A specialized system designed to ask questions, collect data, and provide a suggested solution, often with a specific degree of accuracy

A specialized system designed to ask questions, collect data, and provide a suggested solution, often with a specific degree of accuracy.

Web browser

  1. When using a web browser, each address normally starts with the letters http. What does the “h” represent?High
    1. Hyper
    2. Head
    3. Height
    4. Hydro
  1. A web browser browses the Internet with all of the following types of connections EXCEPT a:
    1. wireless connection.
    2. firewalled connection.
    3. proxy-server connection.
    4. stand-alone connection.
    5. direct connection.
  2. To view web pages, the best protocol to use is:
    1. http.
    2. ftp.
    3. nntp.
    4. smtp.
    5. www.
  3. To transfer files, the best protocol to use is:
    1. http.
    2. ftp.
    3. nntp.
    4. smtp.
    5. www.
  4. To transfer e-mail messages, the best protocol to use is:
    1. http.
    2. ftp.
    3. nntp.
    4. smtp.
    5. www.
  5. A specialized system used to aid geographic mapping systems is called:
    1. geographic information system.
    2. business intelligence.
    3. decision support system.
    4. expert system.
    5. statistical analysis.
  6. A specialized system used to help make high-level decisions based on complex business intelligence information is called:
    1. geographic information system.
    2. business intelligence.
    3. decision support system.
    4. expert system.
    5. statistical analysis.
  7. A specialized system designed to ask questions, collect data, and provide a suggested solution, often with a specific degree of accuracy, is called:
    1. geographic information system.
    2. business intelligence.
    3. decision support system.
    4. expert system.
    5. statistical analysis.
  8. Which of the following is the standard for electronic data interchange transfers from the American National Standard Institute?
    1. IEEE
    2. 802.11
    3. X12
    4. ACM
    5. ASCII
  9. Benefits of electronic data interchange include all of the following EXCEPT:
    1. it is more accurate than traditional transaction processing.
    2. it is faster than traditional transaction processing.
    3. it uses fewer natural resources than traditional transaction processing.
    4. it is more secure than traditional transaction processing.
    5. it makes just-in-time processing more difficult and time-consuming.What We Offer:

      25% Discount on New Clients
      • On-time delivery guarantee
      • PhD-level professionals
      • Automatic plagiarism check
      • 100% money-back guarantee
      • 100% Privacy and Confidentiality
      • High Quality custom-written papers

A specialized system designed to ask questions, collect data, and provide a suggested solution, often with a specific degree of accuracy

Posted in IT

submit a network drawing listing the network’s topology including any necessary hardware.

submit a network drawing listing the network’s topology including any necessary hardware..

Network’s topology

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:
1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network’s topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

submit a network drawing listing the network’s topology including any necessary hardware.

Posted in IT

Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work.

Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work..

Copyright infringement

It is true that information management is key for confidentiality of any organization’s information but the irony at once is that serious ethical challenges have constantly followed the information management. It is again quite unfortunate as technology advances, IT experts are not able to tell the kind of challenges that are being send into the system by the malware developers. From the reviewed academic articles, I noted that among the ethical issues that arise in the course of information management include: copyright infringement, reduced privacy and computer crimes. The similarity from all the articles was that nearly all businesses risk cyber victims since most of them have embraced digital networking. The one single difference is that how these business handle their problems is varied by the skills of their IT experts.

Based on the premise of chapter 14 of our text book, the articles support the theme of the materials in chapter 14 in that cybercrimes have become inevitable and what can only save organizations and businesses is having qualified IT personnel on board to save the situation in case it happens.

From the articles, I have learned that to a greater degree, harmful employees engage in dubious activities to harm the organization for their personal gains. Among the ethical challenges that can make information management a tall order include:

i        Security: hackers use the internet to hack organization’s systems using the Internet protocol address to collect data that they may use against the business organization.

ii      Issues of privacy: due to the existence of webcams, many experienced users have popped into the private life of celebrities and caused havoc to their private life.

iii    Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work.

iv     In p-principle, digital divide is another issue in information management as the company embraces technology, it has to first train its workforce on how to use the technology.

Please respond to the above post in 150 words.

 

Be sure to support your work with specific citations using APA format

Read a selection of your colleagues’ postings using one or more of the following ways:

• Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

• Offer and support an alternative perspective using readings from the class materials or from your own research.

• Validate an idea with your own experience and additional research.

• Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

• Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.

Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work.

Posted in IT

Physical Security:A breakdown of the security force, its organization, training, equipment, capabilities, resources, and procedures.

