Computer Networking and Machine Learning
Portfolio
Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided.
Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.
**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.
***Student may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement.
Course reflection discussion
My course is cloud computing and I work as a software engineer.
Write a brief reflection on this course and on how it will aid your professional career and development.
- How will this course impact your professional objectives?
- What were the major work-related lessons that you learned?
- How will this course prepare you for further studies related to your chosen professional career?
CD1
PLEASE SEE ATTACHED.
COMPUTER SECURITY_Week8
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
D9
Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
250-300 words with a minimum of 2-3 references in APA format
Hackers and ethics
My topic is about Hacker and Ethics
discussion
federated architecture in cloud systems. Remember that this is a cloud class not a database class.
Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Research Paper and discussion
Part 1 : Research paper
What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Part 2 : discussion ( 500 words including 2 responses )
- What are some of the potential risks involved with cloud computing?
- Does the research and model in this article propose a viable solution to cloud-based risk management?
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic
Disaster recovery
Select a major organization that was located in the Hurricane Katrina disaster area. Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.[500 words]