5s week 8 assignment BS

in 350 words,

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score.

Include references, do not copy-paste.

Cloud architect

  

Customer requests are:

Proposed Cloud Architecture (5 pages needed from step 1 to step 5)

Final Report Evaluating AWS and Azure Providers (5 pages (step1 to5) + 2 pages from step 6 to 7 = the final report would be 7 pages), also you will find the template for the final report is on the last pages

Below are the instructions 

Since you have become familiar with the foundations of cloud computing technologies, along with their risks and the legal and compliance issues, you will now explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.

In this project, you will first learn about networking in the cloud and auxiliary cloud services provided by cloud vendors. Next, you will explore cloud computing trends, best practices, and issues involved in migrating IT deployments to the cloud, as well as typical architectures of cloud deployments. Then, you will apply your findings to propose a general architecture for BallotOnline’s cloud deployment to best address the company’s business requirements.

Once you have selected a deployment architecture, you will research two leading cloud vendors: Amazon Web Services (AWS) and Microsoft Azure. Exploring and comparing the tools available for application migration will enable you to recommend a vendor to the executives in your final report. The final deliverable is a written report to BallotOnline management, describing the results of your research and recommending the cloud deployment architecture and the vendor for its deployment, with justification.

Your final report should demonstrate that you understand the IT needs of the organization as you evaluate and select cloud providers. The report should include your insights on the appropriate direction to take to handle the company’s IT business needs. You will also be assessed on the ability to integrate relevant risk, policy, and compliance consideration into the recommendations, as well as the clarity of your writing and a demonstration of logical, step-by-step decision making to formulate and justify your ideas.

Check the Project 3 FAQ thread in the discussion area for any last-minute updates or clarifications about the project.

Step 1: Research Networking and Auxiliary Services in the Cloud

The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of cloud providers, BallotOnline is considering using Amazon Web Services (AWS) and Microsoft Azure, two of the top providers in the market. BallotOnline’s executives want you to help determine which would be the best provider for the organization.

You will start with learning about internet networking basics and cloud networking. You will also research many cloud services that cloud providers make available to their customers to help them take full advantage of cloud service and deployment models.

Step 2: Research Cloud Trends, Best Practices, and Migration Issues

The cloud computing revolution is redefining ways that companies of all sizes use information technology. The cloud landscape shifts rapidly, and current trends reflect this rapid pace of change. You likely got an idea about this in the last step when you conducted research on cloud architecture. Now, continue gathering information for your final report by assessing:

  • issues outside the company, such as emerging issues in      the industry, regulatory changes, and general trends in cloud computing to gain an understanding of how these issues may      influence BallotOnline’s decisions;
  • best practices for cloud implementation and assess whether BallotOnline can benefit from      these;
  • cloud migration strategies for the application and data, since BallotOnline is      moving an existing web application to the cloud, making sure that the      application is configured properly for the system architecture of your      cloud deployment; and
  • IT change management techniques      that could help BallotOnline make this transition.

In the Discussion: Cloud Trends and Migration Issues forum, post your findings and discuss them with your colleagues.

In the next step, you will propose an architecture to use for the company’s cloud deployment.

Step 3: Research Typical Architectures of Cloud Deployments

In the previous step, you considered best practices and trends in the cloud industry. Next, you will have to look at the kinds of architectures needed for cloud.

Because most elements of cloud deployments are implemented in a virtualized environment controlled by software, the degree of freedom in defining your deployment of cloud reference models is unprecedented. You can define the number of virtual servers required and the configuration, and even change them dynamically as needed. You can also define your virtual local area networks (LANs) and subnets, and place servers in them to implement network security requirements.

The basic cloud deployment components are cloud consumer, cloud provider, and cloud carrier, with cloud brokers and auditor as possible additions.

Typical cloud architectures of cloud deployments vary from single server (suitable for proof-of-concept engagements) and multiserver architectures with various servers carrying different software components and occupying different security zones, to geographically dispersed deployments to achieve high availability, resilience, and speed of delivery. There are several issues to consider when selecting a server architecture, including cost, scalability, performance, and use of management.

For this step, research the typical architectures of cloud deployments and begin to consider what might be a good fit for BallotOnline. Discuss your findings and thoughts with your colleagues in the Discussion: Cloud Architectures forum.

In the next step, you will continue research, this time on trends in cloud computing as well as issues that can arise during data migration. 

