Encryption Algorithms

 1 page discussion 

  • As the cybersecurity specialist in HU Investment Firm, you are responsible for the security of the system. Identify one encryption algorithm that you believe will meet the requirement of improving the security posture with encryption algorithms.
  • Explain exactly how you would incorporate this into the security structure of this company.
  • Identify and explain the associated costs for the identified encryption algorithm. Take into consideration the procurement costs, i.e. software / licensing, implementation, configuring, and updating. 

Order # 13436

Title: Wireless Network Design

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Preparation

Before you begin this assessment, please complete the practice labs as they will be helpful to you.

Then use the Internet and the Capella library to research the assessment topic. You will need at least three recent, relevant, and professional resources to support your work.

Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Assessment 1 Resources for more information.

Instructions

For this assessment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs). The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network.

Start with the network diagram you created in the Assessment 2. You may want to make some changes depending on the feedback you received from your instructor. Using this diagram, complete the following:

•Add a wireless infrastructure to your network diagram. ◦Include your IP addresses. Calculate and add your IP ranges and subnets into your diagram.

•Explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions.

•Explain your IP addressing strategy.

•Describe at least three wireless standards that influenced your network structure.

The assessment you submit should be approximately 3–4 pages in length, including the diagram you create. Be sure your document is professionally written, free of errors, and that your citations and references follow APA guidelines.

Additional Requirements

•Include a title page and references page.

•At least three recent, relevant, and professional resources.

•Times New Roman, 12-point font, double spaced.

Discussion-1 MF

 Part 1: Financial Acumen

Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time. Using Campbellsville University library link or other libraries and the Internet:

1. Review at least three (3) articles on financial acuity. Summarize the articles in 400 – 600 words. Use APA formatting throughout including in-text citations and references.

2. Discuss the benefits of establishing solid financial acumen in a company? Discuss your personal experiences in a situation where financial acumen was either not supported as an organizational hallmark or, conversely, was built into the company’s culture.

Part 2: Sarbanes-Oxley (SOX)

Write a 200-word commentary on Sarbanes Oxley and the importance this act has for American businesses today. Your commentary should include the following:

 A. Rationale for SOX
B. Provisions of SOX
C. Enforcement of SOX 

SyncSession Assignment

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
  • What factors are transforming the professional services industry?
  • What relationships must an IT worker manage, and what key ethical issues can arise in each?
  • Be prepared to present this assignment at SyncSession 1.
    Sync Sessions are held four times per term. For the exact dates and times please check the course schedule under the Course Overview area.  To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.
    Due: Assignment is due Wednesday of the second week in the module.

Reflection paper 3

 

Reflection Paper:

For each assigned presentation,  you must write a “Reflection Paper”.  This paper is to be a write-up of your learning, observations and reactions to the presentation and must demonstrate both your reflections about and your understanding of the topic(s) presented by our guest speakers.  Your write-up must meet the following criteria:

  • Content Demonstrates understanding of the topic(s) covered by speaker(s) and includes reflections upon these content areas:
    • Three new things that you learned from the speaker.
    • Two reasons why (each) functional role of IT presented is important to the business.
    • One question that you have regarding the area of IT that the speaker covered.
  • Adherence to Excellent Writing StandardsAttendance Criteria Met
    • Between 300 – 400 words
    • 12 Point Times New Roman Font, 1.5 spacing, standard 1″ margins
    • No spelling or grammar errors
    • Well written – concise and coherent
  • Well Formatted, easy to read and grade (meaning – easy to find your required content)
    • Visual cues that aid reading, such as: paragraphs, bullets, section headings, etc.
    • A readable reflection that presents organized thoughts and ideas

Information Governance Week – 4 -1

 According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. 

 At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library

— 500 Words 

IT Discussion

Essay on what non-executives need to know regarding technology.  Especially in regard to innovation technology.  Please note some key foundational factors that non-executives need to know and understand regarding technology.  Also, note how non-IT departments interact with IT and how the change in the market will change how business is performed. 

 Your response should be 250-300 words.