Annotated Bibliography

One of the fundamental techniques to gather research for a paper is the use of an Annotated Bibliography. As a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an analytical research paper.

IMPORTANT: To support your research journey, read the Levy & Ellis (2006) article on maximizing your research opportunities in Information Systems Research. 

There must be five entries with a PROPERLY cited APA citation and a description of the article that is 100-125 words. The attached document has five entries that are already present and add new entries to it other than already existing ones.

An example entry is:
Hyman, J. A. (2015). Developing Instructional Materials and Assessments for Mobile Learning. In International Handbook of E-Learning Volume 1 (pp. 347-358). Routledge 

In Hyman (2015), a review of the required elements needed to create instructional materials for an e-learning and m-learning setting is identified. Hyman then proposes a mobile learning framework that focuses on design, environment, activity, and technology to guide the courseware developer in creating user-friendly yet meaningful instruction that is targeted for delivery in the mobile context.  

Industry

select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.

Please respond to the following in a post of 5000 words:

  • Distinguish between incident detection precursors and incident detection indicators.
  • For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.

Quantitative Data Collection Instrument

 Using the topic and research question you developed in week 1, you will design a quantitative instrument that could potentially answer your topic/research question if it were to be applied to a quantitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies. This assignment functions similar to 3.1 but in a quantitative format. Finally, view the rubric and examples to make sure you understand the expectations of this assignment. 

Virtual Machine

  

The Team CTF tests cyber skills in 10 categories, and each category has one question. You and each of your team members are required to solve one problem for this CTF competition. Divide the problems between team members. Use the table below to determine which of your team members will be attempting each problem.

You only need to do one problem per person and are not required to solve all the problems. Use the table below. No two students should be selecting the same category for their final PowerPoint presentation. Categories will be selected on a first-come, first-serve basis. Post your selection in the discussion. Any disputes over a category selection should be resolved with assistance from your instructor.

Create a network topology

    

Contoso is an Oshawa based startup company with 15 employees that sells custom digital artwork through their online store. The company was growing quickly and set up their infrastructure through Google searches and recommendations from friends. As their company gets bigger, they are looking to seek the advice of an expert to examine their current network infrastructure and suggest improvements. Contoso is expected to grow to 700 employees in the next 16 months. They also plan to open a second branch site in Toronto. The company is remarkably busy with their day-to-day operations and has offered you as much detail as they can about their operations. Every device on the network is part of the same IP subnet, 10.32.0.0/16. 

A company have two servers that host the services required to run the business. 

  1. Server A – Multiple virtual machines on it that host their Domain Controller, DNS, File share, and a licensing server for their design software. The owner of the company mentions that only the windows computers need access to this server.
  2. Server B – Hosts their website that is accessed by their customers and their database service for their catalog of artwork

    

Contoso currently has their servers and networking equipment in a far corner of their shared lunchroom space as it was easier for them to get access to the systems. They also only have one locked door to enter their office and the rest of the spaces are considered “open office” and they assumed that meant no locks, only open doors. All employees at the company simply get 5 minutes of IT orientation where     

a member of the IT team simply logs the user into the network and changes their password. There are no other policies or training offered to staff related to IT. 

They also mentioned that currently nobody can work from home because they need access to the file share, and it does not work when they leave the building. 

The owner of the company lets you know they understand security is important but have been too busy to consider implementing any services, programs, or procedures for their company. The owner of the company advises you to assume an unlimited budget in your proposals. They also will not have time to answer any investigative questions you may have before you present your final pitch, and they ask you to write all assumptions down with your report. 

I need help on creating diagram of network topology for the Company by keeping those server into the consideration and another diagram if the company opens 2nd branch in other area. The diagram includes the devices in the network, connection types between devices, the IP addressing scheme, and additional network devices you are proposing. This diagram can be created Visio, Packet Tracer, http://draw.io/.

also please Provide reasoning for the changes to the network topology. Categorize the changes into the four basic characteristics of a network (reliability, scalability, quality of service, and security) 

    

Provide the IPv4 addressing details for the table below. The initial address space provided to you is 10.xx.0.0/16 where “xx” is your group number. Provide a brief explanation for why you chose these subnet sizes 

Disaster Recovery plan for an organization

Need to develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan. 

2. Introduction 

3. Roles and Responsibilities 

4. Incident Response 

5. Plan Activation 

6. Document History 

7. Procedures 

Research work should meet the following requirements: Be approximately six pages in length, not including the required cover page and reference page. 

2 Q

  

1. Suppose that a dynamic table was used to store a hash table. That way we can ensure that the hash table is never half full or more, and performance should be good. Does the amortized analysis guarantee that the average cost of a put operation on the hash table will be constant time? Does it guarantee that the expected average cost of a put operation will be constant time? Justify your answers.?

  

1. Suppose that we have a perfect hash function. Is using a dynamic table to store the hash table useful? Why or why not?

Data Loss Prevention PPT

There is a tool called  Data loss prevention helps customer to protect the data when it is in transit or rest or use

 we are just marketing that tool and suggesting the customer what are the problems with traditional DLP tool and how we can able to improve Org data protection with modern DLP tools with modern DLP approach what are the problems with old traditions data loss prevention approach and also mentioned about hybrid work force what are the challenges in hybrid work force and how do we overcome and what would be the solution.

I have prepared the PPT but needs some changes and correction there are comments mentioned to each and every slide plese do the required changes to each slide based on the comments provided and let me know if you need any inputs