Step 4: Propose Cloud Architecture for BallotOnline Deployment

Now that you have looked into cloud architectures, in this step, you will propose the cloud deployment architecture for BallotOnline, applying the knowledge of typical architectural elements of cloud deployment from the project’s initial step. You will also consider trends and migration issues from a previous step. Your recommendation should consider the company’s business requirements.

Recall that the company has an existing web application that it wants to move to the cloud, and also that the company wants to expand its business to other parts of the world. In earlier projects, you learned about and analyzed the IT business requirements for BallotOnline. Among them were demands for application and data security, data encryption, and separation for deployments overseas. Also, the application should handle load peaks during election times in different regions.

Specific technical requirements state that BallotOnline is a web application, written using the popular open-source LAMP (Linux, Apache, MySQL, PHP) software suite and the PHP application.

Step 5: Research AWS

You’ve described your proposed architecture and included a diagram to provide leadership a way to envision the system. Now, it’s time to look closely at the leading cloud providers to see if their services will fit BallotOnline’s needs.

Each cloud provider provides a unique profile of services, so it is good practice to compare cloud vendors and evaluate their reliability, performance, ease of use, cost, security and compliance measures. As more providers enter the marketplace, many will specialize on specific needs and use cases, making this evaluation even more critical.

In this step, you will explore AWS and assess the feasibility of this platform for deploying the architecture proposed in the previous step. You should also consider issues related to AWS Pricing.

Based on your research, determine to what degree AWS supports the elements of the BallotOnline business and technical requirements.

Share your thoughts with your colleagues in the Discussion: Amazon Web Services Feasibility forum. In the following step, you will do the same for Microsoft Azure.

Step 6: Research Microsoft Azure

Now that you have had a chance to research AWS, it’s time to explore Microsoft Azure, another cloud provider that could be used to deploy the proposed architecture. You should also consider issues related to Microsoft Azure pricing.

Based on your research, determine to what degree Microsoft Azure supports the elements of the BallotOnline business and technical requirements. Share your thoughts with your colleagues in the Discussion: Microsoft Azure Feasibility forum.

Now that you have completed research on the cloud providers, in the next steps you will work on proof of concepts for each provider.

Step 7: Generate AWS Proof of Concept (POC)

With your research complete, you will now deploy a simple one-page PHP application to the AWS cloud. It will allow you to explore deployment methods, ease of use, provisioning speed, etc., for the Amazon cloud.

Action Item

As you may have already discovered in your research on AWS, it makes a cloud migration tool called Elastic Beanstalk available for customers to migrate their existing applications into the AWS cloud. We will use this tool to deploy your AWS proof of concept (POC).Proof of Concept (POC)

Proof of concept (POC), also known as proof of principle, is a prototype or demonstration of a particular idea or method developed for the purpose of verifying that the idea or method is viable for real-world applications.

Follow the steps in the AWS lab instructions to complete your AWS POC.

In the dropbox below, upload the URL linking to your application running in the AWS portal.

Step 8: Generate Azure Proof of Concept (POC)

Now that your AWS POC is complete, you can proceed with a similar POC deployment for the Microsoft Azure cloud. 

Action Item

Follow the steps in the Azure lab instructions to complete your Azure POC.

In the dropbox below, upload the URL linking to your application running in the Azure portal.

You are ready for the last step: writing the final report with recommendations on the cloud providers for the BallotOnline executives.

Submission for Project 3: Azure Proof of Concept

Previous submissions: view

Add files or drag them here.

Step 9: Write the Final Report Evaluating AWS and Azure Providers

Now that you have completed your research, shared your ideas with colleagues, and explored the two vendors, it is time to compile your findings and recommendations for the BallotOnline executives. You may find these considerations for cloud provider selection helpful in making your decisions.

Use the Final Report Evaluating AWS and Azure Providers Template to write your report and submit your work to the dropbox below.

Report Evaluating AWS and Azure Providers 

The report will be five to seven pages in length and should include source citations, as appropriate, in APA style. 

This report should include the following components:

● Title page

○ Include: for whom you are preparing the document, the title, the date prepared, and your name as the preparer of the document.

● Executive summary

○ Include: the purpose of the report and the intended audience.

○ Brief description of conducted research and POC deployments.

● Comparison of architecture deployment feasibility (from Steps 1 – 5)

○ Describe how the architecture proposed in Step 3 can be implemented in AWS and Azure environments, and compare ease of implementation.

○ Evaluate and compare efforts to implement BallotOnline business requirements.

○ Compare availability and ease of use for application scaling, geographical distribution, and network security measures.

