Dear Students,
After you review all course materials attached below please answer the following question.
Assignment:
Discuss different types of cost estimates and methods for preparing them.
Dear Students,
After you review all course materials attached below please answer the following question.
Assignment:
Discuss different types of cost estimates and methods for preparing them.
150 words+
What do you think Aritfical Intelligence do for: education, medicine, manufacturing or transportation. Pick one to address.
There are various resources where you can find information on recent cyber threats, for example:
Have a look at these resources, (or any other resources that you identified). Write an article discussing 5 threats that you found interesting.
The article should include the following information:
Each threats should be described at about two A4 pages. So in total, the body of this document should be about 10 pages, excluding citations.
Required Source Information and Tools
The following tools and resources are needed to complete this project:
Learning Objectives and Outcomes
Overall Project Scenario
Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.
Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.
You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.
Deliverables
The project is divided into several parts. Details for each deliverable can be found in this document.
Project Part 1: Network Design
Scenario – The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
For this part of the project, perform the following tasks:
Project Part 2: Firewall Selection and PlacementScenario
The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.
For this part of the project, perform the following tasks:
Project Part 3: Remote Access and VPNs
As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.
The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.
For this part of the project, perform the following tasks:
Project Part 4: Final Network Design Report
You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.
Tasks
For this part of the project, perform the following tasks:
Additional Instructions
Please let me know if you can actually take this project seriously and do it
Question: Scholarly abstract of Qualitative Analysis(5 pages with below requirements in the same order)
Requirements
Each paper should contain the below in the following order:
1. Bibliographic Citation – use the correctly formatted APA(APA7) style citation for the work as the title of your abstract, displaying the full citation in bold font.
2. Author Qualifications – name and qualification of each author conducting the research
3. Research Concern – one paragraph summary of the reason for the overall research topic
4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
5.Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
6. Research Methodology – description of the population, sample, and data gathering techniques used in the research
7. Instrumentation – description of the tools used to gather data(surveys, tests, interviews, etc.)
8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)
As cloud computing increases in popularity, enhanced features are continually being added. Compare Microsoft Azure with Amazon Web Services (AWS). Create a table that lists at least five features. What are the advantages of each? What are the disadvantages? Which would you recommend? Why?
Now that you have compared the cloud features, use the Internet to research different options for encrypting and securing email. Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why? Write a one-paragraph explanation along with your table.Write a one-paragraph explanation along with your table.
Remember to include the at least a one page paper on the cloud features, and the paragraph and table regarding the different options for encrypting and securing email.
If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.
Select one of these compromises and explain how it could be avoided in no less than “500 words in APA format with Two references & Citations”
Create a wireframe for the Walmart visualization-heavy page. These wireframes should have a clear layout along with a brief description explaining the page being represented.