Computer Science 2023 Discussion 1 and 2 of CIS 534 Week 7

2023 DISCUSSION 1 How Is Your Firewall Implementation Please respond to the following Imagine | Assignment Collections

DISCUSSION 1:

“How Is Your Firewall Implementation?” Please respond to the following:

  • Imagine you have installed and configured firewalls in all of the right places within your organization’s network. Like any other organization, you try to stay current by deploying the latest and greatest in firewall technology. Similarly, the purpose of your firewall is to filter bad traffic, which your firewall has been doing. Occasionally, you add more rules to filter more traffic, but have no evidence of going back to visit historical log data. Explain in detail and give examples of the problems that result from this practice.
  • You have a firewall in your production environment and occasionally need to add rules mostly to open up ports, services, IPs, and so on, from ingress traffic from the Internet, but do nothing to egress traffic leaving your network. Determine the possible pitfalls of adding rules to egress traffic leaving the network. Describe in detail solutions to such pitfalls in the order you would implement them.

DISCUSSION 2:

 

How Much Protection Do You Really Need?” Please respond to the following:

 

  • Examine the specifications for an enterprise class firewall and a personal or home firewall. Determine why “all firewalls are not equal”. Assess the effectiveness of each and determine if one outperforms another at its intended function. Discuss risk, manageability, scalability, need, and cost of each.
  • Describe the applicability of software network firewalls, appliance firewalls, and virtual firewalls. Explain the circumstances under which each would be used and why. Discuss risk, manageability, scalability, need, and cost of each.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 SEC 280 SEC280 Week 4 Case Study Personal Computer Security Threats ( SEC/280 Week 4 Case Study Personal Computer Security Threats )

2023 SEC 280 Week 4 Case Study Personal Computer Security Threats 947 Words APA | Assignment Collections

SEC 280 Week 4 Case Study Personal Computer Security Threats (***** 947 Words + APA Format + Conclusion + References *****)

 

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system.

 

This assignment requires two to three pages in length, based upon the APA style of writing.

 

Use transition words; a thesis statement; body, and conclusion; and a reference page with at least two references. Use double-spaced, size 12.

 

SEC280 SEC/280 SEC 280 Week 4 Case Study

SEC280 SEC/280 SEC 280 Week 4 Case Study Computer Security

 

SEC 280 SEC/280 SEC280 Week 4 Case Study Personal Computer Security Threats

 

 

U can Also Purchase SEC280 Week 5 Case Study Risk Management Policy (*****Just Click On Below Link *****)

 

 

http://www.homeworkmarket.com/content/sec280-sec-280-week-5-case-study-risk-management-policy-sec280-week-5-case-study-risk-manage

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Principle Of Least Privilege – Database

2023 Read five articles and discuss the principle of least privilege in at least 500 words Explain how | Assignment Collections

 

Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 IT Strategy

2023 Week 2 Paper IT Strategy 100 Points Possible Individual Effort Only APA 7 format is required Your paper | Assignment Collections

 

Week 2 Paper – IT Strategy                          

100 Points Possible                                                    

Individual Effort Only!

APA 7 format is required – Your paper must be supported with appropriate APA-formatted citations that match full references at the end of the paper. Include headings in your paper for each question–DO NOT just restate the question as your heading–use unique headings identifying the content topic. Each section should be at least 2-3 paragraphs in length.

Referring to chapters 2 and 3 of the Langer (2018) text(see attachment) specifically regarding IT organization and strategy, review and compare the two sources below and then address the following questions in your paper:

Overby, S. (2017, October 27). Anatomy of an IT strategic plan in the era of digital disruption. Retrieved from https://www.cio.com/article/2437285/anatomy-of-an-it-strategic-plan.html

Lindros, K. (2017, July 31). What is IT governance? A formal way to align IT & business strategy. Retrieved from https://www.cio.com/article/2438931/governanceit-governance-definition-and-solutions.html

  1. Identify and discuss 2 key issues identified in the articles regarding IT strategy in today’s business world
  2. Discuss the need for alignment between business and IT strategy
  3. Discuss the challenges in aligning business and IT strategy
  4. Provide a concluding statement addressing your views on the value of IT strategic management and business alignment

