cloud computing Final Project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

IaaS cloud migration

Research IaaS then address the following scenario in essay format. Your essay should be 2-3 pages in length (not including cover and reference page) and should include at least two scholarly references and no less than four references total. Your paper must be in APA format.

XYZ corporation is a large hospital considering moving services to the cloud to reduce some data center expenses. The hospital must comply with HIPAA regulations while moving resources to the cloud. You are considering an IaaS solution for the hospital, but leadership is skeptical about the move.

Your job is to provide assurances through research as to why there is no need for concern. In this essay, you need to provide assurances that should address risks, legal compliance, downtime, and other key areas of IaaS migrations.

Discussion about CIA

Write at least 500 words analyzing a subject you find in this article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf 
related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

SDLC Diagram

 For this assignment, you will evaluate the systems development life cycle (SDLC) methodology by creating a diagram for an information system. Carefully review the ISM500 SDLC Diagram Scenario ( Attached) and formulate a solution for the problem presented in the scenario. Your paper must include the following elements.

  • Create a diagram of the systems development life cycle (SDLC) for your solution.
    • Provide a graphical representation of the SDLC you will use to implement your solution.
    • Identify the elements you will need in order to create your solution and include them in each of the appropriate phases of your diagram.
  • Explain how each of the solution elements you’ve identified fit in the lifecycle phases you have depicted in your diagram. Include citations from the text to support your position.

The SDLC Diagram

  • Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two credible sources including the course text.

  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style

BSWA Week 10

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

Order # 12530

Title: Network Design

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area

Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, ABC Consulting has hired you to create a design document about how to build remote access to their organization.

Preparation

Complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Directions

Create a diagram for ABC Consulting and then explain how to design the LAN at the remote site and discuss how it will interconnect through a WAN to ABC Consulting’s site.

Part 1: Diagram

Use Visio to create a diagram for your project (described above). You may access Visio via the Toolwire resources in this assessment. Include the following in your diagram:

•Display the basic LAN and WAN topology for your remote sites.

•Display router and switch placement.

•Display computers and workstations.

Part 2: Written Explanation

After creating your diagram, write the narrative part of the design document. The narrative should do the following:

•Describe your diagram. Include specifications about the topologies, cabling, routers, and switches.

•Provide an analysis of your diagram. Explain the role that the devices on your network play in network communication.

•Support your diagram. Provide reasoning for choosing the switching and routing, transmission media, and topology.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

RIPV2

computer

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

– Title of Paper

– Author

– Class

– Professor

* Introduction

* Body

– Support Introduction 

– Elements (see above)

– History

– Advantages/Dis-advantages

– Two Programmable Parameters

– How do they effect traffic flow

– Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

– Your Opinion of selected Routing Protocol

– A Summary

– Modern Day Usage 

digital project

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

300 words

 

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

  

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking