Project

 

our client is a medical clinic that has multiple small offices in San Diego County. Each office has its own network that includes the following:

4 – workstations (three doctors and one administrative assistant)

1 – Database server (patient’s records)

1 – Windows server (active directory for authorization)

1 – Web Server (with links to the other offices)

 This design is duplicated in each of the clinic’s small offices.

You have been assigned to develop the security architecture for a cloud deployment using AWS or Azure (your choice) that minimizes duplication currently implemented in the clinic. The deployment must consist of the following minimum components:

  • Load Balancer
  • Web Server
  • Back-end database

 

Develop a security architecture that meets the following requirements:

Access control and authentication:

  1. Public facing area
  2. Authenticated access for registered customers
  3. Multi-Factor authentication for developers and admins

Network Security

  1. Monitoring and testing
  2. Encrypted communications

(References will be checked, and a Plagiarism Checker may be used)

Deliverables:

  • Written Report of recommendations (10-15 pages
  • A detailed network diagram of your proposed recommendations. 
  • Title Page – containing the following at a minimum: Title, Authors, Institution Name, Class number, Date
  • APA format
  • See grading rubric for details

Work Computer Science

  

1.Explain the relationship among data mining, text mining,

and sentiment analysis.

2. In your own words, define text mining, and discuss its

most popular applications.

3. What does it mean to induce structure into text-based

data? Discuss the alternative ways of inducing structure

into them.

4. What is the role of NLP in text mining? Discuss the capabilities

and limitations of NLP in the context of text mining.

5) Go to teradatauniversitynetwork.com and find the case

study named “eBay Analytics.” Read the case carefully and

extend your understanding of it by searching the Internet

for additional information, and answer the case questions.

Instruction —– 

Follow APA 

NO PLAGIARISM Please 

Need 2 Pages ( Excluding Cover page & Reference Page)

digital forensics

a criminal case that involved Digital Forensics. 
describing the case and the how digital forensics were used  in the investigation

Check The folder saying 4306 Lab 1 that where you will find the questions. Rest are help

  

Check The folder saying Lab 1 that where you will find the questions. Rest are help

Write a program that inputs (use JOptionPane.showInputDialog method) four numbers and graphs them as a pie chart. Use class Arc2D.Double and method fill of class Graphics2D to perform the drawing. Draw each piece of the pie in a separate color.

  

Given program (Lab_1_2_start_Up) is an application that allows the user to select a shape from a JComboBox and draws it 20 times with random locations and dimensions in method paintComponent. The first item in the JComboBox should be the default shape that is displayed the first time paintComponent is called. (Screenshot 1 & 2)

Executive Program Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(ENTERPRISE RISK MANAGEMENT) have been applied, or could be applied, in a practical manner to your current work(SOFTWARE DEVELOPER) environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Discussion question, 350 words and 3 references.

Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018). 

Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

Report

Link to the Video :

https://bridgeport.zoom.us/rec/share/D9stgH9BtTaSaChCdg-4rx6I8dT-7s-4igk2wy-5GuSWopP5i5cIOuu4iTK_u31q.ovkEb-vhrw_oF7Wi
Password: UW6?gL.A

Discussion Reply!!! About 75 words

 

Part 1: Security Threats

  • Provide an example of at least one security  threat.  This can be an actual threat to an organization.  It can be an  example of a “what-if” scenario.  Discuss at least one way that this  threat could have been minimized or prevented. 

One major security threat that the world is dealing with on a  daily basis is phishing. Phishing is where scammers send emails that  appear to be legitimate but the link actually takes you to a malicious  website. Using the fake website, the scammers trick you into giving  sensitive information (TestOut LabSim, n.d.). Based  on the Federal Bureau of Investigation internet crime report for 2021,  page 22, Phishing claimed the most victims, reporting 323,972 victims,  than any other crime type (Internet Crime  Complaint Center(IC3) | Annual Reports, n.d.). Protecting yourself from  phishing comes down to educating yourself and analyzing your emails.  Make sure that the emails are legitimate by reading carefully and  verifying the web address. “Hold your mouse over the link and it will  show you the website it’s linked to” (TestOut LabSim, n.d.). Before  putting in any sensitive information make sure the website is  legitimate. If you have any doubts contact the company to verify.  