Physical Security:A breakdown of the security force, its organization, training, equipment, capabilities, resources, and procedures..

Physical Security

Using proper APA formatting write 5 pages, not including your heading or reference pages describing the significance of the information in a security plan.

  1. A description of the facility and its organizational structure.
  2. The security organization of the facility.
  3. A discussion of the physical barriers used in the system.
  4. A discussion of the alarm system used.
  5. A description of access controls used to restrict access to or within the facility.
  6. A discussion of security lighting at the facility.
  7. A description of the communications capability.
  8. A description of the CCTVs capabilities, usages and best areas to mount them.
  9. A breakdown of the security force, its organization, training, equipment, capabilities, resources, and procedures.
  10. A discussion of outside resources including LLEA and others as appropriate.
  11. Annual assessments.
  • Please use the IP title page provided in the course material folder.
  • Your SA score should not be more than 30%.
  • If your last posted assignment is more that 30% you will get a zero score.

In-text citations and a reference list are also a requirement.

  1. You need to have at least 10 cited sources this assignment.
  • Please ensure that all cited sources are credible

Physical Security:A breakdown of the security force, its organization, training, equipment, capabilities, resources, and procedures.

Posted in IT

Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization.

Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization..

Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization’s current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

  1. Explain in your own words the elements of the following methods of access control:
    1. Mandatory access control (MAC)
    2. Discretionary access control (DAC)
    3. Role-based access control (RBAC)
  2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
  3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.
  4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
  5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).
  6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze information security systems compliance requirements within the User Domain.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization.

Posted in IT

Safety Management System (SMS) Implementation(Safety and Health Action Plan)

Safety Management System (SMS) Implementation(Safety and Health Action Plan).

Safety Management System

Safety Management System (SMS) Implementation(Safety and Health Action Plan)

Using the Plan-Do-Can-Act (PDCA) model we have discussed, you will develop a safety and health implementation plan.

The plan will be compiled in phases during the next four units. In Unit VII, you will reference this information to develop a PowerPoint presentation, which will serve as your course project. In this assignment, you are in the planning (P) phase of the implementation. You will develop a safety management

implementation plan, which will include a safety and health policy statement.

Continuing with the scenario introduced in Unit II (review Unit II PowerPoint assignment in the syllabus), you have just received notice from upper management that they are ready to move forward with the implementation of a safety management system. As the safety expert at the company, you have been tasked with leading the development and implementation process. As you are in the initial phase of your project, you recognize the importance of compiling an

implementation plan. Using the information you have covered in Units I, II, and III and the supplemental documentation, prepare an action plan for your safety management system.

Your plan should include the following elements:

a written safety and health policy statement, three clearly defined occupational safety and health (OSH) objectives, performance criteria roles and responsibilities (i.e., what is to be done, by whom, and when), and the strategies on how measurement criteria for confirming the objectives are achieved.

Your action plan should be two to three pages. Be sure to use at least one additional scholarly source (such as an academic article from the CSU Online Library and/or a government safety source such as OSHA) besides your textbook as a reference for your assignment. All sources must be cited and referenced according to APA standards.

Safety Management System (SMS) Implementation(Safety and Health Action Plan)

Posted in IT

Cloud Privacy And Security:Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database

Cloud Privacy And Security:Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database.

Cloud Privacy And Security

You are the principal consultant for a community based Charity. The Charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community.

The Charity currently runs a small data centre that has some 50 x86 64 bit servers running mainly Windows Server 2008 R2 for desktop services, database and file services. It also has 10 Red Hat Enterprise Linux 5 servers to service public facing Web pages, Web services and support.

The Charity is considering joining a community cloud provided by a public cloud vendor in order to provide a number of applications to all 500 support staff and administrative users. A small number of the Charity’s applications are mission critical and the data that those applications use is both confidential and time sensitive.

The community cloud would also be used to store the Charity’s 200TB of data. The data would be held in a SaaS database run by the public cloud vendor. The Charity’s data contains a considerable amount of confidential information about the people to whom the Charity provides services.

The Charity collects PII data on the clients who use its services so that it can assist them to manage their different service requirements. This PII data also includes holding some digital identity data for some of the more disadvantaged clients, particularly if they also have mental health issues.

The cloud vendor has made a presentation to management that indicates that operational costs will drop dramatically if the cloud model is adopted. However, the Board of the Charity is concerned with the privacy and security of the data that it holds on the people that it provides services to in the community. It is concerned that a data breach may cause considerable damage to substantially disadvantaged people in the community.

