Security Architecture and Design solution as a diagram or diagrams with annotations

Length: Minimum of 900 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Corporate IT Security Audit Compliance

Que 1: 

In your own words, describe how HIPPA (compliance requirements) can impact the “Remote Access” domain of its infrastructure. How can such requirements be met? 

Que 2: 

 

Review the attached diagram.

What measures can be taken to protect web-server that provides an interface to system/applications?

Networking

1.How many valid host addresses are on the network 172.16.41.0/27? (2 points)

a. 65,534

b.30

c.14

d.254

and so on

please open attached file to see rest of the question

mid

 

You have been asked by management (manufacturing, healthcare, retail,  financial, and etc. ) to create a demo using a data analytic or BI  tool. It is your responsibility to download and produce outputs using  one of the tools. You will need to focus your results on the data set  you select.  

Ensure to address at least one topic covered in Chapters 1-5 with  the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations

R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Into to data mining

 submit your topic and references, in APA format of preliminary  references that you will use when completing your final semester  research paper. 

 

Provide the title of your term paper (note: you may change the  wording in the official title in the final version however, you cannot  change the topic once you select one)

Include an introduction on the topic

A minimum of 3-5 references in proper APA format

EH Week9 DB

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Cybercriminals use many different types of malware to attack systems. Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it.   https://www.esecurityplanet.com/malware/malware-types.html#maliciousmobileapp

300 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Configuring a DSLAM and DCHP

 

In this graded practice you will add and configure a DSLAM (Digital  Subscriber Line Access Multiplexer) and configure a small network using  this DSLAM.  You will connect a router to the DSLAM and configure DCHP  via a router.  

A DSLAM (Digital Subscriber Line Access Multiplexer) is a network  device that receives signals from multiple customer Digital Subscriber  Line (DSL) connections and puts them onto a single Ethernet connection.

distributed systems

  

a) Briefly differentiate between lazy and (immediate) eager update propagation. How can they be compared to delayed-write and write-through policy in implementation? Which situations would they be good? 

main practical connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Intro to Data Mining (ITS-632-M26) )  have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study( Intro to Data Mining (ITS-632-M26)  ). Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories of this course have been  applied, or could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you  have or could observe these theories and knowledge could be applied to  an employment opportunity in your field of study.