Briefly describe the System analysis and design in Computer science
BSWA Week 10
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
- Who is likely to attack your site?
- When are attacks likely to occur?
- What sort of attacks might take place?
- How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words.
Order # 12530
Title: Network Design
Paper type Essay
Paper format APA
Course level Undegraduate
Subject Area
Other (Not listed)
# pages 1 ( or 300 words Minimum)
Spacing Double Spacing
# sources 4
Paper Details
For this assessment, ABC Consulting has hired you to create a design document about how to build remote access to their organization.
Preparation
Complete the practice labs provided in the Virtual Resource Portal activity for this assessment.
Directions
Create a diagram for ABC Consulting and then explain how to design the LAN at the remote site and discuss how it will interconnect through a WAN to ABC Consulting’s site.
Part 1: Diagram
Use Visio to create a diagram for your project (described above). You may access Visio via the Toolwire resources in this assessment. Include the following in your diagram:
•Display the basic LAN and WAN topology for your remote sites.
•Display router and switch placement.
•Display computers and workstations.
Part 2: Written Explanation
After creating your diagram, write the narrative part of the design document. The narrative should do the following:
•Describe your diagram. Include specifications about the topologies, cabling, routers, and switches.
•Provide an analysis of your diagram. Explain the role that the devices on your network play in network communication.
•Support your diagram. Provide reasoning for choosing the switching and routing, transmission media, and topology.
Additional Requirements
•Written communication: Written communication is free of errors that detract from the overall message.
•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.
•Font and font size: Times New Roman, 12 point.
RIPV2
The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing RIPv2 Protocol
The paper will include the following:
- The paper must have a distinct and well written Introduction, Supporting Body and Conclusion;
- In the body include the following
- The history of the protocol chosen;
- The programmable parameters of the protocol and how they affect traffic flow;
- The major differences between the routing protocol chosen and the others that were not chosen;
- How the chosen protocol can be used in a modern day routed network environment.
- In the body include the following
- · Site at least two advantages and two disadvantages, of your chosen routing protocol subject
· Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow
· Discuss the major differences between the routing protocol chosen and all others that were not chosen
In the Conclusion of your Paper
· Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)
Paper Sections:
Description: Your Paper MUST contain the following sections.
* Title Page
– Title of Paper
– Author
– Class
– Professor
* Introduction
* Body
– Support Introduction
– Elements (see above)
– History
– Advantages/Dis-advantages
– Two Programmable Parameters
– How do they effect traffic flow
– Compared your chosen Protocol to all Routing Protocols we have studied
* Conclusion
– Your Opinion of selected Routing Protocol
– A Summary
– Modern Day Usage
digital project
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
300 words
Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.
Anonymous
Citizen Rights vs Security
Cloud Computing
Computer Forensics
Data Center Security
Disaster Recovery
Edward Snowden – Traitor or Hero
Encryption
Hardware and Software Security
I Love You virus
Keyloggers
Mobile Malware
Mobile Security
Pharming
Phishing
Presidential Election 2016
Quantum Computers – Impact on Encryption
Ransomware, malware, business security
Security and the Cloud
Smart Grid
SOFTWARE CRACKERS
Stuxnet Virus
Undersea Cable
United State Cyber Command
Web War I – Estonia Attack
White Hat Hacking
Wi-Fi Security: Wireless Network Encryption
Creating Exploits
Home Automation Security and Vulnerabilities
Car Hacking
Discussion Question – 700 words, with 2 references APA 7th must
- Discuss what ethical leadership is and how it impacts the organizational culture.
- What are the various dimensions of ethical leadership?
- Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.
Cyber Law – Discussion 3
A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?
Post should be 500 words and add references in APA format.
BlockChain Development- Discussion post – APA format2
Posting to test
Strategic Plans
Describe how a strategic plan for information technology can differ across organizations.
Provide a real-world example.
- In your first paragraph describe how a strategic plan for information technology can differ across organizations. Use examples in your description.
- In your second paragraph, use the example in the posting and discuss how an information technology strategic plan for a global company may differ than for a national (US) company.
- In the third paragraph, provide a real-world example, based upon the examples used in the first post.
HW
Answer for HW11 and HW12