blockchain implementation,data security in the military, education, or another context,example of Cyber Terrorism

1-Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context.

2-Using the Web or other resources, research an example of Cyber Terrorism. describing the terrorism attack and its aftermath. Comment on ways the attack could have been prevented  300 words

Mobile -7

 

PROTOTYPE INTERFACE DESIGN FOR MOBILE APPLICATION 

Use one  of the online drawing tools  ( see the list below)  to develop an prototype interface  for the following case.

You will be proving prototype interface design for GoldStar Bank’s Mobile App for its employees. The bank is helping companies to do online transaction for the customers who holds their credit card (GoldStar Bank Credit Card). Please consider the following parameters: 

• The Bank’s has one big database where it keeps all customer data transactions. 
• The Bank’s physical data center is in NYC, NY.
• Data center has the power to process 5000,000 customers a day 
• Customers can use GoldStar Bank Credit Card on Internet /online shopping
• The Bank’s database can be accessed remotely by the customers and  its employees

Design the prototype for the interface of the Mobile app for company employees.   You should be drawing three diagrams

DIAGRAM DESIGN 1  ( Main screen of the  Mobile app  BANK’S  MAIN WEB PAGE for employees  )

MESSAGE FOR EMPLOYEE

EMPLOYEE RELATIONS

ACCESS TO CUSTOMER ACCOUNTS

DIAGRAM DESIGN 2 (The user interface screen EMPLOYEE RELATIONS section. This will appear on the screen when the user selects EMPLOYEES section in the main page)

HUMAN RESOURCE DEPARTMENT 

MARKETING DEPARTMENT

SALES DEPARTMENT

BACK TO THE MAIN PAGE

DIAGRAM DESIGN 3  (The user interface screen ACCESS TO CUSTOMER ACCOUNTS .  This will appear on the screen when the user selects ACCESS TO CUSTOMER ACCOUNTS section in the main page)

LOGIN PAGE FOR CUSTOMER ACCOUNTS DATABASE (this is to see a customer’s account)

  • Enter Employee Login Name
  • Enter Employee Password

BACK TO THE MAIN PAGE

You may use  one of the  free online apps for diagramming your network

https://www.draw.io/ (Links to an external site.) (Links to an external site.)

( draw.io is for building diagramming software. It is an open source stack and end user application used more widely than any other browser based diagramming software)

https://www.techrepublic.com/blog/five-apps/five-free-apps-for-diagramming-your-network/

https://www.fosshub.com/Diagram-Designer.html

https://www.neweggbusiness.com/smartbuyer/over-easy/5-free-tools-to-draw-a-network-diagram/

http://logicnet.dk/DiagramDesigner/

Biometric Techniques

 Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Big Data and Business Intelligence

Question 1:  

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from  Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic

Question 2 :     Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Network Security Paper

Network Security Paper: The CSO of your organization was originally the organization’s CFO and does not grasp the concepts of Defense in Depth and Layered Security as related to network security strategies. She wants you to create and deliver a report defining and describing Defense in Depth and Layered Security strategies along with an overview about how the strategies should be implemented. In addition, your report must compare the strategies by explaining any similarities and identifying, at least, two advantages and disadvantages of implementing each security strategy. 

Required Section Headings:

  • Introduction
  • Defense in Depth
  • Layered Security
  • Advantages and Disadvantages
  • Summary/Conclusion

Remember to support your statements with facts from primary and/or secondary sources (i.e., attribution/citations and references). In addition, material from the course textbook or the textbook’s author(s) cannot comprise more than 25% of the sourced and/or quoted material. 

Papers must be written using a formal, expository writing style with no more than 25% of the paper being composed of bulleted items. 

The paper must follow the formatting guidelines in The Publication Manual of the American Psychological Association (2020), (7th ed.), and contain, at least, three scholarly/peer-reviewed references, three to five pages of written content, and a reference page. Note: Figure and/or tables are not considered written content. In addition, the paper will be submitted through the Turnitin originality-checking tool. More APA assistance can be found at the Purdue University Online Writing Lab (Links to an external site.). In addition, the WilmU Student Success Center’s website (Links to an external site.) contains more resources related to APA Formatting, Grammar, and Research Writing.

Assignment Resource(s):

Assignment 1: Network Infrastructure Design Diagram

Instructions

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

  • Each of the facilities has three floors:
    • The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devices
    • The third floor of each building requires 75 network connections for the servers
    • All sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites)
  • Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)
  • A constant connection between the three locations, carrying at least 75 Mbps of data
  • All servers at all locations must have redundancy
  • Protection from intrusions is required and should be documented
  • A plan to verify security and failover measures is required

Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

  • IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:

Example Network Diagram Callout Box.

CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010

  • Any necessary hardware
  • Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
  • Annotate the following values for each of the Sites:
    • Network ID
    • Useable Range
    • Subnet Mask
    • CIDR Value
    • Broadcast Address
  • All devices require hostnames complying with the following naming conventions:
    • Routing Devices: Rx; where x is the site number incremented by a value of 1 for each routing device
    • Switching Devices: Sx; where x is the site number incremented by a value of 1 for each switching device
    • Servers: SRVx where x is the server number incremented by a value of 1 for each server
  • For each site routing device, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
    • management vlan
    • production vlan
  • High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

IFSM 370 Project – MARYLAND UNIVERSITY

  

IFSM 370 Project 1: Network Design for Office Building Instructions

IFSM 370 Project 2: VPN Testing Instructions

IFSM 370 Project 3: Case Study Instructions

IFSM 370 Project 4: Network Diagram Instructions

IFMS 370 Weeks 5 VPN Log – Microsoft Excel 

IFSM 370 Project 5: Final Assessment Instructions

*If you need just a section of the assignment, please forward the request to my inbox, I will avail the section you need in a different post* 

Mobile Applications – Paper

From a development team of one to two people to an enterprise-level team with multiple divisions, the topic of mobile development will eventually come up. 

  • Compare & Contrast mobile applications vs websites.
  • Research and discuss the importance of developing a mobile strategy.
  • Discuss different system mobile functionalities.
  • Explain the social aspect of mobile interfaces.
  • Discuss two – three mobile application development myths.
  • Argue the need for adaptive vs dedicated mobile websites.

– apa

– 7 pages