perimeter defence

 The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community. 

Week 5 Assignment

Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

  • such as common names, real words, numbers only
  • require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

  • user must enter old password before creating new one

3.Make authenticators unforgeable 

  • do not allow email or user ID as password

Using WORD, write a brief paper of 250 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary. 

Note: Intext citations with 2 references needed.

LAB

  

Questions

1) Summarize what you’ve done in this lab as if you are explaining it to your CEO or another important non-technical person.

2) Given that you have learned the names of the SDLC phases, which SDLC phases have you seen/used in this lab? You may write what you did, what you saw in the Azure cloud environment & Azure DevOps menus. 

Computer science

 

  • Week 5: Network Security
    • Propose an appropriate network infrastructure that offers sound security practices for the existing intranet and the new proposed expansion.
    • Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.
    • Describe the access controls and how the company can ensure that devices and topology are effective and working to protect the company infrastructure.
    • Review and describe the need for intrusion detection systems (IDS) and intrusion prevention systems (IPS).
    • Discuss how they can effectively be used in a network operations setting.
    • Ensure that there is an appropriate use of the IDS and IPS in the network diagram. 
  • Section 5 should be 4–5 pages long (2–3 pages of network topology, 1–2 pages of IPS and IDS).
  • Name the document “CS651_FirstnameLastname_Final.doc.”
  • As a final deliverable to the management team, create a Power Point presentation that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Remember that the presentation is for the management team and should contain the appropriate level of detail.

WEB DEVELOP PROJECT

 

Objectives
• Review of the HTML and CSS skills learned until this point.

Basic Requirements
• Properly use and indent all tags.
• Set up page with , and tags.
• The page should contain your name in the

.
• You may work in pairs, but each person must turn in their own work.

Project Description
• Using the skills you have gained thus far, attempt to recreate the page below.
• All required images are included in the project folder.
Final Result (text may vary):

Submitting your project
1. Combine all work files into a zip folder (include all HTML, CSS, font, and image files).
Keep the file structure the same as it was when you were working on the
assignment.
2. Submit the zip folder via desire2learn in the appropriate Assignment folder in order
to receive credit. While you may also submit screenshots, you are required to
submit the actual code files, not just screenshots of the code. Screenshots of code
will receive NO CREDIT.

Grading
• Total possible points: 100
A ▪ All content is present.
▪ No broken images.
▪ The page looks nearly identical to the screenshot.
▪ Fonts are similar, although not necessarily 100% the same fonts.
▪ Proper use of floating, positioning, colors, transparency, etc.
B ▪ All content is present.
▪ 0 -1 broken images.
▪ The page is fairly similar to the screenshot.
▪ Incorrect fonts.
▪ Mostly proper use of floating, positioning, colors, transparency, etc.
C ▪ Missing some content.
▪ Multiple broken images.
▪ Incorrect fonts.
▪ Improper use of floating and positioning. 

  Incorrect colors and transparency.
D ▪ Lacking most of the content.
▪ Multiple broken images.
▪ Little to no styling.
F ▪ Little to no code/content
▪ Screenshot of code

 

 

Problem 14- Legal

Question I – Paul is the sole incorporator of Hemp Co., a company that processes hemp into clothing.  Prior to incorporation, Paul enters into a contract on Hemp Co.’s behalf with a local farmer for the purchase of the crop.  After formation of the corporation, the board does not ratify the contract because Paul bought the crop at 3 times the market price.  Who is liable to the farmer?

Question II – Tina Technology is looking to raise $85,000 worth of capital, and she is looking to raise that money through the internet and still fall under an SEC exemption.  How should Tina go about raising that money?  Due to the amount of capital she is looking to raise, will Tina be subject to any other special requirements?

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

External Environment

 Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework.Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model.For this assignment:

  • Prepare a brief PESTEL Analysis for your selected case from Part 2 of our Thompson (2022) text.  You must address all six elements.
  • Prepare a brief Five Force Analysis as presented in our Thompson (2022) text for your selected case. Address all five forces.

NOTE this Requirement:  The Standard & Poor NetAdvantage Database provided in the NEC Online Library is a required source (and will be extremely helpful). The Standard & Poor Database is located under the general Library database listing. Once you have accessed the Standard & Poor site, the tabs at the top allow you to click on companies or industries. If you choose industries, it then provides a box and drop-down menu showing the various industrial reports which are available. Access the relevant report, and then review the details in the report to support this assignment. The information is incredible relevant and provides a detailed analysis of the entire industry including a listing of the key companies in the industry.  See Course Content tab for a 2020 document noting how to find this database.Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course scholarly/peer reviewed source in your paper.
  • Create Leve1, 2 and Level 3 APA headings for each portion of the analysis.  
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.

References:

Professor feedback:

 

This should not be formatted as a question and answer document.

Submission Details: 

  • Your analysis should be 500 words or less.
  • Incorporate a minimum of at least our course Thompson 2022 Text and one non-course scholarly/peer-reviewed sources in your paper to support your analysis.
  • All written assignments must be formatted ini APA, and  include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

Risk management project part 4

 

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has  decided they want a business impact analysis (BIA) that examines the  company’s data center and a business continuity plan (BCP). Because of  the importance of risk management to the organization, management has  allocated all funds for both efforts. Your team has their full support,  as well as permission to contact any of them directly for participation  or inclusion in the BIA or BCP. Winter storms on the East Coast have  affected the ability of Health Network employees to reach the Arlington  offices in a safe and timely manner. However, no BCP plan currently  exists to address corporate operations. The Arlington office is the  primary location for business units, such as Finance, Legal, and  Customer Support. Some of the corporate systems, such as the payroll and  accounting applications, are located only in the corporate offices.  Each corporate location is able to access the other two, and remote  virtual private network (VPN) exist between each production data center  and the corporate locations. The corporate systems are not currently  being backed up and should be addressed in the new plan. The BCP should  also include some details regarding how the BCP will be tested. For this part of the project: 

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:     
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while  efforts are ongoing to restart pervious operations. You may use or  repurpose a BCP template you find online. Include a description of how  you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 6-7 pages