Discussion 11 – erm

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Job Search Website Final Report

I am creating a Job Search website and I need a professional final report in English. I will provide a lot of resources from where you need to make the report from. it will include: Website code, PowerPoint with information about the project, and specifications on how to create this report.

Please READ it carefully.

Thank you!

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

summary paper, 1000 words

This is the link to the paper: https://arxiv.org/pdf/1602.04938.pdf

After you read the paper you will summarize the paper in 1000 words.

While summarizing the paper you should be answering few questions throughout your summary.

1. What is the problem?

2. Why is it interesting and important?

3. Why is it hard? (E.g., why do naive approaches fail?)

4. Why hasn’t it been solved before? (Or, what’s wrong with previous proposed

solutions? How does this differ?)

5. What are the key components of the approach and results? Also include any

specific limitations.

6. Can you think of counterexamples for examples given?

7. Is the approach clearly described? Can you outline the steps or summarize the

approach?

8. Does the work address the problem stated earlier in the paper? How?

9. Does the approach seem objective? Clearly state how?

10. Wrap up your paper by answering What is the conclusion of the research?

Discussion-virusus and malicious code . Due today

  • Explain the key differences between viruses and other malicious codes. Identify at least three different types of viruses and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
  • Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.

IT PROJECT (NO WRITTING NEEDED) TECHNICAL Cisco Packet Tracer PKT file only

 ***I require only the Packet Tracer file for the working redesign listed below in the requirements***

IT INFRASTRUCTURE PROJECT PHASE I INSTRUCTIONS 

All labs must be submitted using the version of Packet Tracer in the online course/learning management system. Please do NOT use other versions of Packet Tracer to assure licensing compliance and proper assessment/credit. In addition, please do NOT add users or passwords to any device, leave all credentials blank for assessment purposes. 

Project Background 

Please reference Figure 1. Friendly Care Hospital is one of the biggest hospitals in DC. You have recently bought the hospital, naming it [Your Firstname Lastname] Hospital. For example, Jane Doe Hospital. Jane Doe Hospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated local area network (LAN). The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services. 

Their original design, depicted in Figure 1, was categorized as a small network, providing services for up to 200-500 devices. They have well surpassed this. You, as their senior network administrator, are tasked with the job of a complete re-design. This design must support a medium to large sized network for over 1,000 devices. Thus, it should surpass the current capabilities. 

Figure 1. Current Friendly Care Hospital Network Design 

 

Project Overview  

In this project, you will study performance improvements in a congested, wired LAN/WAN environment that can be solved to varying degrees by a new IT infrastructure design and fully functional implementation in Packet Tracer.  To learn more about Packet Tracer please read the Cisco Packet Tracer DS PDF. Later, in Phase II of the project, you will scale this design to a larger enterprise IT infrastructure. 

To begin the projects, you will complete a review of related literature to identify what is appropriate to improve system feasibility, RAS (reliability, availability, serviceability), security, and disaster recovery of the existing IT infrastructure and model of your hospital. Once this review of literature is complete, you will use the outcomes and research results to advance and improve the IT infrastructure. Proper data analysis, comparison, and contrast will be summarized within in-text tables and figures as well as appendixes to explain the results of the IT infrastructure re-design and improvement. 

Packet Tracer is limited given it is a simulator. Be creative! For instance, if Packet Tracer does not have a file sharing service for a file sharing server, turn on any other related and relevant services that are available. As another example, use LAN and WAN protocols that are optimal given what the version of Packet Tracer allows. You will be assessed based upon optimal configurations in the version of Packet Tracer used. Thus, assure this is well studied. Research will outline new opportunities for future IT infrastructure designs, and this should be discussed accordingly in the written paper even if not configured in Packet Tracer. Often, new technologies are not implemented in industry immediately due to limitations such as hardware architecture. 

Please verify all requirements are met by reviewing the grading rubric. Below is an outline of minimum requirements with examples and ideas. 

Minimum Project Requirements 

• Submit a working Packet Tracer lab, typically this file has a .pkt file extension. 

o This will include the fully operational new IT infrastructure design o All devices in the lab must be named with your first name and last name 

▪ Example: Jane_Doe_Router_1 o All hardware and software should be configured properly and should be able to communicate using optimized networking designs, configurations, and protocols 

o No devices should have passwords for assessment purposes 

• Minimum IT Infrastructure Design and Packet Tracer Requirements o You must start with a blank/new Packet Tracer file, existing labs or modified labs of existing solutions will receive a zero without exception 

o Design a medium-size hospital IT infrastructure for well over 1,000 devices, and scalable beyond the Figure 1 example 

▪ For example, a design that goes beyond traditional N-Tier designs 

▪ Design proper addressing via IPv4 and/or IPv6 that scales 

▪ Add appropriate routers and switches to support this new design 

▪ Configure at least one appropriate networking protocol, operational across the entire infrastructure 

▪ Use proper network address translation (NAT) 

▪ Implement private and public IP address spaces correctly 

▪ Assure network traffic is organized, efficient, and secured properly (e.g. limit broadcast domains, do not allow marketing employees to access accounting systems, etc) 

o Add an Internet Service Provider (ISP) into the design o Add enough modularity, resiliency, and flexibility into the design o Design and implement the following new services and servers 

▪ A Dynamic Host Configuration Protocol (DHCP) server that automatically assigns working IP addresses to new workstations 

▪ A name server that manages the Domain Name System (DNS) for all servers in the hospital 

▪ A web server hosted on the Internet 

▪ Two new user workstations located at each level of the building that can use the new services properly 

• Show these services working on each workstation in your project (e.g. a website from the web server, DHCP, etc) 

Provide a few hospital departments as examples beyond radiology 

OR_Assignment_3

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

   A minimum of five peer-reviewed journal articles.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

Chat application demo (using Angular and spring)

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.

Class Diagram and Use Case Diagram

 

Address the first question posed and then create the two diagrams as instructed below.

You can create your diagrams in Visio®, Word, or PowerPoint® (using drawing tools in Word or PowerPoint) or draw them out by hand and share photos.

Assignment Requirements

  1. Describe the difference between a use case and a class diagram. What is the purpose of each? What role do they play in object-oriented-programming design specifically?
  2. Create a class diagram that describes an automobile dealership. Your class diagram should include at least 6 classes and show the relationships between the classes.

Refer to this site for additional examples of class diagrams:
http://www.agilemodeling.com/artifacts/classDiagram.htm

  1. Create a use case that depicts the actors (people and systems) and processes involved in a university system that registers students for classes. Be sure that your use case includes all actors (systems and people) Involved in a university class registration process and show the interactions between actors. At a minimum, you should show the student, the registrar, the online registration system, and accounts receivable.

Refer to this site for additional examples of use case diagrams:
https://www.uml-diagrams.org/use-case-diagrams-examples.html