Assignment

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

peer-2 week-5

For Milestone 2 (due in week 5), you will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the final project. The entire milestone should be a minimum of 6 pages with 10 peer reviewed scholarly articles.

For your reference, the portfolio project guidelines are attached here. 

Please see the UC library for help in formatting your bibliography.

Here are some examples: 

Here are some resources to complete a literature review:

Cost Model

  

Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in 6 months for under $200,000.

Use the Cost Estimate template and Cost Baseline template to assist with this assignment.

Tasks

  • Prepare and upload a 1-page cost model for this project      using spreadsheet software. Use the following work breakdown structure      (WBS), and document your assumptions in preparing the cost model. Assume a      labor rate of $100 per hour for the project manager and $60 per hour for      other project team members. Assume that none of the work is outsourced,      labor costs for users are not included, and there are no additional      hardware costs. The total estimate should be $200,000.
  1. Project management
  2. Requirements definition
  3. Website design

        a. Registration for recreational programs

        b. Registration for classes and programs

        c. Tracking system

        d. Incentive system

  1. Website development

        a. Registration for recreational programs

        b. Registration for classes and programs

        c. Tracking system

        d. Incentive system

  1. Testing
  2. Training, rollout, and support
  • Using the cost model you created in the first task,      prepare a cost baseline by allocating the costs by WBS for each month of      the project.
  • Assume that you have completed 3 months of the project.      The BAC was $200,000 for this 6-month project. You can also make the      following assumptions:
  • PV=$120,000
  • EV=$100,000
  • AC=$90,000

a. What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?

b. Use the CPI to calculate the estimate at completion      (EAC) for this project. Is the project performing better or worse than      planned?

c. Use the SPI to estimate how long it will take to finish      this project.

After completing your charts, write a 150-word follow-up in which you complete the following:

  • Explain how the project is doing based on the CPI and      SPI. Is it ahead of schedule or behind? Is it under budget or over?
  • Describe the strategies or steps that should be taken      for human resource management to avoid additional costs.
  • Describe the strategies or steps that should be taken      for resource activity management to avoid additional costs.
  • Recommend 2 tools to support these strategies and      explain why these tools would be beneficial.

APA format! 

Discussion

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

disaster recovery plan in cybersecurity

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business. 

Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).

Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.

offer advice and suggestions on thing we should do or should not do in disaster recovery plan 

3 pages 

Access Control

Discuss the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

bi12 work

1. Explain why it is useful to describe group work in terms of the time/place framework.

2. Describe the kinds of support that groupware can provide to decision makers.

3. Explain why most groupware is deployed today over the Web.

4. Explain in what ways physical meetings can be inefficient.Explain how technology can make meetings more effective.

5. Compare Simon’s four-phase decision-making model to the steps in using GDSS.

be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)  2 pages

Fun Run 3 – Multiplayer Games

Run 3, is the third game in the Run trilogy. 

Run 3 takes place in a series of tunnels in space. 

To play the amazing run 3 game, the players have to run and jump to pass different levels of obstacles. 

Run 3 introduces a number of new mechanics not seen in the previous games, including crumbling tiles, ramps, darkness, and the ability to re-enter a tunnel after jumping out.

People remember this game as a game everyone plays at school. 

Good luck and have fun guys! 

How To Play:

Use the left and right arrow keys to move.

Use Space to jump.

Review: Run 3 online. 

When running into another lane, that lane will turn into the floor.

You can pause/resume/restart, switch aliens and turn the music, sound on/off in the pause menu.

CLOUD COMPUTING (IN)SECURITY

1. Do some Internet research to identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn from the negative experiences of these businesses?

 2. Do some Internet research on security mechanisms associated with virtualization. How can virtualization be used by cloud service providers to protect subscriber data? 

 3. Choose one of the following cloud services categories: SaaS, IaaS, PaaS. Do some Internet research that focuses the security issues associated with the selected cloud service category. Summarize the major security risks associated with the cloud service category and identify mechanisms that can be used to address these risks. 

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout.