cybersecurity

  

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Questions

In 500 words please answer below 2-3 lines for each Question.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO the UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM? 

Cryptocurrency Paper

 

Prepare a 3-5 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.

Points Possible: 75

book's observation ( web usability)

Observations, questions, comments about “Don’t make me think” by Steve Krug ( the book is attached) 

question must answer: 

1/  What have you learned so far that you didn’t already know?  

2/ What might you incorporate into your group project?

( two paragraph) less than a page 

Operational : 5 to 9

ATTTACH ALL THE QUESTIONES IN A WORD DOCUMENT

IN TEXT CITATIONS MUST

APA FORMAT MUST

You must have at least one course and one non-course scholarly/peer reviewed source in your initial posting. 

——————————————————————————————————————————————————————————————————–

1.

 don’t select face book, apple, select small companies 

Discussion (5)

Note : Make sure the company selected are unique 

[ The mode of entry a company chooses to enter international markets depends on a variety of factors including the nature of the company’s strategic objectives. 

Select a well-known company that competes in the international markets.

What was the company’s mode of entry?

What was the entry designed to achieve?

Finally identify two advantages and two disadvantages to the entry mode chosen by the company.

Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Your initial response to the discussion question should be 250 words. 

You must have at least one course (our Thompson Text) and one non-course scholarly/peer reviewed source in your initial posting. 

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post. ] – 250 words

———————————————————————————————————————————————————————————————-

2.

Assignment (5)

 

[ Modes of entry into an international market are the channels which organizations employ to gain entry to a new international market.

Within our Thompson (2020) text, read Chapter 7 Assurance of Learning Exercise #2 related to Walgreens’ mode(s) international market entry and respond to the following questions:

  • What was Walgreens’ entry strategy designed to achieve?
  • Why would this make sense for a company like Walgreens?
  • Provide two recommendations on what Walgreens might do differently going forward with their entry strategy? Make sure you support your recommendations?
  • Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be 350 words.
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.] – 350 words

———————————————————————————————————————-

3. 

 dont select facebook, apple, select small companies 

Discussion (6)

NOTE: Make sure you choose a company that has not been selected unique.

[Select a company of your choosing. In the event the company has the opportunity to diversify into other products or businesses of your choosing, would you opt to pursue related diversification, unrelated diversification, or a combination of both?

 Explain why? 

Identify one pro and one con associated with your choice(s) of diversification.

 Incorporate our coursework (Thompson text and other material) from this week into your post analysis.

Instructions to write :

Your initial response to the discussion question should be 250 words. 

You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting.

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.] 

– 250 words

————————————————————————————————————————————————————————————————————-

4. Assignment (6)

 dont select facebook, apple, select small companies 

Related Diversification. Related Diversification is the most popular distinction between the different types of diversification and is made with regard to how close the field of diversification is to the field of the existing business activities.

 Related Diversification occurs when a company adds to or expands its existing line of production or markets.

For this assignment, consider your own company or one that you know well.

 Assume your company opted to pursue a strategy of related diversification and respond to the following questions. 

  • What industries or product categories could if diversify into that would allow it to achieve economies of scale?
  • Identify at least two or three such industries or product categories?
  • Describe the specific kinds of cost savings that might accrue from entry into each?
  • Incorporate our coursework (Thompson text and other material) from this week into your above responses.

Submission Details/Instruction Details: 

  • Your analysis should be 350  words.
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.] 
  • – 350 words

——————————————————————————————————————————————————————————————

5.

 don’t select facebook, apple, select small companies 

Discussion 7

Research a recent ethics scandal using Danforth Library resources. Using our Thompson text and other course material around ethical considerations, discuss the following:

  1. Company background.
  2. Conditions that gave rise to the unethical business strategies and behavior.
  3. Overview of the costs to the company resulting from the company’s business ethics failure.
  4. Two ethical principle recommendations to put into practice and why.
  5. Again, incorporate our coursework (Thompson text and material) from this week into your initial post comments.

NOTE: Make sure you choose a company that has not been selected before

Your initial response to the discussion question should be 250 words. You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting. 

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.]

 – 250 words

—————————————————————————————————————————————————————————————————————

6.

 

Assignment (7)

[

 

Environmental sustainability is defined as responsible interaction with the environment to avoid depletion or degradation of natural resources and allow for long-term environmental quality. The practice of environmental sustainability helps to ensure that the needs of today’s population are met without jeopardizing the ability of future generations to meet their needs.

Within our Thompson text, read Chapter 9 Assurance of Learning Exercise #1 related to Dell.

Now, click on the website link provided in the learning exercise description from our Thompson text, which will provide you with information to respond to the following:

  • Prepare a list of 5 specific policies or programs that help Dell achieve its vision of driving social and environmental change while still remaining innovative and profitable.
  • Describe how Dell’s environmental sustainability strategies provide valuable social benefits?
  • Finally, explain how Dell’s strategies fulfill customer needs in a superior fashion while simultaneously sustaining competitive advantage?
  • Incorporate concepts from our coursework (Thompson text and other material) from this week into your above responses.

Submission Details: 

  • Your analysis should be 350 words.
  • Incorporate a minimum of at least one course and one non-course scholarly/peer reviewed source in your paper.
  • All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.] – 350 words

——————————————————————————————————————————

 7.