The Board asks that you prepare a report that proposes appropriate privacy and security policies for the Charity’s data.

The charity has also decided to:

  • Purchase a HR and personnel management application from a US based company that provides a SaaS solution.
    • The application will provide the charity with a complete HR suite, which will also include performance management. The application provider has advised that the company’s main database is in California, with a replica in Dublin, Ireland. However, all data processing, configuration, maintenance, updates and feature releases are provided from the application provider’s processing centre in Bangalore, India.
    • Employee data will be uploaded from the charity daily at 12:00 AEST. This will be processed in Bangalore before being loaded into the main provider database.
    • Employees can access their HR and Performance Management information through a link placed on the Charity intranet. Each employee will use their internal charity digital ID to authenticate to the HR and Performance management system. The internal digital ID is generated by the charity’s Active Directory instance and is used for internal authentication and authorisation.
  • Move the charity payroll to a COTS (Commercial Off The Shelf) application that it will manage in a public cloud;
  • Move the charity Intranet into a Microsoft SharePoint PaaS offering so that it can provide Intranet services to all agencies in the WofG.

Tasks

You have been engaged to provide a risk assessment for the planned moves to SaaS application offerings.

You are to write a report that assesses the risks to the charity for just their planned moves in the HR area:

  1. Consider the data and information that the charity holds on its employees in the current HR system.
    1. Establish the existing threats and risks to the security of that data and information contained in the in-house HR database. (10 marks)
    2. Are there any additional risks and threats to employee data that may arise after migration to an SaaS application? (10 marks)
    3. Assess the resulting severity of risk and threat to employee data. (10 marks)
  2. Consider the privacy of the data for those employees who will move to an SaaS application.
    1. Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database. (10 marks)
    2. Are there any additional risks and threats to the privacy of the employee data after migration to an SaaS application? (10 marks)
    3. Assess the resulting severity of risk and threat to the privacy of employee data. (10 marks)
  3. What are the threats and risks to the digital identities of charity employees from the move to SaaS applications? (10 marks)
  4. Consider the operational solution and location(s) of the SaaS provider for HR management. Does either the operational solution, or the operational location, or both, increase or mitigate the threats and risks identified for the security and privacy of employee data? (20 marks)
  5. Are there any issues of ethics, data sensitivity or jurisdiction that should be considered by the charity? (10 marks)

You are to provide a written report with the following headings:

  • Security of Employee Data
  • Privacy of Employee Data
  • Digital Identity Issues
  • Provider Solution Issues
  • Data Sensitivity

Cloud Privacy And Security:Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database

Posted in IT

Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.

Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs..

Adopting SSDs

Use  the Internet and Strayer Library to research the benefits and hazards  to organizations that use solid-state drive (SSD) storage devices.

Write a four to five (4-5) page paper in which you:

  1. Examine the major benefits for an organization to use SSDs.
  2. Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.
  3. Recommend  whether or not Delaware Health and Social Services and the Disabled  American Veterans should seriously consider SSDs for their  organizations. Provide a rationale for your response.
  4. Determine  whether SSDs are more or less difficult for computer forensics  personnel to examine. Suggest whether or not an organization, such as  Health and Social Services and the Disabled American Veterans, should  consider the difficulty of computer forensic examinations when  considering the purchase of SSDs. Provide a rationale for your response.
  5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.

Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.

Posted in IT

Propose an efficient data structure that may hold the tour operator’s data using a normalization process. Describe each step of the process that will enable you to have a 2nd Normal Form data structure.

Propose an efficient data structure that may hold the tour operator’s data using a normalization process. Describe each step of the process that will enable you to have a 2nd Normal Form data structure..

Efficient data structure

The  Strayer Oracle Server may be used to test and compile the SQL Queries  developed for this assignment. Your instructor will provide you with  login credentials to a Strayer University maintained Oracle server.

A  multinational tour operator agency has gained new business growth in  the North American market through the use of social media. Its operation  has expanded by 50% within six months and the agency requires an  enhanced data management strategy to sustain their business operations.  Their existing data repository for its reservation processing system is  limited in business intelligence and reporting functionalities. The tour  operator seeks a database management specialist to assist them in  leveraging their data sources to enable them to forecast and project  tour sales appropriately.

