Network traffic analysis

It is expected that your report will be in the region of 1500 words.

You are expected to conduct an analysis of this network packet capture— (will provide) using Wireshark. You are required to present your findings in a factual manner, to convince decision makers of a large corporation on business strategies.

Report

  1. Submit a two-page report that discusses the requirements of operating systems for use in embedded computers. Be sure to cite your sources.
  2. Submit a two-page report that discusses the advantages and disadvantages of cloud computing and the security risks involved. Be sure to cite your sources.

Power Point Presentation

Create a Power Point Presentation

 PIONEERS (  Tim Berners-Lee )  tell me about this person. What did this person do to become a pioneer? Did he/she invent something? What did they invent? What is the person doing now? What has this person accomplished? Be thorough with the subject. 

 PowerPoint Criteria For the PowerPoint you must:

 1- Research your subject 

2- Find photographs 

 3-  Your Presentation should not be your entire research assignment. o USE THE 7X7 RULE  7 lines per slide (maximum) 7 words per line (maximum) o This does not mean that all of your slides need to have 7 lines with 7 words .

Use key words and/or phrases to make your point o DO NOT crowd the slides with too much text or too many pictures 

 Use the NOTES Pages underneath each slide to include some information you are going to talk about if/when presenting in front of an audience. 

 The purpose of the presentation is to give details, information or teach about a subject. o You are NOT to read the slides 

 Be sure that ALL of your slides contain both text and pictures 

There should not be any slides with pictures only  

FORMAT the pictures/images that you’ve used 

 Be sure to include a slide transition 

Use the same transition throughout the presentation 

 DO NOT make the slides change automatically 

 Insert a Footer with Your Name and your Student ID number on all slides except the title slide 

 Be sure ti include a Works Cited slide with your video link at the END of the presentation. 

Use one of your images AS a background on one slide 

 Use shapes to enhance your presentation 

  DO NOT make the slides change automatically o The Presentation

 MUST have a minimum of 15 slides.  Slide 1: Title  Slides 2 – 14: Presentation  Slide 15: Work Cited, Links, Video Link and resources 

Discussion board

It has been said that the advantage that leading-edge retailers such as Target and Walmart have over their competition isn’t technology; it’s their management. 

Do you agree? Why or why not?

Include a reference to at least one online article to back up your argument. Additionally, please respond to at least one other student’s post.

the post i want to to respond to is “I think that this statement may have been very true in the past, and it may still be true for well-established companies like Walmart because they are not concerned with becoming leading-edge, as they have already been there for many years. However, I think that for many businesses, especially small and/or new businesses, technology is exceptionally important to get a leg up. For example, this summer, I worked for PayPal, and one of the internship programs I participated in was to partner with a Kiva (small) company to propose solutions to one of their business problems. Most of the Kiva companies PayPal partnered with, including the one I worked directly with, really struggled, especially now during COVID-19, with staying afloat, let alone thriving, in the shift to online shopping that is even more strong in the recent months than it was before. For companies like these, finding better ways to showcase their products, communicate with customers, and simply get their website to show up on search engine results are very important tasks to tackle in the present. Perhaps as companies grow in their success, the relative importance of management and technology may reach closer to an equal balance.

The following makes many points about tech in businesses, including marketing : https://smallbusiness.chron.com/information-technology-business-success-4019.html”

Exp19_Excel_Ch04_ML1_Pet_Supplies

  

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

2 Questions each on in separate document

Question 1:

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Readings:

https://www.youtube.com/watch?v=b6xplJbic6s

https://www.youtube.com/watch?v=k6JhhL2Kfdw

https://www.campuscommerce.com/new-pci-security-standards/

https://www.youtube.com/watch?v=ubeiOkXbWr4

Question 2: 

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Readings:

https://www.youtube.com/watch?v=i-HIXgjWd-E

Discussion

If you are using colours in your presentation, how do you choose effective colours that provide good differentiation between the visualizations within a presentation? 

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Impact of Mobile computing on Businesses

 Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Mobile Computing on Businesses. Your submission must include the following information in the following format:

ANALYSISUsing 750-800 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Need a project report and presentation

  

Using the internet, search for an enterprise company (i.e Amazon) that you feel follows this enterprise architecture and consider the implications of each function represented. For each function in this diagram, define the purpose and interaction with other function, give examples. Define and discuss credible attack surfaces for each function, if any. Does the function include interactions with third party systems? If so, should they be trusted at the same level as the internal systems. Discuss threat agents and what targets may be of interest.  

Conceptual Sample Enterprise Architecture (attached diagram): Representations of the business functions and their interrelationships.

Project Report:

  

•Report should be no less than 10 pages of content. 

•You need to include outside sources and properly cite and reference your sources. 

•You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. 

•In addition to the 10 pages of content, you will want a title page and a reference sheet. 

•Please ensure to use the proper APA citations.

Report format:

Title Page

Introduction of Company and brief background (Establish date, Location, what makes this company an enterprise, etc.)

Company Architecture (What exactly does this company do…)

Company Functions (define each function that relates to the company)

Function Integration (how/if the functions integrate with other functions)

Discuss Credible Attack Surfaces for the functions 

Discuss interactions with 3rd party systems and trust levels

Discuss Threat agents and targets

Your thoughts/improvements/gaps, etc.

Conclusion

References

attached-presentation format