Implementing Security Layers

 

Module 01 Content

  1. This first part of your project focuses on a model of implementing security using layers, segmentation and other basic security techniques to re-design the network accordingly.

    In this assignment, you are to design a network to incorporate and secure both the Chicago and Denver networks. This is a top-level network design updating the current designs provided. There is a separate design for the current Bering (Chicago) and Unicorp (Denver) sites and you will need to integrate and secure both sites. You will use the following two drawings:

    Module01NetworkDiagramChicago.zipModule01NetworkDiagramDenver.zipFor each network, you will need to add firewalls, routers and connectivity to the internet for site-to-site communications. Assume you have the funds and abilities to add any security measures that you may feel is needed. 

    For your project, you will submit a design proposal in which you:

    1. Use Microsoft Visio to design a network diagram, particularly with defense in depth in mind which depicts how you will connect and secure the Chicago and Denver networks.
    2. Indicate the following on your drawings:
    3. The location of databases. Denver has several databases (customer, product, employee, payroll and manufacturing). Indicate which of these you would consolidate in Chicago and which database or databases would remain in multiple locations (you can assume databases in multiple locations would be synchronized). Explain your decision.
    4. All network devices used (routers, switches, hubs, firewalls, VPNs, and / or others)
    5. The interconnections between network devices.
    6. The end user (client) devices (desktops, laptops, mobile devices)
    7. The internet cloud, generically, to represent your network’s interface to the Internet
    8. Briefly describe how your network design provides multiple layers of security in a word document.
    9. Notes on submission:

    • Insert the Visio diagrams into the body of your design proposal so that THEY are active and editable. You should not be using screenshots.
    • Focus on routers, switches, firewalls, hubs, and interfaces between devices. Do not add wireless connectivity.
    • Your analysis should use professional tone and vocabulary, APA format, and proper spelling and grammar.

Visual Studio Project

 

In this module, you learned about multiple forms in C#. You will be completing one program for this module.

Create an application named as M11 Assignment_YourLastname which has multiple form order program for customers of Fresh Produce Store.

You pick the controls that would work best and what your forms look like, but your program should meet the following objectives:

NOTE: All controls and variables should be correctly named using the naming standards indicated in the text.

  • Have a graphic that you think represents Frech Produce Store.
  • Allow customers the option of choosing tomatoes ($1.91 per pound), peppers ($2.32 per pound), onions ($1.05per pound) and potatoes($1.50 per pound). 
  • The customer enters a weight for each one selected in pounds in a box. Use either a numeric Up-down or Textbox. If using a Textbox, you will need to validate the value entered to make sure its numeric.
  • Exit Button – On main Form 
  • Order Now Button – On main form
  • Close Button – On second form
  • After the customer clicks an Order Now button, display the price of the order on the second form.

discussion-2

Many believe that complete security is infeasible. Therefore, we are left with incomplete security. Generally, the greater the security, the greater the cost. Discuss how one should weigh the benefits and associated costs of security

Policy, Legal, Ethics, & Cmplc week 2

 

Week 2 Quiz

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

 

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 
 

Exp19_Excel_Ch05_ML2_Fiesta_Collection

#Exp19_Excel_Ch05_ML2_Fiesta_Collection

#Excel Chapter 5 Mid-Level 2 – Fiesta Collection 

#Exp19 Excel Ch05 ML2 Fiesta Collection

  

Project Description:

Your Aunt Laura has been collecting Fiesta dinnerware, a popular brand from the Homer Laughlin China Company, since 1986. You help her maintain an inventory. So far, you and Aunt Laura have created a table of color numbers, color names, year introduced, and year retired, if applicable. In a second table, you entered color numbers, item numbers, items, current value, and source. Previously, you helped her research current replacement costs; however, you believe the retired colors may be worth more now. Laura is especially interested in the values of retired colors so that she can provide this information for her insurance agent. You will build a PivotTable and add slicers to help her with the analysis.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch05_ML2_Fiesta.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

The workbook contains two   related tables. You must create a relationship between these tables so that   you can create a PivotTable using data from both tables.
 

  Create a relationship between the Items table using the Color Number field   and the Colors table using the Color Number field.

 

Now that the relationship is   built, you are ready to create a PivotTable.
 

  Create a blank PivotTable from within the Items table on the Collection   worksheet to analyze multiple tables. Add the data to the data model. Place   the PivotTable on a new worksheet and name the worksheet Retired   Colors. Name   the PivotTable Retired.

 

 

Display the names of both tables   in the PivotTable Fields task pane. Display the Color field as rows and the   sum of the Replacement Value field as values.