Imagine  that you have been hired to fulfill their need of enhancing the data  repository for their current reservation processing system. Upon  reviewing the system, you find that the data structure holds redundant  data and that this structure lacks normalization. The database has the  following characteristics:

  • A  table that stores all the salespersons. The table holds their employee  id, first name, last name and “Tours sold” field. The “Tours sold” field  is updated manually.
  • A  table that stores tour customer data and tours sold. The table holds  customer name, address, city, state, zip code, tour(s) selected, number  of persons in tour, and total amount paid. The current structure will  show the customer more than once, if the customer books multiple tours.
  • A  tour table that is used as a tour rate sheet which holds the tours  offered and the cost per person. Tour rates vary every three (3) months  depending on the tourist season.

Write  a four to five (4-5) page paper in which you propose an enhanced  database management strategy. Your proposal should include the  following:

  1. Design a data model that will conform to the following criteria:
    1. Propose  an efficient data structure that may hold the tour operator’s data  using a normalization process. Describe each step of the process that  will enable you to have a 2nd Normal Form data structure.
    2. Create naming conventions for each entity and attributes.
    3. Conclude  your data model design with an Entity Relationship Model (ERM) that  will visually represent the relationships between the tables. You may  make use of graphical tools with which you are familiar. Note: The graphically depicted solution is not included in the required page length.
  2. Construct  a query that can be used on a report for determining how many days the  customer’s invoice will require payment if total amount due is within 45  days. Provide a copy of your working code as part of the paper.
  3. Using the salesperson table described in the summary above, complete the following:
    1. Construct  a trigger that will increase the field that holds the total number of  tours sold per salesperson by an increment of one (1).
    2. Create a query that can produce results that show the quantity of customers each salesperson has sold tours to.
  4. Support  the reasoning behind using stored procedures within the database as an  optimization process for the database transactions.

Your assignment must follow these formatting requirements:

  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page and the reference page are not included in the required assignment  page length.

Propose an efficient data structure that may hold the tour operator’s data using a normalization process. Describe each step of the process that will enable you to have a 2nd Normal Form data structure.

Posted in IT

Security techniques and mechanisms in protecting against spam activity.

Security techniques and mechanisms in protecting against spam activity..

Security techniques and mechanisms

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

Directions:

  • Students are required to post one original response to the discussion questions each week, as well as a response to one classmate. Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of the concepts and additional insights, either from real world experience or additional sources. It should be a 250 word response to the question each week by 11 p.m. on Wednesday evening. Your primary posting may end with a tag-line or a related question of your own. Between 1 a.m. on Thursday and 11 p.m. on Saturday, you should have done your secondary posting. Your secondary posting is a response to one classmate’s post. Each answer/response should be supported with research. Responses to classmates should not be “I agree” or “I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 125 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.

Reply to class mate:

Web 2.0 structures utilize the Web as a stage, as a goliath degree of interconnected contraptions which can give another level of rich and immersive experience for the client, a simple to-utilize and lightweight programming model for the fashioner, and a speedy and adaptable affiliation system for the provider. Web 2.0 reexamines the Internet from the client, the modeler, and the provider’s points of view, each of which permits new and innovative occupations of the Internet. (Platt)

The likelihood of association supports each related structure, including, obviously, Web 2.0. An association creates structure is based concerning the standard of the division of stresses using free coupling or message passing. The free coupling engages accommodation to be made as an association and passed on completed a structure; for instance, in the Web 2.0 world, journal comfort can be given by a blog motor and be passed on as an assistant of the end client or blogger over the Internet. (Platt)

In Web 2.0, the programming models, musings and systems are fundamentally not precisely the same as those that have been utilized as a bit of the endeavor. While they are associations based and reinforced with lighting up passing, they utilize Representational State Transfer (REST) conventions and concentrate on simplicity and solace. (Platt)

Web 2.0 creation PC programs endless supply of concerns utilizing a generally coupled, message-passing-form show up with respect to best of an Internet-based, standard course of action of exchanges customs (HTTP) which is routinely called REST full programming. It derives the displays of syndication and affiliation where associations are given without information of their utilization. This is overall not the same as an ordinary unequivocally coupled, regard based and disagree orchestrated structure. It has a substitute course of action of great conditions, for example, adaptability and speed of execution, and inconveniences, for example, dependability and association. (Platt)

The vernaculars, for example, Perl, Python, and Ruby—and systems utilized as a bit of Web 2.0 are fundamental and dynamic, giving a low farthest point to portion and reuse and high profitability. The structures have worked in help for the principal course of action diagrams, for example, Model View Controller (MVC), and procedures, for example, created programming change. They are enthusiastic and simple to learn, utilize, and be profitable in. (Platt)

Security techniques and mechanisms in protecting against spam activity.

Posted in IT