SECURITY POLICY & STANDARTS

The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.

Answer the following question(s):

1. What is an advantage of organizing IT security policies by domain?

2. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

The influence of music.

Can anyone write me a five page paper on how music can influence people in life. I need this paper done by Wednesday Morning. MLA Format. No PLAGIARISM PLEASE!!!!!!!!!!!

Security Architecture and Design – Project paper

  

In the following scenario, you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate its entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

  

Length: Minimum of 600 words

Computer and Information Networking

  Please answer these questions : (No plagiarism )

1. Explain the layers of the OSI, TCP/IP, and the Internet models in detail, and elaborate on their similarities and differences.

2. Explain the concept of Capsulation/De-capsulation.

3. Explain TCP and UDP, their differences, and their applications. Which one is better and why?

4. Explain in detail the hub, active hub, switch, and routers, and their purposes, similarities, or differences.

5. List and explain guided and unguided mediums and give a couple of examples of each.

6. Explain the difference between wire and fiber optic and list the advantages and disadvantages of each one in detail. 

7. Assume that you have a wired network. Explain how you would covert this system to a fiber optic system.

8. A RF amplifier has a power gain of 30 dB. How many times does this amplifier amplify the incoming signal? Show your calculations step-by-step.

9. Explain how analog signals are converted into digital.

10. Explain how wireless networks work. 

Project

 

I require a code for the classification of mushrooms for this dataset https://www.kaggle.com/uciml/mushroom-classification  I want the code to perform classification if the mushroom is edible or not using SVM, Decision tree, Random Forest, and Naive Bayes with their f-precision, recall, accuracy. I also want cross validation on the mentioned methods.

I also need a project report that is 4 pages, which details in the first page – 1 The problem description and task

In the second page – The attributes, the preprocessing being done on them and features.

In the third page – The models being used which and how we used it 

Fourth Page – I need the experiment results and the cross validation with the models

Question

Server System

in 250 words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.

 in 250 word summary to include (a) security measures applies to protect information systems and security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place, and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed. 

Discussion 13- Exe Project

Assigned Readings:Chapter 13. Project Evaluation and Control Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. It has been said that Earned Value Management (EVM) came about because the Federal Government often used “Cost-plus” contractors with project organizations.  Cost-plus contracting allows the contractor to recover full project development costs plus accumulate profit from these contracts.  Why would requiring contractor firms to employ earned value management help the government hold the line against project cost overruns?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text 

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Data Mining Project Part 2

 Continue on your data mining adventure by doing some classifications 

1. Conintue with your original dataset. Make any changes that were suggested and link or add to the original document. All infor should be accessible from previous portions of the project. 

2. Utilizing technology classify on one of your categorical variables

       (a) Use a simple decision tree to classify your data to a categorical variable. Create a visualization of the decision tree. Make sure to produce a confusion matrix.

       (b) Repeat your decision tree but use a cross validation technique to test the accuracy. Examine variable importance and be certain to comment on the most important variables.                                               

        (c) Examine the importance of each feature using a chi-square statistic or gain ratio. Create a visualization. Does this follow what your decision trees showed? 

3. Write your report!

          (a) Include all items requested above. Include graphs and text about each.

          (b) Discuss the cross validation process chosen. Discuss whether each model is overfit and how you might tell.

           (c) Discussion confusion matrix and what it might mean for making certain predictions in your project.

          The report will be graded by the following criteria: 

ˆ Statistical analysis – 30 points. The statistical tests are all provided.

 ˆ Graphical Representations – 30 points. The requested graphical displays are made and included in report.

 ˆ Continuation – 15 points. The report is a continuation of the previous report. This may include links or just additional to Part 1. In any case the introduction to your data should be available and any necessary fixes made.

 ˆ Interpretations – 15 points. The results of the statistical analysis are clearly explained and interpreted in the context of the problem. The conclusions accurately reflect the analysis and are well supported. 

ˆ Writing quality – 10 points. The paper is readable and clearly written. There are few, if any, grammatical or spelling errors and they do not interfere with the clarity of the paper. Numbering on this document is not used in the report in anyway