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Management Support System Presentation

2023 You are a consultant that specializes in Enterprise Resource Planning ERP You have been hired by a small start up manufacturing | Assignment Collections

 

You are a consultant that specializes in Enterprise Resource Planning (ERP). You have been hired by a small start-up manufacturing company, with less than 500 hundred employees that specializes in electronic devices. The CEO of the company would like to incorporate a management support system (MSS) into the organization to help in making business decisions. This system will allow managers at the different levels to easily retrieve information from various databases in the organization to assist them in running scenarios, performing what-if analyses, and tracking organizational performance to determine goal achievement. You’ve been asked by leadership to present an MSS to help Company ABC understand how to integrate an MSS into their organization and how it will help them gain a competitive advantage over other companies. Throughout this course, you will be completing different assignments that will apply to this company.

Research the different MSS processes currently used in business.

Create a chart that compares each MSS’s potential using Microsoft® Excel®.

Create a 10- to 12-slide, multimedia-rich presentation that includes the following:

  • Comparison chart
  • Features and benefits of using an MSS
  • What types of decisions will the system support
  • How the three levels of management will utilize the system and the value to each level
  • How the MSS supports establishing a competitive advantage
  • Recommendation would you make to the organization

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Practical Connection Assignment

2023 Required Textbook Tapscott D Tapscott A 2016 Blockchain revolution how the technology behind bitcoin is changing money business | Assignment Collections

 Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

 

Course name: Introduction Blockchain and Cryptocurrency

Assignment:

Provide a reflection of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 750 words minimum reflection APA format document.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Myresp

2023 RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC A security policy is developed by senior management | Assignment Collections

  

RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC “A security policy is developed by senior management to assign certain responsibilities and mandate certain requirements, which are usually aligned with the agency’s mission.
 A new policy was just created to prohibit peer-to-peer software downloads, as they are illegal and may bring malicious content to the workplace. You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation. What would you do to enforce the policy?
 When responding to your classmates, discuss what might occur if senior management did not have a security policy or procedures in place. Use specific examples to support your thinking.” (TWO (2) PARAGRAPHS WITH REFERENCES ON EACH OF THEM SEPARATELY, NOT TOGETHER)

Please view article here http://web.archive.org/web/20150110053317/http:/www.pmi.org/~/media/PDF/Knowledge%20Center/PM%20Network%20Requirements%20Article.aspx

1. From the technical perspective, it looks like you hit all the potential security points. I pose that when looking at the policy to enforce your measures, where and how much flexibility is given down the “chain of command” could have a major impact. When you talk about Symantec Endpoint Protection and the enforcement rules, would that need to be codified at the Corporate Management Policy level? Or, a more general policy giving the IT Management the latitude to craft the actual enforcement?

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

   

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Create An E-R Diagram

2023 Bob owns a small company called Bob s Home repairs He does the small | Assignment Collections

 

 

Bob owns a small company called Bob’s Home repairs. He does the small home repair jobs that the large companies pass by. Need some wood work or wood furniture fixed? Call Bob.

Here is how the business works:

Someone calls Bob and asks him to bid on a job. He drives over, looks at the situation, and gives them a bid. Sometimes it is an official looking bid by mail, and sometimes it is scribbled on notebook paper. He decides how long it will take to do the job (he bills by the hour), how much wood will be needed, any odds and ends that are unique to the job, and an overall price. He moves from job to job and bills customers as he finishes the work.

Bob buys items and supplies from a variety of places, but he buys stuff only when it is needed for a particular project. A potential problem: if he gets behind on his payments to various suppliers, then they won’t let him order any more. This would stop his business dead in its tracks. His biggest and most crucial supply is lumber (the price rises and falls constantly). So, he must pay all bills within 30 days of receiving them, especially the lumber companies.

Bob is pretty nice to his customers. They don’t have to pay until the work is completed and they are satisfied with his work. This has occasionally led to some problems because the cash coming in is sometimes slower than the cash going out, and he would like to have a better idea of when his bills are due and when his customers will be paying.

