DATA COMMUNICATIONS AND NETWORKING Paper and PowerPoint

 

•Topics of project : Anything that has to do with data communications and networking.

–Understand of recent development of networking topics (survey paper), 4+ pages required (including references). You can use tables to summarize existing work.

–Implementation some network related applications (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))

–Modeling and simulation of networks (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))

Uploaded a template of the paper

Also need a PowerPoint presentation on the same topic  

Research Paper

Topic: Computer Networking and Machine Learning
Note:
You will write a paper of at least 8-10 pages in length. The Title page, Abstract, Table of Contents, and Reference pages should not be counted in the number of pages required. in APA format

Rules:

Chapter 1- Introduction (3 – 4 pages)  

Introduction 

Problem Statement and Purpose of Research 

Relevance and Significance  

Research Questions  

Barriers and Issues  

Chapter 2 – Review of the Literature (6-8 pages) 

Description of the research 

Research Method 

Findings

Conclusion

Chapter 3 – Research Methodology (3 – 4 pages) 

Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages) 

The following topics are intended to serve as a guide:  

  • • Data analysis  
  • • Findings & discussion 
  • • Analysis 
  • • Summary of results & discussion  

Chapter 5: Conclusions (2 – 4 pages) 

Please use below research guide to follow instructions and understand the expectation in detail

Case Study Assignment

 

Details: 

Using the Case Study document (Anti-Forensics: Techniques, Detection and Counter Measures) describing a scenario which you have been called to investigate. The case study provides an opportunity to walk through the cyber forensic investigation process. Through this exercise, prepare the investigative plan, determine tools to use to conduct the forensics analysis, and conduct a basic computer forensics investigation. See the Case Study section in the Course Content Menu for details on what is needed for this final case study.

In a Word document, address all of the assignment requirements on the last page. Remember, the audience is Brad Richards, COO. Give proper attention to wording, grammar, spelling, punctuation, etc. Make sure to cover the case in sufficient detail and answer any potential questions that may be asked. Lastly, remember to put your name on your paper as the chief investigator.

Assignment

 

  1. Select a subfield of Artificial intelligence that interests you. Find an example of current work (no more than 5 years old) on this topic and research on it. Franklin’s library is a great resource where you can find many books, papers and conference proceedings in AI.
  2. For what you pick, write a summary report with your answers to the following questions as best as you can:
    1. What is the problem being solved?
    2. What approach does it take to solve it?
    3. Is there anything unique or different or special about this approach that makes it different from other similar approaches? (There almost always is.)
    4. How well does it work?
    5. Do they talk about what they want to do next, in terms of new functionality, or new approaches?
  3. The paper should be 1-2 pages, and should talk about these issues in your own words. Anyone can quote Wikipedia or a section of someone’s web page.  What I want to see is you distilling the information and explaining what’s going on. You must cite your sources appropriately.

Research paper abstract summary – The roles of the Network Administrators to detect malicious activity

Research paper abstract summary – The roles of the Network Administrators to detect malicious activity

Subject: Business Network Systems Management

Topic:  The roles of the Network Administrators to detect malicious activity

This topic must be very specific and CAN NOT BE too broad otherwise it will be returned back.

Add brief 1 paragraph an abstract summary (600-800 words) of what you would like to say about that topic (i.e., ) and add 2-3 reference on 2nd page.

Subject book used: The Practice of System and Network Administration, Volume 1 3rd edition.

Important*****:

OLD Topic: The Roles of System Administrator on Cyber Security

Professor Note: Topic is too broad. Please narrow down the topic and resubmit (-50). 

Topic is on an appropriate subject. A general discussion of what roles SAs can do on Cyber Security is much, much, much too broad to cover in 7-10 pages.

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Note : Just Imports the Table, Form, Reports and Queries from this Data in your Access File  Or If You can not do this Send me message 

 You are helping a small non-profit group organize their national farm and agriculture conference. You will create a form to organize input, a report to display the finalized schedule, and mailing labels.

  Access Chapter 4  Farm Conference  

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_Cap_Farm.accdb. Grader has automatically added your last name to the   beginning of the filename. Save the file to the location where you are   storing your files.

Create   a form using the Form tool based on the Presenters table. Change the title in   the Form Header to Enter/Edit Presenters.

Reduce   the field value control widths to approximately half their original size (to   approximately 3.6″). Delete   the subform.

