InfoSecLab: Hardening

 

Submit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:

  • Summary of the lab
  • Analysis of the activities performed in the lab and their importance to the course topics
  • How the lab relates to the course and current module topics
  • Related concepts from the module readings and lectures
  • At least one external reference
  • 1-3 pages in length
  • Proper APA formatting and citations
  • Minimum of 1-3 references are required
  • Screens shots are encouraged but should be included as an appendix and not part of the total page count.

Discuss in detail the stakeholder approach.

Discuss in detail the stakeholder approach.

This posting should be at least 250 words. Respond to at least one other student’s initial posting. Your primary posting can end with a “tag-line” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. Secondary responses should be substantial and well-meaning, between 100-125 words. Initial postings should comply with APA format. For secondary responses, APA is optional (but good practice). Grading for the initial and secondary responses is as follows: Initial Response up to 40 points; secondary response up to 10 points for a total of up to 50 points per week.

Please provide References and links and this should be in a genuine format absolutely no plagiarism 

31/p2

  • What is a security policy and why does an organization need a security policy?
  • What are criticisms of security policies?
  • What could be implemented to improve on the criticisms?

Need to go thru the attached research paper and answer below questions

  1. Problem statement: what kind of problem is presented by the authors and why this problem is important?
  2. Approach & Design: briefly describe the approach designed by the authors
  3. Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
  4. Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
  5. Conclusion: by your own judgement.

Apply: Control Assessment

 

Assignment Content

  1. You are the auditor in charge of the Gail Industries audit. It is your responsibility to prepare a control table that will be used to evaluate all controls and the associated policies and processes for the company. Provide information for an accurate review of the monitoring that protects the areas within the control.

    Read the Gail Industries Case Study.

    Create a table that lists the 8 controls from the Gail Industries case study. Determine the applicability of each control based on the elements provided. Identify how the control (e.g., door security, entry log file) functions in the case study. Support the applicability of the controls to perform the tasks assigned with at least 2 outside sources to validate the controls. 

    Format your citations according to APA guidelines.

    Submit your assignment.

computer networks project

5G Network  research project 

Advantages and Disadvantages of 5G network

purpose of 5G

Important  of 5G

function of 5G

most prove with primary and secondary resource 

Discussion 1 Proj risk

 Chapter 1: IntroductionsChapter 2: An Overview of RiskChapter 3: Projects and Project StakeholdersInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What are examples of project risks?
  2. How do you identify risks in a project?
  3. What are the 4 risk strategies for risk remediation?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

Text-

 

Title: Managing Project Risks; 464 Pages

ISBN: 978-1-119-48975-7

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards

Publisher: Wiley-Blackwell

Publication Date: 2019

Packet Tracer & Discussion 1 [43]

InstructionsWrite 1 thread of at least 250 words. You must support your  assertions with at least 1 citation in current APA format. Acceptable  sources include Cisco material, the Bible, and scholarly journals. You  must also reply to the 2 threads below. Each reply must be at  least 100 words. Topic: Hierarchal TopologyQuestion/Prompt: At your workplace or school,  research to determine 1–5 network devices in your hierarchal model.  Create a simple network topology using Packet Tracer software. Place 1–5  devices at the appropriate levels of the Cisco three-layer hierarchical  model design. The model must include:

  1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
  2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
  3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you  do not have one to research, then create your own hierarchical model.  Share your .pka in the Discussion Board Forum. Do you agree with the way  the network is designed? If so, explain why. If not, state 1 way to  improve the design and why you would make improvements. Replies(100 words each)Thread 1 Reply  Signal flow        From my understanding we are only a fraction of the pie. We do not  have full access of the network we fall under. The hierarchy can be  related to how the infantry is broken down to fire teams of 4. Yet in an  a platoon theres about 100 people which means theres about 20 fire  teams, creating 20 fire team leaders reporting to the Platoon Sgt who  then reports to the Platoon Commander and then he passes it to the  Company Commander etc. The purpose of having multiple bosses helps to  not overload the main boss with meaningless questions or information not  protaining to them. The way our network is design is to  mitigate unnecessary mistakes made on the network, only affecting us at  our level not disrupting the entire network enterprise.  It also brings a  sense of organization, structure, and management. If anyone has the  proper (AAA) Authorization, Authentication, and Access to be in our  domain to can be part of all broadcasting that may be informative to  them. Also file sharing and the access to the share drive on lower  networks can help not overload the pipeline to the higher echelon of the  network. If you don’t have any business with management or the boss  then just avoid it, communicate between those at your level and later  with the proper authorities your message Will make it to Mr.CEO. The  Hierarchical Model we use in the military could improve if there was a  way to communicate with everyone that shares your Military Occupational  Specialty, is the only improvement I would try to implement Thread 2 Reply  Importance of Redundancy        Since  I was not able to examine a network at school or work, I went to a  small business owned by a family member to see what kind of setup they  had. It turned out that only three employees worked there, so they only  had a very simple point-to-point architecture that consisted of a modem,  a router, and a switch (attached packet- “Office Hierarchy”). Because  of the limited budget and needs, I believe this basic setup fulfilled  their needs adequately. However, one of the downsides of this setup is  that each device is a single point of failure. A key factor of network  stability is implementing redundancy (Yeh & Fiondella, 2017). There  is no device redundancy on this network. As such, I decided I would make  a second diagram that implemented redundancy (“Three Tier Hierarchy”),  even though realistically it would not be possible to implement in the  business I examined. Another benefit that this setup provides is  additional scalability if the company were to hire more employees. In  its current state, this company only has one small switch, meaning the  amount of traffic that can flow through is extremely limited, and it  would be unwise to try to add a lot more users to this network. The  high-capacity switches used in the “Three Tier” diagram would allow more  users to easily connect in. Another way to identify that the smaller  network is not scalable is not only to see if its hardware exceeds its  userbase, but also to ask: If I were to expand my company, would I need  to raze my entire network design and start over? In this case, the  answer is yes—a significant size increase would mean that a fully  different scalable topology, such as a virtual bus, would need to be  created. The business could not function with its current topology. In  conclusion, because the business has not grown in size for fifty years  and is not planning to, I see no need for them to change anything;  however, I would advise them to place a high priority on keeping their  security up-to-date because of the vulnerability of the point-to-point  network.