Currently, all business records are kept in Bob’s head and in one file cabinet. Sometimes he forgets which jobs he bid on and how much he bid on them. He doesn’t call potential customers to ask about earlier bids, but this could increase business. He wants reports on suppliers that need to be paid and customers that are slow in paying their bills. So, he wants to computerize these aspects of the business to make things more efficient. Can you help him?

Here is what you need to be able to provide Bob in order to land your first consulting contract:

  1. A list of all business rules involved and an E-R diagram (crow’s foot) of the situation.
  2. A script that will create the tables and enter a minimum of 3 sets of data for each table (more if necessary for orders, bids, etc.).
  3. Documentation of your analysis of Bob’s data needs
  4. Some sample queries with sample outputs for the reports that he wants.
  5. A nice business cover letter that summarizes this package as a prototype/proposal and details how your services will meet his business data needs.

Here is what you don’t need to do:

  • You don’t need to computerize the entire business, just the processes that Bob finds most bothersome.
  • You don’t need to create forms for data entry. This is something you would do if hired as a consultant.

An outstanding project will have the following characteristics, with lower grades for projects that lack these things:

  1. The E-R diagram clearly identifies the entities, relationships, and attributes.
  2. The tables are in third normal form, and you used good names for the tables and the fields.
  3. The sample data is useful in creating sample reports.
  4. The script works with Oracle using the the 10g XE interface.
  5. The script has comments to make it easy to edit later. (dash dash space )
  6. The sample queries that will show Bob how the database will be useful in meeting his data needs.
  7. The business cover letter looks professional. A potential customer would be more likely to hire you because of it.
  8. The entire package is organized in a Word document for easy viewing and editing, with diagrams and scripts copied into the Word document rather than stapled together from separate files.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CMIT 321 FINAL EXAM NEW -SPRING 2016

2023 CMIT 321 FINAL EXAM NEW SPRING 2016 Question 1 1 1 point is the exploitation of an organization s | Assignment Collections

 

CMIT 321 FINAL EXAM  NEW -SPRING 2016

Question 1


1 / 1 point

__________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.


a. War driving


b. Line dialing


c. PBX driving


d. War dialing

View Feedback



Question 2


1 / 1 point

__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.


a. Symmetric


b. Hash-based


c. Private-key


d. Public-key

View Feedback



Question 3


1 / 1 point

__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.


a. Gnoppix


b. GeeXboX


c. Morphix


d. Damn Small Linux

View Feedback



Question 4


1 / 1 point

The __________ utility tests the integrity of an ODBC data source.


a. odbcping


b. ASPRunner


c. FlexTracer


d. DbEncrypt

View Feedback



Question 5


1 / 1 point

In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate.


a. Internet


b. network


c. transport


d. application

View Feedback



Question 6


1 / 1 point

Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________.


a. a pound sign


b. two dashes


c. a single quotation mark


d. double quotes

View Feedback



Question 7


1 / 1 point

__________ allow attackers to pass malicious code to different systems via a web application.


a. SQL injection attacks


b. XSS vulnerabilities


c. Authentication hijacking attacks


d. Command injection flaws

View Feedback



Question 8


1 / 1 point

A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key.


a. verification authority


b. certification authority


c. validation authority


d. registration authority

View Feedback



Question 9


1 / 1 point

Null sessions require access to TCP port __________.


a. 139


b. 141


c. 345


d. 349

View Feedback



Question 10


1 / 1 point

__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.


a. ODBC


b. SQLP


c. OSQL


d. SSRS

View Feedback



Question 11


1 / 1 point

The __________ file is used to determine which TTY devices the root user is allowed to log in to.


a. /usr/securetty


b. /etc/securetty


c. /var/securetty


d. /home/securetty

View Feedback



Question 12


1 / 1 point

__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.


a. CheckOK


b. SMTPCheck


c. SMTPMon


d. SLCheck

View Feedback



Question 13


1 / 1 point

__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device.


a. Bluebugging


b. Bluesnarfing


c. BTKeylogging


d. Blueprinting

View Feedback



 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Cybersecurity Planning

2023 A FINAL WRITTEN PROJECT Cybersecurity Planning and Management Creating Company E mail WIFI Internet Use Policies You | Assignment Collections

A.)   FINAL WRITTEN PROJECT

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

B.) If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now