Sort   the records by LastName in   ascending order. Save the form as Edit Presenters.   Close the form.

Open   the Location Information form in Layout view. Apply the Stacked Layout   control to the form. Save and close the form.

Create   a new report based on the Exhibits   with Presenters query using the Report Wizard. Select all available   fields, choose to view the data by Presenters, ensure that FirstName,   LastName is the only grouping level, use Date as the primary sort field in   ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule.

Apply   the Integral theme to this report only. Save the report.

Modify   the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last   field (appearing to the right of LocationID). In Design view, ensure that the   left edge of the field is at the 8.5-inch mark on the ruler, and then return   to Layout view.

Change   the title of the Presenter Schedule report to Schedule by   Presenter.

Change   the sort so the StartingTime is a   secondary sort field (that is, so that the first sort is Date, and the second   sort is StartingTime). Save and close the report.

Create   a new labels report based on the Presenters table. Use the Avery USA 8660   label template. Accept the default font options, and set the labels up so the   first and last name appear on the top line, the Address on the second line,   and the City, State, and ZipCode appear on the final line. Your first label   should look like:
 

Shannon Beck
368 Graham Avenue
Graham, KY 42344
 

  Do not add any sorting. Name the report Presenter Mailing   Labels.   Close the labels.

Cyber Security Research paper DUE MONDAY 9PM CST

  • Please follow the Research report guide to finish the paper without those guidelines it will be useless
  • Research Paper Topics
    1)      How phishing is evolving and getting more sophisticated
    2)     Evolution of Ransomware
    3)     The effects of the Cryptocurrency movement affect cybersecurity
    4)     How effective is the two-factor authentication?
    5)      How can companies respond to hacking in their system?
    6)     Cyber-physical attacks: how do they work?
    7)      How can public Wi-Fi or the internet be used to steal personal data?
    8)     What are the differences if a “white hat hacker vs. a “black hat” hacker?
    9)     What forensic tools work the best to detect cyber-attacks?
    10)  When a password is changed regularly, can it help predict the detection of cyber-attacks?
    11)   What are some proven strategies that are effective in preventing cyber-attacks?
    12)  Is computer forensics important in the current digital age of our society?
    13)  How efficient are RFID security systems?
    14)  What are the pros and cons of using blue tooth while traveling?
    Reference: Thesis Rush (2021). 50 Best Cybersecurity Topics For All Levels. Retrieved July 24, 2021, from https://thesisrush.com/blog/cyber-security

business enterprise

 Your consulting company has been hired to design and implement a network for a small to mid-sized vertically integrated sales and manufacturing company with about 75 employees and 40 PC’s.  They have provided you with the following requirements:

• Central Domain Structure including the design of the OUs for management of workstations and users should be developed based on the Company organizational chart provided.
• Group Policies configured to support the following
• Encrypted files on clients with appropriate recovery setup
• Setup File Shares with appropriate permissions based on the AD structure you configured.  
o Departments should each have a shared location accessible only to that department’s users to store files.
• Configure a central update server with appropriate groups and enableconfigure client side targeting
• Configure Roaming Profiles for the users along with folder redirection for key folders to help with login times, ensure the security settings are correct on these folders so as to prevent other users from being able to access a profile that is not theirs.
o Redirected folders should include Documents, Desktop, and Favorites
• Setup DNS in your environment as needed.
• Develop a plan for future DHCP Configuration, it is not necessary to implement this.
• Setup and configure a print server to share printers with appropriate permissions
o The CEO doesn’t like to wait behind others when he prints and expects you to provide a solution
o There needs to be a way to control who can print to the color printer.
• You should also include a recommended backup and recovery plan but you do not have to implement this.
• They would like a secure solution for Remote Access to allow employees to access applications from either a personal device or when traveling with a work device. 

 

For your final deliverables of this project you will submit complete documentation of your proof of concept environment and the plans detailed in the requirements document.  This documentation should be complete technical documentation with enough detail to allow the reader to reproduce your solution and understand why you made the configuration selections you did.   There are some articles and tips linked in the Course Resources section on how to write successful documentation.

For your presentation you will provide a business targeted video presentation of how you addressed their requirements.   This presentation should include some sort of visual aidshandouts and should not be overly technical in nature.   Your presentation should be between 5 to 10 minutes long and you need to make sure to include any background information or assumptions that you needed even if the items do not directly correlate to a requirement.