Computer Science
[Solved] Security Plan
2 Part Assignment Assignment Content The information security strategic plan and security policies are strongly interrelated within an organizations information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization. Part 1 Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this weeks Learning Team assignment. Part 2 Review the control families described in this weeks reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations. Review the controls from this weeks reading, CIS Controls V7.1. Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families. Cite all sources using APA guidelines. Submit your assignment. For more information on Security Plan read this: https://en.wikipedia.org/w/index.php?search=Security+Plan&title=Special%3ASearch&go=Go&ns0=1
[Solved] PCI Compliance
Assignment Content Your father has a private retail pharmacy in a small rural town. He accepts credit cards and holds customer information on a small database server. He wants to know if he should be concerned about PCI compliance, as well as HIPAA, and has asked you for a summary so he can decide if he wants to hire an outside consultant to help him comply with government regulations. Write a 3- to 4-page summary in Microsoft® Word of the important aspect of PCI and HIPAA regulations to help him make his decision. In your summary: Accurately describe what PCI is and why it is important to a small business. Explain why a small business needs to comply with PCI. Provide at least two reasons. Outline the ramifications of noncompliance to a small business. Provide two examples. Concisely describe who is covered under HIPAA. List the information protected under HIPAA. List the administrative requirements under HIPAA. Cite all sources using APA guidelines. Submit your assignment. For more information on PCI Compliance read this: https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
[Solved] Wireless Netwok
First Section In a 350- to 500-word essay, address the 4 questions. Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11. On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community-building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:1. A brief description of the problem with the current wireless network2. The benefits of global/industry standards vs. proprietary standards3. What types of problems exist with mixed standards 4. A plan to correct the problems with the current wireless network __________________________________________________________________________________ Second section…. 1. PROJECT SCOPE Project scope 2. FEASIBILITY STUDY Objectives of the Network: 1. Secure Service What is the main objective of this network? 2. Integration and Updates What needs to be done to get the current network up-to-date? 3. Versatile Information Process What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 4. Collaboration How will the network be used to collaborate with other offices? Other users in a different location? 5. Scalability How will the network be able to adapt to change? Intended Users What type of mobility requirements, client device requirements, and signal coverage requirements are needed? Design Assumptions State the assumptions for unknown factors that could affect the project. Equipment Needs and Proposed Budget For more information on Wireless Network read this:https://en.wikipedia.org/wiki/Wireless_network
[Solved] Cloud Services
Hello, I need this paper by 12/16 afternoon. Strictly No plagiarism please use your own words. 300 words In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month? Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism For more information on Cloud Services read this: https://en.wikipedia.org/wiki/Cloud_computing#Service_models
[Solved] Cybersecurity Planning
Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on the personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company. Project Plan You are asked to create two separate policies on the use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable). 1. Overview 2. Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies, and Processes 7. Definitions and Terms Some useful links and resources for your research: https://resources.workable.com/email-usage-policy-template https://www.sans.org/security-resources/policies/general/pdf/email-policy https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gre https://www.techrepublic.com/article/download-our-wireless-policy-template/
[Solved] Global Cybersecurity
Choose an organization that has exposure to international influences and budgets exceeding $100 million. This organization should have a presence on the web so that your academic readers can understand the industry and the organization. For the selected organization, analyze the cybersecurity risks faced from abroad, detailing processes used to establish the risk, enable threats, and identify how there might be harmful to some parties. In addition, outline how the organization can reduce these risks, detailing people, products, or processes that could help with risk reduction. Furthermore, provide a rough estimate of the total resources needed and their potential cost. Finally, explain how you might acquire access to the resources to execute your proposed cyber defenses. References: Support your assignment with no fewer than 8 scholarly sources published within the last five years. Length: 6 to 8 pages Required readings: Banks, W. C. (2017). Cyber espionage and electronic surveillance: Beyond the media coverage. Emory Law Journal, 66(3), 513-525 Choi, C.Q. (2017). Unhackable quantum networks take to space [News]. IEEE Spectrum, 54(8), 12-13 Emery, A. C. (2017). Zero-day responsibility: The benefits of a safe harbor for cybersecurity research. Jurimetrics: The Journal of Law, Science… Kaiser, R. (2015). The birth of cyberwar. Political Geography, 46, 11-20 Kovács, L. (2018a). Cybersecurity policy and strategy in the European Union and NATO. Revista Academiei Fortelor Terestre, 23(1), 16-24 For more information on Global Cybersecurity read this: https://en.wikipedia.org/wiki/Cybersecurity_standards
[Solved] Selective Repeat Protocol
Consider a source S and a destination D using the Selective Repeat Protocol (SRP) with a window size of N=4N=4. Each packet is 10001000 bits. The delays are as follows: Each packet transmitted by S has a transmission time of 10 ms10ms. The end-to-end delay from the time that S starts transmitting a packet until D completely receives that packet is 100 ms100ms. Each ack transmitted by D has a transmission time of 1 ms1ms. The end-to-end delay from the time that D starts transmitting an ack until S completely receives that ack is 100 ms100ms. The timeout value is 300 ms300ms. Here is what happens to each packet: Packet #0 is received by D, and the corresponding ACK is received by S. The first transmission of packet #1 is dropped by a router in between S and D. The second transmission of packet #1 is received by D, and the corresponding ACK is received by S. The first transmission of packet #2 is dropped by a router in between S and D. The second transmission of packet #2 is received by D, and the corresponding ACK is received by S. Packet #3 is received by D, and the corresponding ACK is received by S. Packet #4 is received by D, and the corresponding ACK is received by S. Packet #5 is received by D, and the corresponding ACK is received by S. (a) At time t = 150 mst=150ms, what is S’s window? (b) At what time does the retransmission of packet #1 start? (c) At what time does the application layer at D receive packet #2? (d) What is the throughput during the time from t = 0 mst=0ms until t = 500 mst=500ms? Write your answers for parts (a)-(d) (as well as any diagram or equations use to obtain your answers) on paper, and upload the image here: For more information on Selective Repeat Protocol read this: https://en.wikipedia.org/wiki/Selective_Repeat_ARQ
[Solved] Virtual Machine Networking
Respond to the following in a minimum of 185 words: You want to build a test environment based on virtual machines on a single Windows Server 2016 machine, but you also want to make sure the virtual machines communicate with only each other. What type of virtual network do you need to configure? For more information on Virtual Machine Networking read this: https://en.wikipedia.org/wiki/Network_virtualization
[Solved] Network Model
This assignment will be submitted to Turnitin®. Instructions Pick any Network you may find in your home, work, or on the internet as an example for your case study. Prepare a presentation and paper report around 10 pages that shows: Introduction that includes background and history Network model presentation What types of standard protocols and technologies have been used Provide an example for 3 different protocols that are applied in different 3 network layers Show your work citations No grade if No presentation. For more information on Network Model read this: https://en.wikipedia.org/wiki/Network_model
[Solved] Cloud
Why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph. For more information on Cloud read this: https://en.wikipedia.org/wiki/Cloud_computing
Use Promo Code: FIRST15