your internship that week and (2) total hours worked with days/times. The content can be brief and in outline form and use bullet or another list styling, but keep in mind that this content will form the basis of the two major papers that you will write for this course. Therefore, the more detailed you are in your weekly journal, the easier it will be to finish the two papers. Specifically, your weekly journal should contain: 

• The days and times you worked that week, as well as the total hours, worked. (Provide this information at the top of each weekly section so this will act as a de facto heading to separate each weekly entry that you make.) 

• The skills or skillsets used/required to complete each task 

• Each task you performed along with a brief description of what you did.

 • A brief explanation of why the task needed to be done.

 • Was there an outcome? If so, what was that outcome?

 • What new terminology did you learn this week? Provide the term and its definition.

Operational Compliance

 

Operational security compliance is a necessity in any working cybersecurity environment, as it sets the standard for policy, rule, and guideline regulation. Therein, it is necessary for security professionals to grasp the fundamental aspects of operational compliance if they are expected to be able to manage day-to-day operations that require a different level of compliance throughout a given organization.

Students will create a web portal data flow diagram of their hypothetical organization’s operational environment using Visio or similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must:

  1. Display the organization’s technical requirements (related and unrelated applications, services, and links).
  2. Display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth.
  3. Identify related systems and assets, regulatory requirements, and overall risk approach.
  4. Demonstrate each IT task to the next as aligned to regulations/compliance. For example, start with the user logging in, and then go through each step and how it is validated.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-650 Operational Compliance Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

Internet Research Assignment #3

 

2 pages

Read the Equifax Data Breach case and write a paper answering the following the following three questions:

  1. Discuss the moral issues in this case and whether Equifax’s actions constitute a moral failing.
  2. Should companies like Equifax be compelled to announce data breaches to the public within a certain time frame (e.g., 72 hours after discovery)? What would be the downside of legalizing such a requirement?
  3. In your opinion, why was security so lax at Equifax and how can this laxity be remedied?