Compose a letter to your CEO describing the different types of network firewalls

 

You have a new CEO. They are non-technical and came to your organization from a completely different market segment. Your organization narrowly escaped being breached due to the diligence of your Blue Team, but they said it was touch and go – the breach almost went through – and improvements need to be made in the area of network firewalls, specifically. Those improvements require funding. Given the current pandemic situation money is more scarce than usual and you need to put forth a convincing case for the network firewalls.

Compose a letter to your CEO describing the different types of network firewalls and where each should be used/deployed within a hypothetical/fictional corporate network (feel free to be inventive and creative – please). Your goal is to get the funding for network firewalls. Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures.

***Give your CEO a name. CEOs can be any gender***

create a tikz graphs based on attached pictures

create a tikz based on attached pictures.

 Make sure all the content is in one tikzpicture environment.  Do
         not create more than one tikzpicture environment.
         b. Do not use section heading (section{…}) for any text.

1.a: The black words and red words in the green box should be aligned:
         one red symbol under each word, you can use a tabular environment for
         this.  Same for the last box with black and blue text.
        .

1.b:  The three boxes in the bottom row should still be aligned in one row.

2: The “axis labels” (search/discover/structured data/etc) should be
         where they are in the original picture.  And the labels should be in
         one node (Search (goal-oriented) in one node, Discover (opportunistic)
         in another node, etc)

MIS Assignments

 

View the following videos on Customer Relationship Management

(1)  Introduction to Customer Relationship Management (CRM)

https://www.youtube.com/watch?v=3JqgiLRhYHw   (4:21)

(2)  Why CRM? 

https://www.youtube.com/watch?v=hmc4kF4o6Ek  (2:53)

Please answer the following questions.  The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive.    

1–  Explain what these videos are about. 

2– What is Customer Relationship Management software?

3—What are some of the ways that businesses can utilize CRM software? Provide 3 examples and label them as follows:  3a, 3b, 3c.

4—Provide 3 examples that state how you, personally, have interacted with companies using CRM software. Label these examples as:  4a, 4b, 4c. 

General essay

The Year Up Washington DC site offers four career tracks: 1. Sales/Customer Service 2. IT/Helpdesk 3. Business/Project Management 4. Software Development Please answer the following questions for your essay: 1) What is your first choice for your specialty track? Why? What previous experience (if any) do you have that would make you successful in this track? Discuss any previous school or work experience, certifications you have, or self-learning you’ve done. (Write 1-2 paragraphs) 2) What positions are you interested in within this field? Why? 3) What research have you done on your own to learn more about this career field? 4.) If you don’t get your first choice for your specialty track, how would your second choice fit into your career goals. Essay must be no more than 2 pages, double spaced.

My first choice will be IT/Helpdesk, second choice is software Development.  I am currently 19 years of age I have always enjoyed the IT field because technology is intriguing.

DForsnisc-we-6

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

350 words

ETCM-RESEARCH-DISCUSS-7

DISCUSSION:

Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail

RESEARCH:

Need this research paper by Friday USA time. (5 days from now).

7 pages without references and  cover page. Follow APA 7 format and citations.

TOPIC:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately seven pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cloud_computing_week5

 Discussion TopicDefine and describe a SAN vs. NAS. Name one applicable purpose of each and why

 Paper:

Write a paper on cloud-based data storage. The following are the items to discuss in the paper:

  • Describe how cloud-based data storage works.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines

Outline assignment

Using the Documenting Research Guide and the Assignment 2 Instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards of APA 7 for all documentation, including citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template, but it is not required. The Documenting Research Guide is in the Useful Documents folder, in the content area; the Assignment 2 Instructions.

Submit your outline on or before the due date.

By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc. 
File

new tech bus leaders

 

 

Discussion Question: 

You’ve read several articles on Information System Success and Satisfaction. How do you believe an organization should measure information system success and satisfaction in the enterprise?