 

Retired colors are often worth   more than currently available colors. Therefore, you want to filter the data   to show only retired colors.
 

  Add a filter to display aggregates for retired colors only using the Retired   field. Note that current colors do not have a retirement date, so you must   filter out the blanks.

 

Apply the Light Green, Pivot   Style Medium 7. Note, depending on the version of Office used, the style name   may be Pivot Style Medium 7.

 

In the Retired Colors sheet,   format the values with Accounting Number Format with two decimal places.

 

In cell B3, create a custom   heading named Replacement Values. Change Row   Labels in cell A3 to Retired Colors.

 

You want to add a second value   field to display values as percentages of the grand total.
 

  Add a second Replacement Value field below the current field in the Values   area. Select the option to display the values as percentages of the grand   total. Type the custom name Percent of Total.

 

 

Add a slicer for the Color   field. Select these colors to display: Apricot, Chartreuse, Lilac, Marigold,   Pearl Gray, and Sapphire.

 

You want to customize the   slicer.
 

  Apply the Light Green, Slicer Style Light 6 style. Note, depending on the   version of Office used, the style name may be Slicer Style Light 6. Display   three columns within the slicer window. Change the button width to 1.5 inches. Move the slicer so that   the top-left corner starts in cell E2.

 

A PivotChart will create a   visual illustration of the data in the PivotTable.
 

  Create a clustered column PivotChart and place it on a new chart sheet named Retired
PivotChart.

 

 

Now that the PivotChart is   created, you are ready to format it.
 

  Add the chart title Replacement Value of Retired Items above the chart. Change the   Lilac data point fill color to Purple. Change the value axis font size to 11   and apply Black, Text 1 font color.

 

 

Change the category axis font   size to 11 and apply Black, Text 1 font color. Hide the field buttons on the   PivotChart.

 

 

On all sheets, create a footer   with your name on the left side, the sheet name code in the center, and the   file name code on the right side.

 

Ensure the worksheets are in the   following order: Color List, Retired PivotChart, Retired Colors, Collection. 

 

Save and close Exp19_Excel_Ch05_ML2_Fiesta.xlsx. Exit   Excel. Submit the file as directed.

Exp19_Access_Ch09_CapAssessment – National Farm and Agriculture Conference 1.0

Exp19_Access_Ch09_CapAssessment – National Farm and Agriculture Conference 1.0

  

Project Description:

Your company handles room registration, speaker coordination, and other functions for national conferences that are held at your campus throughout the year. The sales department mails schedules to speakers and building coordinators. The speaker database was modified by unauthorized personnel, and some of the changes need to be reversed. For example, all of the relationships were deleted; they need to be recreated. You have been asked to analyze the database, fix the relationships, and make the database more secure to avoid this situation in the future. The database tables may already be normalized; however, you need to examine the tables to verify this.

     

Open   the downloaded Access file named Exp19_Access_Ch09_CapAssessment_National_Farm_and_Agriculture_Conference.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

Open   the Relationships window. Add the Presenters, ExhibitPresenter, Exhibits,   and Locations tables to the   layout.

 

Create   a relationship between the Exhibits   and ExhibitPresenter tables,   ensuring you check the Enforce   Referential Integrity and Cascade   Update Related Fields options.

 

Create   a relationship between the Exhibits   and Locations tables, ensuring you   check the Enforce Referential   Integrity and Cascade Update   Related Fields options.

 

Create   a relationship between the Presenters   and ExhibitPresenter tables,   ensuring you check the Enforce   Referential Integrity and Cascade   Update Related Fields options. Save, and close the Relationships window.

 

Open   the Performance Analyzer dialog   box and select all tables. You   should be given two ideas. You decide not to implement the changes; close the   Performance Analyzer. Open the Database Documenter tool. Check the Exhibits table, and set the options   so Properties, Relationships, and Permissions by User and Group are   set. Include Names, Data Types, and Sizes for fields, and Nothing   for Indexes. Close the Object   Definition report without saving.

 

Create   a new form using the Form tool   based on the Presenters table.   Save the form as Add or Edit Presenters and   close the form.

 

Create   a navigation form based on the Vertical   Tabs, Left template.

 

Add   the Add or Edit Presenters form to   the first position.

 

Add   the Current Presenter Schedule   report to the second position.

 

Add   the Locations report to the third   position.

 

Add   the Presenters report to the   fourth position. Save the Navigation form with the default name.

