Computer Science
[Solved] Software Implementation
The purpose of project management and the SDLC is to increase successful software implementation. The article titled “IT Project Failure Rates: Facts and Reasons” makes it clear that a lot of projects still fail. Identify an IT system development failure that occurred within the last two years. Do not repeat an example from earlier in the course or one that has been posted by another student. Analyze which project management concepts were not respected by the project managers and wherein the SDLC these lapses occurred. Describe how you might have spoken up had you been on the steering committee.
[Solved] Crisis Management Plan
Crisis Management Plan is a security plan that outlines the initial steps that organizations embark on when disasters occur. Describe these steps and the details of in your plan.
[Solved] Network Infrastructure Design
Hide Assignment InformationInstructionsBackground: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the Institute’s website in a three-tier web, application, and database configuration. The State of Hawaii regulates the educational sector, driving the need to ensure Kamehameha follows the States strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawaiian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehamehas cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:· Each of the facilities has three floors:· The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devices· The third floor of each building requires 75 network connections for the servers· All sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites)· Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)· A constant connection between the three locations, carrying at least 75 Mbps of data· All servers at all locations must have redundancy· Protection from intrusions is required and should be documented· A plan to verify security and failover measures is requiredSubmission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io new network diagram dialog window:Figure 1. Draw.io New File Dialog Showing the Network Diagramming TemplatesYour diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institutes network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:Example Network Diagram Callout Box.CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010· Any necessary hardware· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)· Annotate the following values for each of the Sites· Network ID· Useable Range· Subnet Mask· CIDR Value
[Solved] Digital Signatures
Analyze the advantages and disadvantages of digital signatures. APA formatting is a must with a minimum of 350 words. You must use at least two scholarly resources. APA formatting checklist. Times new roman, 12pt Set page margins to 1 inch on all sides. Double-space all text, including headings. Indent the first line of every paragraph 0.5 inches. Order the references alphabetically, each must have a hanging indent of 0.5 inches and in-text citations for the references listed. plagiarism report needed
[Solved] Health Applications
HCI and health applicationsAssessment criteria:The majority of marks are awarded for the critical analysis, quality of content and the essay structure; more detailed criteria are provided in the attached marking sheet for this assignment.Description of assignment:This assignment requires you to write an essay (1000 words
[Solved] The LAN-To-WAN Domain
Overview Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do not count toward the overall page length. Imagine you are an information systems security officer for a medium-sized financial services firm with operations in Virginia, Florida, Arizona, and California. Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain, specifically: Protecting data privacy across the WAN. Filtering undesirable network traffic from the Internet. Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web.Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources.Having an area designed to trap attackers and monitor attacker activities.Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity.Hiding internal IP addresses.Allowing operating system and application patch management.The CIO has tasked you with proposing a series of hardware and software controls to provide security for the LAN-to-WAN domain. The CIO anticipates receiving a written report and diagrams to support your recommendations.InstructionsWrite a 35 page paper in which you:Use MS Visio or an open-source equivalent to graphically depict a solution for the provided scenario that will:Filter undesirable network traffic from the Internet.Filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web.Allow for a zone for anonymous users that aggressively controls information exchange with internal resources.Allow for an area designed to trap attackers and monitor attacker activities.Offer a means to monitor network traffic and identify and block unusual activity in real time.Hide internal IP addresses.Identify the fundamentals of public key infrastructure (PKI).Explain how your solution will protect the privacy of data transmitted across the WAN.Analyze the requirements necessary to allow for proper operating system and application patch management and propose an effective solution.Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.Reminder: The graphically depicted solution is not included in the required page length.This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:Propose security solutions for a LAN-to-WAN domain.
[Solved] Human Computer Interaction
Food CHI (Human Computer Interaction)The majority of marks are awarded for the critical analysis, quality of content and the essay structure; more detailed criteria are provided in the attached marking sheet for this assignment.Description of assignment:This assignment requires you to write an essay (1000 words
[Solved] Security and Privacy
Write a 6-8 page paper (deliverable length does not include the title and reference pages) What are the principles and limitations to an individual’s right to privacy? What are the trade-offs between security and privacy? What is the issue of freedom of speech versus the protection of children online? Due: Assignment is due on the day stated in the Course Schedule Provide three articles to substantiate the above three questions. Use APA format to provide a citation for each of the articles you read. Suggestion: Use a search engine (Google) and keywords. For more information on Security and Privacy read this: https://en.wikipedia.org/wiki/Information_privacy
[Solved] Program and Technology
i. Literature review (2-3 pages)ii. Program and technology recommendations, including:1. Metrics2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.3. Regulatory, security, and privacy compliance expectations for your company4. Email and social media strategy5. Cloud Computing strategyb. Conclusionc. ReferencesThis paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.
[Solved] Computer Programming
Using the Internet or other media, search for a job position you find very interesting and discuss the qualifications for the position and the future steps you could take to become qualified for the position.The job position must be within IT or computer ProgrammingA minimum of 500 words excluding the title page and references is required.Use APA format Refer to APA Style
Use Promo Code: FIRST15