System Architecture & Authentication System

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components. 

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? 

What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? 

How about if we move the authentication system to a tier behind the DMZ, thus, a more trusted zone? 

What are the implications of doing so for authentication performance? For security?

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.
    4000 words 

Need help in homework

Business Process Design

If you have been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure. 

Should have :

Introduction

Body

Conclusion

Research Paper: DR Plan for an Organization

Research Project

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cybersecurity governance

Why do you think cybersecurity governance is important?

Think about the crisis in 2008; if banks did not have any regulation do you think that would have been a problem from a cybersecurity perspective? Would there have been further loss?

Cost Model

  

Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in 6 months for under $200,000.

Use the Cost Estimate template and Cost Baseline template to assist with this assignment.

Tasks

  • Prepare and upload a 1-page cost model for this project      using spreadsheet software. Use the following work breakdown structure      (WBS), and document your assumptions in preparing the cost model. Assume a      labor rate of $100 per hour for the project manager and $60 per hour for      other project team members. Assume that none of the work is outsourced,      labor costs for users are not included, and there are no additional      hardware costs. The total estimate should be $200,000.
  1. Project management
  2. Requirements definition
  3. Website design

        a. Registration for recreational programs

        b. Registration for classes and programs

        c. Tracking system

        d. Incentive system

  1. Website development

        a. Registration for recreational programs

        b. Registration for classes and programs

        c. Tracking system

        d. Incentive system

  1. Testing
  2. Training, rollout, and support
  • Using the cost model you created in the first task,      prepare a cost baseline by allocating the costs by WBS for each month of      the project.
  • Assume that you have completed 3 months of the project.      The BAC was $200,000 for this 6-month project. You can also make the      following assumptions:
  • PV=$120,000
  • EV=$100,000
  • AC=$90,000

a. What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?

b. Use the CPI to calculate the estimate at completion      (EAC) for this project. Is the project performing better or worse than      planned?

c. Use the SPI to estimate how long it will take to finish      this project.

After completing your charts, write a 150-word follow-up in which you complete the following:

  • Explain how the project is doing based on the CPI and      SPI. Is it ahead of schedule or behind? Is it under budget or over?
  • Describe the strategies or steps that should be taken      for human resource management to avoid additional costs.
  • Describe the strategies or steps that should be taken      for resource activity management to avoid additional costs.
  • Recommend 2 tools to support these strategies and      explain why these tools would be beneficial.

APA format! 

Research paper- Smart cities

Deadline: 1/14

Pages: 4-6

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Data Security Assignment

 

Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf

https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/