Softwear Anti-virus Security Architecture

Length: Minimum of 1500 words 

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

1. Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? (900 Words – two references)

2. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? (600 Words – two references)

Network Design

 

You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Houston, Texas, and adding a test location in China.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include logical topology diagrams (layer 3) and physical network diagrams of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as either a:

  • 2- to 3-page Microsoft® Word document
  • 10-slide Microsoft® PowerPoint® presentation with detailed speaker notes

Write a short paper, 400-500 words on herasay rule

 
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. 

 

Use References. Include quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

It should be Plagiarism free.

Access control Assignment 14

Discuss the importance of the testing phase of the Software Development Life Cycle.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Discussion

1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2. What are the privacy issues with data mining? Do you think they are substantiated?

I Need Both Should be in 2 Separate documents.

Question 1: 

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s the aftermath. Comment on ways the attack could have been prevented.  Explain between 200 and 300 words.

 

Question 2 :

Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or another list format.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.