○ Compare availability and ease of use of cloud services required by BallotOnline (database as a service, auditing, logging, application security, etc.).

○ Compare support for application migration and monitoring.

● Comparison of ease of deployment (from Steps 6 and 7)

○ Describe AWS and Azure capabilities for deploying web applications using the PHP language and MySQL database.

○ Compare ease of use of user interfaces, portals, and management consoles.

○ Compare POC environment deployment times.

● Comparison of costs

○ Discuss and compare pricing plans available, costs of servers, and services.

● Conclusions and recommendations

○ Present the final recommendation based on your research and POC deployment.

Access control

Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector or the Critical Infrastructure.

Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

comparing and contrasting documentation

 

Given the material covered in Module 3 (Hardware) and Module 4 (Software), your personal experience, and our good friend reliable sources, provide a well-formatted MS Word document (with citations) that provides a framework for comparing two different computing solutions for both hardware and software issues. [Hint: Such a document would most likely include an introduction paragraph, a table comparing individual characteristics, and a conclusion paragraph.]

For example, you might want to compare an iPhone X with an iPhone 7, or an iPhone X with a Galaxy 7, or a PS4 with an XBox, or an Apple Air with a Razer Blade Stealth.

Considerations might include:

  • # of (or importance of) exclusive software products available for that system
  • backwards compatibility for “old” materials from previous systems
  • cost of the system
  • compatibility of the system with supporting services (such as the cell phone network, gaming community, or preferred app store) 
  • availability of support for the system
  • disk space
  • type of external media supported
  • Graphics Card capabilities
  • Processor speed
  • Peripherals support

…Or any other considerations you consider important. A minimum of 2 hardware and 2 software factors must be included.

emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

3 Assignments

Question 1:

Topic: Select a major organization that was located in the Hurricane Katrina disaster area.  Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.

Assignment should follow all APA rules and include a min. of (1) citation/reference.
2 Pages(excluding intro and references).

Question 2:

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages(excluding references and intro)

Self-Assessment Checklist

§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

I followed the submission guidelines 

Question 3:  

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages (Excluding intro and References)

Self-Assessment Checklist

§ I addressed all issues required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

2 Presentations due in 14 hours

 office 365 presentation

Instructions

Create a PowerPoint presentation that is 5 to 10 slides (with speaker notes) based on the following scenario.

Scenario: You work for an organization with about 300 employees. You are in charge of tool selection and procurement for office software. You research options and come to a decision that you will recommend Office365 rather than standard copies of Office 2013 for your organization. You must convince the organization’s leaders that this is the best option.

Include slides that discuss the advantages and disadvantage of Office365 vs the standard Office 2013 for the following topics:

  • Cost
  • Differences in functionality & usability
  • Features and updates
  • Benefits of Cloud Computing
  • Cloud storage options with Microsoft® OneDrive®

 

Topic 11 Activity: Microsoft PowerPoint Basics – 

Instructions:

Create a 3- to 5-slide Microsoft PowerPoint presentation according to the instructions below. Save the changes to the file, and upload to Moodle.

Scenario:

You have been hired as the new intern in the technology department. The organization would like to understand some of the benefits and functionalities of Microsoft® PowerPoint®, as well as how it can be used to increase productivity.

At minimum, address the following core content in your presentation:

  • (6 pts.) Provide an overview of at least 3 general functions and features within Microsoft® PowerPoint®.
  • (6 pts.) Provide a  specific example of how Microsoft® PowerPoint® can be used to enhance productivity in the organization.

Include speaker notes for all slides. Simply submitting slides is not sufficient. 

Security Architecture & Design

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of Security Architecture & Design have been applied, or could be applied, in a practical manner to your current work environment

500 words 

APA format

Cloud_computing_week16_final

  

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a section header with proper APA formatting:

· Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

· Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

· Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

· Recommendations: What recommendations would you provide to this organization to better accomplish the challenge(s)? This is from your opinion not someone else on the Internet.

· Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least six (6) scholarly sources listed on the reference page (with in-text citations). Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 2000 words in length. The Title, Abstract, Table of Contents (if applicable), and Reference pages do not count towards the page count requirements. All references must be scholarly references (NOT WIKIPEDIA). Use one of the methods provided in residency for researching scholarly journals and websites.

DO NOT USE THE FOLLOWING COMPANIES:

· Equifax

· Any Cell Phone Company

· UBER

· Amazon

· Microsoft

· Adobe

· Capital One

· LinkedIn

· eBay