Telecomm. Network Security project

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Assignment

 

4.1 Abstract of a Quantitative Research Article

Overview: The term “abstract” is a homophone which can mean one of two scholarly writing activities. One is the abstract that you will write to introduce your article. The other meaning is a shortened writing assignment whereby you write a condensed summary of an academic journal.  For this week, we will focus on writing a scholarly abstract of a quantitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.”Directions: View the rubric and examples to make sure you understand the expectations of this assignment.  Create a 1 page (more is fine) single-spaced Analysis of Research abstract published quantitative scholarly article related to your topic/research question from week 1. Additionally, this assignment functions just like assignment 2.1 only it reviews a quantitative article instead of a qualitative one. Brevity and being concise are important as this analysis is intended to be a brief summation of the research. Each abstract must therefore consist of the following in this order:

  1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
  2. Author Qualifications – name and qualification of each author conducting the research
  3. Research Concern – one paragraph summary of the reason for the overall research topic
  4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
  5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
  6. Research Methodology – description of the population, sample, and data gathering techniques used in the research
  7. Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
  8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Assignment

You will develop a word document to include:

  1. Your research question in the form of a quantitative question – 

This was my research question ( security of the personal information of health care system users – how to protect cyber threats to important personal health care information using AI.

2. Use any one of the instruments given in the sample attached document i.e, either a regular survey questionnaire or closed-ended survey or archival data that could be used to answer the quantitative version of your research question. 

Special note: for those using archival data, you will describe the process of data retrieval for your archival data. See examples to help. 

3. A one-paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the quantitative version of your research question.

See rubric for how the paper will be graded.

Enterprise Security Strategy Plan

 Enterprise Security Strategy Plan

Describe the company that will be the subject of your Enterprise Security Strategy Plan. Explain what the company does and provide an overall description of its infrastructure and the software it has in place. Discuss what the company has that it needs to secure.

Discussion 03

1.  Explain the behavior approach and 2 general kinds of behaviors.  What is the central purpose of the behavior approach?

2.  Does a leader’s motivation for adapting his/her leadership style have any effect on followers?  Explain.

You should post a follow-up response to at least one other classmate.

Please write a query

Please write a query to return a list of all product groups that are available in the US but have not sold any units.
Expected output columns: product_group

Data Science Tools

PART A 

Discussion

Importance of Programming

Write a short paragraph on the importance of programming in data analytics. Also, write the advantage of open source language like R over other licensed programming software.

Requirements for Discussion Assignments

Demonstrate integration of the required reading, other course materials, critical thinking, scholarly or peer-reviewed sources (as applicable), using either APA or MLA style, depending on the instructor/assignment specifications

PART B

Week – Assignment

 Introduction to R on DataQuest.com

There are two parts to this assignment:

1) Finish the first course Introduction to R on DataQuest.com. The main objective of this short course is to introduce the foundational concepts and the data structures in R. The course is divided into six missions, you are required to finish the below (which are free of cost)as follows:

  • Introduction to programming in R
  • Working with Vectors

The assignment is to take screenshots of the completion of the three missions, paste them in a word document and submit.

2) Open R-Studio on your computer and start a new script. Now type getwd() in the script and run it. Take the screenshot including the console screen that contains the version number and the working directory. Paste the screenshot in a word document and submit it.

 Here is the expected output for this task:

 Expected output for Week 1.docx Expected output for Week 1.docx – Alternative Formats  

Please note that all code assignments must be submitted as a screenshot with a slice of your desktop showing the timestamp.

If the time and date are not visible, you will be graded 0.Put the screenshots in a word document, make sure to comment the code (explain what it does)  and interpret the graph if applicable(explain what its depicting) 

Legal

 Answer each these questions in a paragraph with five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Develop a disaster recovery plan for an organization

 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.