Dissertation on IoT

 Develop the introduction to Effective Strategies on the IoT Cybersecurity where you discuss the problem gap identified and how it supported by the literature. 

dis_biwk2

 Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning. 

Network Management

Instructions:

Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).

–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.

–The minimum requirements are as follows:

—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.

—At least one site must have a connection to the Internet.

—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.

—At least one switch at each site that creates a LAN of at least two PCs.

—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.

—One site must have at least one server.

—Appropriate cabling and connectivity between the two sites.

—Labeling to make the drawing professional.

–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).

Part Two:

-The minimum requirements are as follows:

—An executive summary of the implementation plan

—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)

—Other recommended network management or monitoring applications/techniques recommended

—At least 10 recommended scorecards and/or metrics for monitored circuits and devices

—A list of which network devices will be monitored

—Security recommendations

—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring

—Labeling to make the drawing professional

Informatics

O
From the moment you wake, you are in fact a data-generation machine. Each use of your phone, every transaction you make using a debit or credit card, even your entrance to your place of work, creates data. It begs the question: How much data do you generate each day? Many studies have been conducted on this, and the numbers are staggering: Estimates suggest that nearly 1 million bytes of data are generated every second for every person on earth.

Proof reading

Very urgent!

I have done writing this paper which is a scholarly paper, but I want to add more relevant content to the paper from the topics inside it, so the paper can be longer. It’s IEEE style. I want you to add about two more pages ( 4 columns ). 

First, read the paper, then add the relevant content and information.

Penetration Testing

 

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words

ITM capstone – Week 4 Graded Assignment

 From Chapter 12, page 379 WEB-BASED CASE STUDY, THE FUTURE OF LIFE INSTITUTE.  Read the case and answer all questions (20 points).

Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What other concerns should the public bear in mind as the technological revolution advances?

Sources:  Future of Life Institute.  http://futureoflife.org

Ethical Hacking week 1

 

Wk 1 Research Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.Click on the LINK above to submit your WORD document for this week’s assignment. 

 

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

The Use of Enterprise Resource Planning (ERP) in a Manufacturing Company

Overview:

SAP is an enterprise resource planning (ERP) manufacturing software that offers

industry-specific functionalities designed to help midsize companies boost operational

efficiency, strengthen customer relationships and enhance business agility. The use of

ERP encourages an integrated view of business processes to better manage financials,

inventory, human resources, product development, sales, and marketing.

Instructions:

Imagine a manufacturing company that is using a centralized system based on ERP, for

example, SAP. Based on what you know from your own company or from the materials,

write a short paper focusing on the following points:

• The advantages of a centralized system.

• The supply chain management (SCM) and its interaction with the strategic

information system (SIS).

• The company’s customer relationship management (CRM) and how they are

managing their relationship with their vendors.

Requirements:

• This assignment is a paper consisting of 2-3-pages, using APA formatting and

citations.

• Include at least two resources.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

I am currently unable to do more than what I am offering. If you can not do it I understand. Please do not ask for more than what I can currently afford. 

Thank You!