Attached file.
Access Control – Establishment of Federal, state, and local government laws,
What are the issues and root causes that necessitate the enactment and/or establishment of Federal, state, and local government laws, and the establishment of regulations and policies for access control? Cite such laws, regulations, and policies in your particular state.
Access Control Firewall Assessment (Miss Professor only)
Access Control Firewall Assessment
In this assignment, students will perform a security assessment on a firewall.
Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.
Using the scan results, choose five open/closed ports and determine the applicable protocol/application.
For each port, research and explain why it is good (or bad) that the default configuration is standardized.
Research and implement the basics of PFSense post-installation configuration.
- Update to the latest stable version.
- Set HTTPS to port 8443.
- Include the traffic graph on the dashboard.
- Disable port traffic for World of Warcraft.
- Disable port traffic for torrent applications.
- Disable inbound ICMP protocol.
- Choose a social media website and disable all domains for that website.
- Choose a video streaming website and enable all domains for that website.
Using the Kali VM, run another port scan. Note the differences against the original scan.
As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.
Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.
GO16_WD_CH03_GRADER_3G_HW – Newsletter and Research Paper 1.3
Project Description:
In the following project, you will format a newsletter by inserting pictures and screenshots, applying two-column formatting, and adding a border to a paragraph. You will edit and format a research paper by inserting footnotes, creating citations, and formatting a bibliography.
Research Paper
his week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.
Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?
Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
• Be approximately seven to ten pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Assignment
Examine a code of ethics for a professional organization, business, or government agency, and write a critique of it. In your 2-3 pages paper, determine the entity’s priorities and whose interests the code serves.
Discussion
What is the history of the network models? What are four layers of the TCP/IP Model and how are they used? How does the networking protocol work?
Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect.
Employee attributions and their impact on innovations
The attached journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:
1. Provide a high-level overview/ summary of the case study
2. Note how constructive intentionality impacts innovation implementations
3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.
Format Requirements:
1. The paper must be minimum 3 pages excluding title and references pages.
2. Include references of at least 5 peer reviewed papers supporting your case study.
3. The paper must comply APA Format and include a cover page, an introduction, a body with fully developed content, a conclusion and references.
five points on impacts of IT to society
five points on impacts of IT to society
Week 5 Discussion
Week 5 Discussion (300 words)
After completing the reading this week, we reflect on a few key concepts this week:
- Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization.
- Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness. Please note how these leadership styles affect implementing new innovative technologies.
- Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions, and which is best for operational decisions. Please explain.
Please be sure to answer all the questions above in the initial post.
Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Expand on the topic, by adding additional thoughtful information
- Answer a question posted by another student in detail
- Share an applicable personal experience
- Provide an outside source
- Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.
Please be sure to engage by Wednesday at 11:59 pm ET and then engage on two more days throughout the week (for a total of three days of engagement, before Sunday at 11:59 pm, ET.