Answering questions
Active Directory Recommendations , Course Subject : Application Security
Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:
1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?
2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?
3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?
4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
No plagiarism
Wireless Netwok
First Section
In a 350- to 500-word essay, address the 4 questions.
Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.
On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi.
In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.
Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:
1. A brief description of the problem with the current wireless network
2. The benefits of global/industry standards vs. proprietary standards
3. What types of problems exist with mixed standards
4. A plan to correct the problems with the current wireless network
__________________________________________________________________________________
Second section….
1. PROJECT SCOPE –
Project scope
2. FEASIBILITY STUDY –
Objectives of the Network:
1. Secure Service – What is the main objective of this network?
2. Integration and Updates –What needs to be done to get the current network up-to-date?
3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc.
4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?
5. Scalability – How will the network be able to adapt to change?
Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?
Design Assumptions – State the assumptions for unknown factors that could affect the project.
Equipment Needs and Proposed Budget
Support and Software Deployment 2.0
Please respond to the following:
- Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?
1000 words
Write in 500 words for at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Discussion1
Answer the following the question:
We live in a world of data, perhaps too much data. Organizations continue to store data indefinitely. In fact, about 90% of the data stored on todays databases is deemed worthless within 3 months. Think about your email. How often do you ever go back to an email from six months ago. But you still keep it for what? How should organizations government personal data in a data warehouse? What are some best practices you might suggest to your organization if you were the CIO to ensure that the data in the system was maintained properly?
Instructions
- This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed.
- You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
- Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
- Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
- Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.
C language, CS.
A postfix expression is an expression in which each operator follows its operands. Table 13.4 shows several examples of postfix expressions. The grouping marks under each expression should help you visualize the operands for each operator. The more familiar infix expression corresponding to each postfix expression is also shown. The advantage of the postfix form is that there is no need to group subexpressions in parentheses or to consider operator precedence. The grouping marks in Table 13.4 are only for our convenience and are not required. You may have used pocket calculators that require the entry of expressions in postfix form. Use an adaptation of your stack library from Project 3 to write a program that simulates the operation of a calculator by scanning an integer expression in postfix form and displaying its result. Your program should push each integer operand onto the stack. When an operator is encountered, the top two operands are popped, the operation is performed on its operands, and the result is pushed back onto the stack. The final result should be the only value remaining on the stack when the end of the expression is reached.
QUALITATIVE Journal Submit Article Reviews Here
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)
Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
Discussion
Initial Post
There are countless graphs and charts to choose from when converting raw data into a visual format. For many, it can be difficult to decide whether to rely on a straightforward pie chart or bar graph or to opt for a more spatially complex chart type.
Two common questions we often hear are: “How do you know which graph to use?” and “How do you know which chart to use?” The answer, as always, depends on the nuances of your readership, including their experience level and familiarity with big data analytics.
Based upon your understanding of data visualizations, what are 5 Data Visualization pitfalls? What would you do to fix these pitfalls? How can you avoid making future mistakes in your own visualizations?
Discussion Length (word count): At least 250 words
References: At least two peer-reviewed, scholarly journal references.
Divya-OWASP Tools, Vulnerability Management
For this assignment, download the GSA virtual appliance vulnerability assessment tool by clicking the link. Install the GSA virtual appliance in your VirtualBox environment. Next review the video below about conducting a vulnerability scan using GSA/openvas. Conduct a scan against the Linux Lamp Server virtual machine you created doing week 3. Download the report in a PDF and submit. Provide a summary about how this assignment represents securing the cloud.