Part 2: Mobile devices

  • Compare desktops to laptops, tablets, and  smartphones using best practices related to security. Discuss the best  practices that you use or plan to implement on your mobile device(s).

Computers and cell phones have come a long way in just a few  short years. You can now perform the same task on your smartphones as  you can on your computer. It’s no longer just calling people but the  ability to send and receive emails, surf the web, use apps and work from  anywhere has only grown. With the increase of abilities comes the  increase of vulnerabilities. It has been embedded into us to keep  antivirus software or firewalls on our computers. Though most don’t  think the same way with our mobile devices. A lot of people never update  their phones or apps until they are forced to. They don’t think about  them the same way they do with computers (Platsis, 2019).  What makes that worse is that people keep more sensitive information on  their phones for convenience. From storing credit card information to  saving all of their passwords right there on your phone, the personal  information vulnerable to attackers are huge. With mobile devices being  just that, mobile, we are taking these devices filled with this  information everywhere with us. Exposing and increasing possibilities of  attacks, especially when we have settings set to connect to any  available WIFI connections. Add to the fact, unlike most computers, our  smartphones are almost always on, sending and receiving data constantly  (Platsis, 2019). Our desire to increase convenience and speed have  decreased our thoughts on security and privacy. Even “many companies  have not implemented basic best practices for mobile security” (Platsis,  2019). This leaves a gap for attackers to use, bypassing their other  security measures (Platsis, 2019). Some security methods that mobile  devices offer that most desktops do not are multifactor authentication  measures, having face or fingerprint recognition as well as a password.  With these measures and being proactive, we can decrease the  vulnerabilities mobile devices present. Examples of being proactive  include using strong passwords (including upper and lower case letters,  numbers and words not found in the dictionary), rotating those  passwords, distrusting the web and viewing every email with suspicion  (TestOut LabSim, n.d.).

Resources

Internet Crime Complaint Center(IC3) | Annual Reports. (n.d.). Www.ic3.Gov. https://www.ic3.gov/Home/AnnualReports (Links to an external site.)

Platsis, G. (2019, April 19). Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? Security Intelligence; Security Intelligence. https://securityintelligence.com/mobile-security-versus-desktop-and-laptop-security-is-there-even-a-difference-anymore/ (Links to an external site.)

TestOut LabSim. (n.d.). Labsimapp.testout.com. Retrieved July 10, 2022, from    https://labsimapp.testout.com/v6_0_503/index.html/productviewer/242/13.13.1/c0c5d48b-b9d9-4933-a9c9-9003f41e62f7 (Links to an external site.)

HW

 

 

 

Your company specializes in pool cleaning and maintenance services, and you have identified a large health club that has several locations as a prospect and conducted research on the business. You think you have identified some opportunities to help the customer save money. One service option provides biweekly maintenance visits, and the customer pays monthly. Another involves monthly service visits and biannual training sessions at your customer’s business so that their staff can learn to perform routine maintenance tasks on their own.

You are preparing to approach the health club’s manager to set up a sales call. How would you approach the manager? What other type of information would you want to know before you make your approach? What role would each of the six Cs have in your approach?

Exercise Instructions:  You are required to submit a 2-Page (Title Page and Content Page), APA formatted paper with substantial content. Substantial content requires staying on topic and fully addresses the assignment in a clear, concise, and meaningful manner. The deliverable length of your posting responses must be at least 2-pages, (Title Page and Content Page) APA format.

Exercises must be the students original thoughts based on the topics from the “Open Educational Resource” (OER) Course Textbook and/or other referenced sources.  Direct quotes from references must be less than 20 words.  Please review for sentence structure, grammar and punctuation errors.  Plagiarized submissions may result in a “0” for the submission.  

Late submissions will be deducted 5 points.

All assignment(s) derive from the OER Textbook.  For academic purposes, at least 1 APA formatted reference is required pertaining to the topic(s).