 

Written Assignment #8: Facebook’s Career Page

[

Facebook, Inc. is an American online social media and social networking service company based in Menlo Park, California. It was founded by Mark Zuckerberg along with other fellow Harvard College students. As of the end of 2018, the number of Facebook employees reached 35,587 full-time staff. It is considered one of the Big Four technology companies along with Amazon, Apple, and Google.

From our Thompson text, read Chapter 10 Assurance of Learning Exercise #3 related to Facebook’s Career page and click on the website link to provide you with information to use in your response to the following:

  • How do Facebook’s internal management training programs integrate the traits and stated goals on the Careers page into specific and tangible construction of employee capabilities?
  • How does the internal training prepare Facebook employees of all types to “move fast and break things”?
  • Incorporate information from our coursework (Thompson text and other material) this week into your assignment analysis of the above.

Submission Details: 

  • Your analysis should be 350 words
  • Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.

]

Total 350 words

 ——————————————————————————————————————————————————————————————————–

8.

 dont select facebook, apple, select small companies 

[

Week Eight Discussion: Decentralized vs Centralized Decision Making

How would you describe the organization of your company’s top-management team? Is some decision making decentralized and delegated to individual managers? If so, explain how the decentralization works. 

Or are decisions made more by consensus, with all co-managers having input? 

What do you see as the advantages and disadvantages of the decision-making approach your company is employing?  Be certain to incorporate our coursework (Thompson text and other material) from this week into your initial posting.

Your initial response to the discussion question should be 250  words. You must have at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your initial posting.

 Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.

] – 250 words

 ——————————————————————————————————————————————————————————————————–

9.

 dont select facebook, apple, select small companies 

[

 Week Nine Discussion: Information Systems and Effective Strategy Execution

Company strategies cannot be executed well without a number of support systems to carry on business operations.

Using the Danforth Library resources, search for recent (five years) articles that discuss how a company has used real-time information systems to aid the cause of effective strategy execution.

  Explain their use of the information and how it relates to our coursework from this week. 

 Based on our readings (Thompson text and other material) from this week, what one enhancement or addition would you recommend the company make and why?

NOTE: Make sure you choose a company that has not been selected for the rest of the companies.

Your initial response to the discussion question should be 250 words. You must have at least one course and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.

] – 250 words

 ——————————————————————————————————————————————————————————————————–

10.

Written Assignment #9: Allocating Resources

A company’s strategic priorities must drive how capital allocations are made and the size of each unit’s operating budget.
Using the Danforth’s library resources search for recent (most recent five years) articles that discuss how a company has revised its pattern of resource allocation and divisional budgets to support new strategic initiatives.

 How do the revisions fit within the context of the material we have covered in our coursework (Thompson text and other material) from this week?

Submission Details: 

Your analysis should be 350 words .

Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.  

All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced and proper in-text citations using APA guidelines.

]

– 350 words

Information Governance discussion 4

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.  Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

review the corresponding data set and use it to answer questions and complete an exploratory data analysis. You will use R and Excel to complete the assignment.

The second data set includes data about the customers of a telecom company, the services they subscribed to, and whether they left the company’s services. Multiple aspects of the customer’s behaviors could be analyzed using this dataset.

The data and the variable descriptions can be found at:

https://www.kaggle.com/blastchar/telco-customer-churn

Requirements:

Part I: Contextualization

In the Introductory section for Part 1 of your 4-5-page report, provide a contextualization of the dataset by doing the following:

Download the selected data set and review its description. Specify the selected dataset.

Summarize the story behind the data. Provide in-text and reference list citations of any outside sources that you consulted to contextualize the data collection efforts.

Explore the dataset. Explain the attributes of the entities.

Describe the data captured in the data set.

Summarize three observations from a cursory visual inspection of the data.

Part II: Research Questions

When data is collected, or even before collection starts, we have the purpose of the analysis in mind and plan accordingly. For an analysis to provide us with meaningful insight, we must plan it well and have a clear research question or questions in mind. The term “research” can sound scary, but it refers to a path to satisfying curiosity or resolving a problem. For Part II, which should be 2-3 pages, provide an analysis based on the background of the data sets:

Write three questions that this dataset can help answer.

Explain the importance of these questions in a business or other relevant context.

Identify the variables from the data set that are relevant to the questions.

Write a sample statement of outcome that your analysis may reveal.

Underline the words in these statements that refer to the variables identified in task prompt H.

Part III. Data Preparation and Distribution Analysis. Using an R script, please perform the following:

Identify the columns that hold the values of the variables you previously identified in the analysis of the research questions. Write R script to generate a subset of the given data. If the variable is categorical and the values are not numerical, transform the values into numerical values. For example, if the values of a column are ‘Y’ and ‘N’, use SQL to convert them to “0” and “1” respectively when generating the subset. That includes only the values for the selected variables and translate categorical values into numeric codes.

Write an R script for a query that provides insights into your research question.

Part IV. Reporting

Write a 250-word executive summary for members of the general public outlining the findings from your analysis.

Your well-written report should be 10-12 pages in length, not including the title or reference pages. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You will upload a zipped file that includes your 10-12-page report and all supporting files, including Word, R code and Excel files, and screenshots that support the presentation of the findings in the report.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

TCP/IP routing protocols

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

 – Title of Paper

 – Author

 – Class

 – Professor

* Introduction

* Body

 – Support Introduction 

 – Elements (see above)

 – History

 – Advantages/Dis-advantages

 – Two Programmable Parameters

 – How do they effect traffic flow

 – Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

 – Your Opinion of selected Routing Protocol

 – A Summary

 – Modern Day Usage