 

Set   the database to open the navigation form when the database opens.

week 2 A IT345: Impact of IT on Individuals

 

Welcome to Week 2

As we progress to week two we begin to explore data privacy. Data flows freely throughout the internet, corporate, and commercial networks. Privacy has become paramount to businesses big and small. Understanding privacy concerns and where they come from is important you as a student, individual, employee, etc.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to three of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

  

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

  

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?

https://igu.instructure.com/courses/1993/files/358041/download?wrap=1

Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

 Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

  

Project Description:

You are helping to organize a benefit auction to raise money for families who lost their homes in a natural disaster. The information for the auction is currently stored in an Excel spreadsheet, but you have volunteered to import it to Access. You will create a database that will store the data from Excel in an Access database. You will create a form to manage the data-entry process. You also create two reports: one that lists the items collected in each category and one for labels so you can send the donors a thank-you letter after the auction.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_ML2_Auction.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Items table in Design view.   Change the ID Field Name to ItemID.   Add a second field named Description.   Accept Short Text as the data type   for the Description field and change the field size to 50.

 

Enter   the remaining field names in the table (in this order): DateOfDonation, Category,   Price, DonorName,   DonorAddress1, and then DonorAddress2.   Change the data type of the DateOfDonation field to Date/Time and the Price field to Currency. Accept Short Text   as the data type for the remaining fields.

 

Open   Excel, and then open the file Items.xlsx.   Examine the length of the Category, DonorAddress1, and DonorAddress2 columns.   Return to Access. Change the field size for the Category to 15,   DonorAddress1 to 25, and DonorAddress2 to 30.   Save the table, and switch to Datasheet view.

 

Copy   and paste the 26 rows from the Excel spreadsheet into the Items table.   AutoFit all of the column widths so all data is visible. Save and close the   table.

 

Verify   that the Items table is selected in the Navigation Pane. Create a new form   using the Form tool.

 

Select   all of the fields and labels in the Detail section of the form. Change the   layout of the form to a Tabular Layout. With all of the fields selected,   switch to Design view and use the Property Sheet to set their widths to 1.3″. Change the width of the ItemID,   Category, and Price columns to 0.75″.

 

Add   conditional formatting so that each Price that is greater than 90   has a font color of Green (in the   first row, under Standard Colors). (Hint:   Search Conditional Formatting in the Tell me box). Save the form as Auction Items   Form.

 

Switch   to Form view and create a new record. Enter iPad   as the Description; 12/31/2018   as the DateOfDonation; House   as the Category; $400   as the Price; Staples   as the DonorName; 500 Market St   as the DonorAddress1; and Brick, NJ 08723   as the DonorAddress2.

 

Add   a sort to the form, so the lowest priced items display first. Save and close   the form.

 

Select   the Items table in the Navigation Pane and create a report using the Report   Wizard. Include all fields except the two donor address fields, group by   Category, include the Sum of Price as a Summary Option, accept the default   layout, and then save the report Auction Items by   Category.

 

Switch   to Layout view. Resize the DateOfDonation   control so that the left edge of the control aligns with the left edge of   the column label. Select   the Price and Sum of Price controls and increase the width to 0.75″. Select any value in the DonorName column and drag the left   edge of the controls to the right to decrease the width of the column.   Preview the report to verify the column widths are correct.

 

Switch   to Layout view, and then sort the report so the least expensive item is displayed   first in each group. Save and close the report.

 

Select   the Items table in the Navigation   Pane. Create mailing labels based on the Avery 5660 template. (Hint: Search Labels in the Tell me box and then click the Labels tool in the results.) Place DonorName on the first line, DonorAddress1   on the second line, and DonorAddress2   on the third line. Sort the labels by DonorName.   Name the report Donor Labels.   After you create the labels, display them in Print Preview mode to verify   that all values will fit onto the label template. Close the label report.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Discussion – Information Governance

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose concern to organizations storing data in the cloud –  briefly support your discussion.

Please make your initial post substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Textbook: Chapter 15 – Information Governance for Cloud Computing

A Comparative Study of Data Deduplication Strategies. (2018). 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), Secure Cyber Computing and Communication (ICSCCC), 2018 First International Conference On, 68. Retrieved from https://ieeexplore.ieee.org/document/8703363?arnumber=8703363

 Patricia C. Franks. (2015). New Technologies, New Challenges: Records Retention and Disposition in a Cloud Environment, 39(2), 191–209.

Schmidt, P. J., Wood, J. T., & Grabski, S. V. (2016). Business in the Cloud: Research Questions on Governance, Audit, and Assurance. Journal of Information Systems, 30(3), 173–189. https://doi.org/10.2308/isys-51494