[Solved] The Internet of Things

1. Do the narrators explain the concept of ” The Internet of Things” clearly? Explain your reason.2. The narrator explains that the planet has “grown a central nervous system.” What does this statement mean?3. What have you learned about how technology helps or hurts society from watching this video?

Read more

[Solved] Electronic Data Management

Do not just answer the questions. You should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 6 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 6 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Be sure to cite your sources, use APA style as required, double check your grammar and spelling.No short answers. Must be 350 or more not including references.1. Explain why Intranets fail. What procedures are needed to prevent the failure?2. Explain the different Management Structures in Intranets.3. What are Electronic Data Management Systems?4. Explain searching and indexing in the context of an Intranet.

Read more

[Solved] Data Security

Residency Research Makeup ProjectAcme Enterprise Scenario Residency WeekAcme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc.Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO.Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:1. Perimeter Security2. Network Security3. Endpoint Security4. Application Security5. Data Security6. Operations7. Policy ManagementAcme Perimeter SecurityAcme is currently protected by two dual Dynamic Stateful Inspection Firewalls that are configured in active and stand by mode. Acme is also configured to use PAT (port address translation) where 200.200.200.1 represents Acme on the public Internet. Acme translates this public IP through its clustered firewall to the internal IP space of 10.100.0.0/16 giving Acme 65334 useable IP addresses.As part of Acme’s infrastructure, it also accesses cloud services for its business office tools through Office 365 and uses Dropbox for end user’s storage. Acme uses a web hosting service for its web front end and ecommerce which is connected to a back-end Oracle Database using enterprise MySQL. The database administrators have full access to all database information, but they lack oversight from anyone else.There are two DMZ’s, but they are not utilized.Network SecurityAcme has a collapsed core design which means all internal LAN routing and Internet access occurs on its distribution level devices. This means, wireless access, web proxy access, access control lists and entries are located at this layer of the infrastructure. Currently Acme is using WPA 2 (wireless protected access 2) for is wireless security. The web proxy is configured with the following: General, Limited, and Exclusive Internet access. Each of these categories dictates what type of Internet access an end user will experience if belongs to one of these groups.The Local area network uses the IP block in the following way: 10.100.1.0/24 User VLAN, 10.100.2.0/24 Research and Development VLAN.Current access control lists are permit 10.100.2.0 0.0.0.255, permit 10.100.1.0 0.0.0.255. All other devices use the rest of the unallocated IP block of 10.100.0.0/16.Also, all IP space is statically assigned. There is one default route to Internet but users of complain about access to internal services.Endpoint SecurityThere is a mixture of MAC and Windows systems, XP, 7, and 10. JAMF is used to control and monitor MAC systems, the Windows devices rely on its end users to patch and update systems. The current endpoint security is signature-based MacAfee with no centralized control.Application SecurityDevOps is responsible for secure coding and development of applications, but it has no formal oversight. Policy for application monitoring tracking is adhoc there are no formalized procedures. The server farm houses all applications, the operating systems range from Server 2003 to 2016. Mobile device management, media server, content management, file server, directory services, database, are all the services being offered from the server farm. This server architecture is all hardware based there are no hypervisor systems in place.Data SecurityData has not been classified, identity access management relies on one factor authentication; encryption, digital signatures, PKI rely on self-signed certificates, protection in the cloud is also missing and there is a lack of DLP (data loss prevention). Acme does store financial information in its data center as well as personal identifiable information.OperationsInformation technology is responsible for security however there is a security team under the IT department. The Chief Information Security Officer reports to the Chief Information Officer.Policy ManagementAcme has one Information Security Policy that addresses its information security architecture and program. It is not based on any of the existing information security management frameworks such as: IS0 27002, NIST CSF, or COBIT 5.You are going to conduct a risk assessment on Acme Enterprise using the risk assessment concepts we have learned about thus far. Each of the areas of the infrastructure mentioned above is where you will concentrate your assessments. After you have completed your risk assessment, you will then provide recommendations for each area that you assessed to reduce risk, exposure, and threat. Also, as part of your final submission demonstrate through a redesign where your mitigations will take place within the architecture. You can use the image below as guide for your risk analysis of each area.

Read more

[Solved] Traditional Laptop

iscussion Question:The use of smart phones is growing rapidly. What could be the possible limitations of using a smart phone instead of a traditional laptop? Identify at least two limitations. Are these limitations surmountable?There is currently no standardization in the operating system (OS) used in a cell phone. What problems does this pose to the use of cell phones for serious m-commerce such as banking? Provide a possible solution along with a sound rationale to overcome the problems without the requirement of imposing a standard.Consider the case of mobile computing used to automate checkout at a retail store, where a mobile device identifies its owner and a device such as RFID on each of the products being purchased identifies the products and automatically bills the customer for the products in his/her cart. What issues can you foresee with technological limitations when two customers leave at the same time? What ethical issues must be addressed to prevent charging another customer for goods purchased by someone malicious? Justify whether these issues can be addressed, and if so, how?

Read more

[Solved] Threat Modeling

Threat ModelingA new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:· User authentication and credentials with third-party applications· 3 common security risks with ratings: low, medium or high· Justification of your threat model (why it was chosen over the other two: compare and contrast)You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:· Be approximately 5 to six pages in length, not including the required cover page and reference page.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Read more

[Solved] Applicable Personal Experience

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Watch the following video: www.youtube.com/watch?v=GHc63Xgc0-8Answer the following:What are your takeaways from these videos?How can you prepare for the day when indeed humans may not need to apply for many jobs?What are the pros and cons of UBI and SIS?Discussion 2):Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

[Solved] Authentic Personal

candidates should provide authentic personal statements to each of the five following questions/prompts reflecting on their own personal interests. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for clarity of the reviewer.

Read more

[Solved] Media Access Control

Network Interface Cards (NIC), Media Access Control (MAC) Address Format, Unicast and Broadcast Traffic, Address Resolution Protocol (ARP), and ARP Cache Utility. Explain what they are, their function, and illustrate their relationship to each other.Please DO NOT USE outside sources or quote your book directly for these discussion – summarize what you want to say in your own words and use examples to illustrate your meaning. This will allow me to gage how well you understand the concepts. I want you to think not just memorize.

Read more

[Solved] Owens Valley Water

View the Port of Los Angeles 4-part documentary and read the material in the Owens Valley water website, https://www.inyowater.org/documents/reports/owens-valley-water-history-chronology/. Simply answer this question. Based on what you have learned and/or know about fiscal capacity and Tragedy of the Commons should the City of Los Angeles exist in its present form when considering its inherent geographic location and natural resources? Note: it was an arid semi-desert pueblo before 1900.The discussion and original post will occur in groups.Each discussion’s original post into the group DB should be a minimum of 300 words in length and the responses to another colleague in the Group DB should approximate 200 words.

Read more

[Solved] Security Policy

You have been asked to design a security policy for a database that contains very sensitive information. Discuss five important issues that should be addressed. Must be one full page and have 2 sources.

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.