In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
Module assignment 1
Computer Networking and Machine Learning
Module 6 Assignment – Cyber law
Cybercrime Assignment:
Please list and describe four types of Cyber crime in 500 words. Please add references in APA format.
2 pages
Project assignment is to have you do more research on the topic of Data Analytics and Visualization. In this project you will need to do some research. Select any software that can help you with data analytics, it can be R programming, it can be Tableau, anything. Research the software and write a paper on its capabilities with examples.
This assignment is worth 100 points.
Here is what needs to be done:
1. Only 2 graphics or figures allowed.
2. Reference all sources used. Use APA style references.
discussion
Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.
Answer the following question(s):
- Would an organization need to apply security controls to allow safe use of those applications? Why or why not?
Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.
requirement:
4 paragraphs
apa format
Software Development Project
Everything is in the document that I uploaded any other information ask me.
Final project
Final Instructions
Your company ABC Consulting Company is asked to provide a proposal for the upcoming company expansion. You will need to research and provide quotes for new computers, cabling, network security and type of network topology. A Network proposal has to be developed for a manufacturing company that plans to move to a larger facility.
They are currently in a 1500 square foot building. Below is the current office setup.
• Reception – 1 computer and printer
• CEO Office – 1 computer and printer
• Accounting Office – 5 computers and 5 printers
• Business Office – 3 computers and 3 printers
• Human Resources – 2 printers and 2 printers
• Sales Office – 10 computers and 10 printers
They are moving to a 3500 square foot building with 3 floors and each floor will have switches and routers to accommodate that floor. Below are the proposed additions:
CEO Secretary – 1 computer and printer (CEO’s office area)
• Chief Financial Officer – 1 computer and printer (Accounting Department)
• Secretary – Chief Financial Officer – 1 computer and printer (Accounting Department)
• Information Technology – 2 computers and 2 printers
• Breakroom – 2 computers
• Human Resources – 6 computers and 2 network printers
• Sales – 6 computers and 2 network printers
• Wireless network for employees and guests
• Each department will have at least 2 empty offices for additional employees.
Your proposal will need to include the following information:
• Determine the number of drops for the new facility (2 drops per office)
• Determine the type of network cables (CAT5e, CAT6, etc.)
• Determine the type of security for the network
• Determine type of hardware and software
Deliverables
• Written proposal to the CEO include a timeline for completion
• Cost analysis to include computers, servers and cabling (make, model quantities and cost)
• Detailed diagram showing location of network devices and type of topology
Network Implementation
- Search the internet for best practices with respect to technology implementation.
- From your research, select the 3 recommendations that you feel are the most likely to ensure a successful implementation and your reasons why.
- Include in your report the ways that you would increase the probability of success with new technology implementations.
- With respect to an organizations environment and culture (including operational, ethical, social, legal, and economic issues impacting the design of information technology systems), what steps would you take to ensure success?
Discussion 9 ERM
The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.
Please make your initial post should have 500 words and the post will do at least TWO of the following:
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
CC W 14 D
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 16-18 (Jamsa, 2013).Chapter 16 topics:
- Define and describe total cost of ownership. List at least 10 items to consider when determining a data center’s total cost of ownership.
- Define and describe a capital expense. How are capital expenses different from operational expenses?
- Define and describe economies of scale and provide a cloud-based example.
- Define and describe “right sizing” as it pertains to cloud computing.
- Define Moore’s law and discus how it might influence cloud migration.
- Given company revenues of $2.5 million and expenses of $2.1 million, calculate the company’s profit and profit margin.
Chapter 17 topics:
- Compare and contrast functional and nonfunctional requirements and provide an example of each.
- Discuss why a designer should avoid selecting an implementation platform for as long as possible during the design process.
- Discuss various trade-offs a designer may need to make with respect to nonfunctional requirements.
- Discuss why the system maintenance phase is often the most expensive phase of the software development life cycle.
Chapter 18 topics:
- Using Yahoo! Pipes, create a pipe that displays the names of pizza restaurants within a given zip code.
- Using Google App Engine, create a page that displays the following Python script:
- print “Content-type: text/htmlnn”
- print “Cloud Computing, Chapter 18“
NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.