Computer and Information Networking

1.Discuss what is a Virtual LAN and what are the advantages of a Virtual LAN

Please list your reference/s

2. Review scholarly articles and reputable resources and discuss what are the latest technology/software for intrusion detection and prevention techniques.

Please  list  your references/resources.

Types of Database Exploits

It must consist of: 

1. 5 source annotated bibliography 

2. Slide presentation with 12 or more slides 

3. Summary or Abstract containing at least 750 words.

Database Al

In the Final Project, you are to propose a new database system that you will create to meet the data needs of a business or individual personal needs. Share your initial thoughts on the points below. Ask your peers and instructor for constructive recommendations to help improve your thought direction.

  • Describe the proposed new database system.
  • What business requirements or personal requirements will be satisfied by your proposed database system?
  • Who will be the users of the database system?
  • What specific functionalities will your completed database system provide?
  • What are data items that should be in your database?

Data Visualization

Select any example visualization or infographic and imagine the contextual factors have changed:

  1. If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
  2. If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
  3. What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
  4. What other data considerations should be considered and why?  
  5. Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.

Be sure to show the graphic (before and after updates) and then answer the questions fully above.  This assignment should take into consideration all the course concepts in the book.  Be very thorough in your response.  The paper should be at least three pages in length and contain at least two-peer reviewed sources.

Case study on high profile data breach

Need to be done within 24 hours

Pick a major data breach case that occurred in 2016 or later and was well publicized in the news media and other journals or periodicals. Research the incident and get as many details as possible indicating who perpetrated the crime, what methods were used to get inside the network, what data was stolen, and the extent of the damage in dollars and to the organization. Also, indicate the extent of the damage to the organization’s reputation and any other intangible harms that resulted from the security breach. 

Write a paper that is 3 — 5 pages in length that is presented in a well organized and logical manner. Formatting is important but no particular style manual is required. The last part of the paper should indicate how the security breach could have been prevented had certain practices from the textbook been followed.

Research paper

I just need below for this paper. Please use the attached document for preparation.

Abstract- i page

Introduction 2- pages

Conclusion 1 page

Please follow APA format along with citations and references.