Explain how cookies can show that a user has visited a site if that user’s history has been deleted.
Use your own words. Attach your WORD document here.(200 to 300 words and add references)
Explain how cookies can show that a user has visited a site if that user’s history has been deleted.
Use your own words. Attach your WORD document here.(200 to 300 words and add references)
Software Deveolpment Matrix and an Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole enterprise after a cyberattack event.
Requirements: 9pages
Exp19_Excel_Ch05_Cap_Apartments
#Exp19_Excel_Ch05_Cap_Apartments
You manage several apartment complexes in Phoenix, Arizona. You created a dataset that lists details for each apartment complex, such as apartment number, including number of bedrooms, whether the unit is rented or vacant, the last remodel date, rent, and deposits. You will use the datasets to aggregate data to analyze the apartments at the complexes.
Start Excel. Download and open the file named Exp19_Excel_Ch05_Cap_Apartments.xlsx. Grader has automatically added your last name to the beginning of the filename.
Before subtotalling the data, you need to sort the data.
Select the Summary sheet. Sort the data by Apartment Complex in alphabetical order and further sort it by # Bed (the number of bedrooms) from smallest to largest.
You want to use the Subtotal feature to display the average total deposit by number of bedrooms for each apartment complex.
Use the Subtotal feature to insert subtotal rows by Apartment Complex to calculate the average Total Deposit. Add a second subtotal (without removing the first subtotal) by # Bed to calculate the average Total Deposit by the number of bedrooms.
Use the outline symbols to display only the subtotal rows. Create an automatic outline and collapse the outline above Total Deposit.
You want to create a PivotTable to determine the total monthly rental revenue for occupied apartments.
Display the Rentals sheet and create a blank PivotTable on a new worksheet to the left of the Rentals sheet. Change the name of the worksheet to Rental Revenue. Name the PivotTable Rental Revenue.
Display the Apartment Complex and # Bed fields in Rows and the Rental Price field as Values.
Format the Sum of Rental Price for Accounting Number Format with zero decimal places and enter the custom name Total Rent Collected.
Select the Occupied field for the filter and set the filter to Yes to display data for occupied apartments.
You want to calculate the total monthly rental revenue if the rates increase by 5% for the occupied apartments.
Insert a calculated field to multiply the Rental Price by 1.05. Change the name to New Rental Revenue. Apply Accounting Number Format with zero decimal places.
Select the range B3:C3 and apply these formats: wrap text, Align Right horizontal alignment, and 30 row height. Select column B and set 9.29 column width. Select column C and set 14.43 column width.
Apply Light Orange, Pivot Style Medium 10 to the PivotTable and display banded rows.
Insert a slicer for # Bed so that you can filter the dataset by number of bedrooms. Change the slicer caption to # of Bedrooms.
Change the slicer height to 1.4 inches and width to 1.75 inches. Apply Light Orange, Slicer Style Light 2. Cut the slicer and paste it in cell E2.
Insert a timeline for the Last Remodel field. Change the time period to YEARS. Apply Light Orange, Timeline Style Light 2. Change the timeline height to 1.4 inches and with to 3.75 inches.
The Databases sheet contains two tables. You will create a relationship between those tables.
Display the Databases sheet. Create a relationship between the APARTMENTS table using the Code field and the COMPLEX table using the Code field.
You want to create a PivotTable from the related tables.
Create a PivotTable using the data model on a new sheet. Change the sheet name to Bedrooms. Name the PivotTable BedroomData.
Select the Apartment Name field from the COMPLEX table for Rows, the # Bed field for Columns, and the # Bed field as Values. This will display the number of apartments with the specified number of bedrooms per apartment complex. Display the values as a percentage of row totals.
Create a Clustered Column PivotChart. Cut the chart and paste it in cell A13 using the Destination Theme.
Select the 3-bedroom data series and apply the Black, Text 1, Lighter 50% solid fill color. Apply Black, Text 1 font color to the vertical axis and category axis. Change the chart height to 3 inches and the width to 5 inches, if necessary. Hide the field buttons in the PivotChart.
Create a footer on all worksheets with your name in the left, the sheet name code in the center, and the file name code in the right.
Save and close Exp19_Excel_Ch05_Cap_Apartments.xlsx. Exit Excel. Submit the file as directed.
Business Case: Red Star National Hospital system has 4 hospitals (H1, H2, H3, and H4). They need your service to establish a new data communication Network.
The location of H1: Fairfax, VA
The location of H2: Dallas, TX
The location of H3: Los Angeles, CA
The location of H4: Columbus, OH
WIDE AREA NETWORK REQUIREMENTS (EXPECTATIONS)
EXTRANET DATA RATE REQUIREMENTS
Requested data speed from H1 to H2
10 Gbps
Requested data speed from H1-H3
8 Gbps
Requested data speed from H1-H4
80 Mbps
Requested data speed from H2-H3
12 Mbps
Requested data speed from H2-H4
2 Mbps
Your team will be developing the WAN network design. Prepare your recommendations by covering the following section.
Question 1 Draw the block diagram and clearly indicate the network topology you would prefer to connect all four Hospital sites. You may use USA Map to draw a network diagram. Download USA Map from the web, place the nodes on the map and then draw the topology. You must insert the picture of the WAN network diagram into your MS word document
Question 2 All four sites will have a 90Mbps connection to the internet. In the WAN diagram you developed in question 1, incorporate the connection to the internet and provide the new diagram. You must insert the second diagram/picture of the Network diagram into your MS word document
Question 3 What type of WAN service (s) would you recommend leasing for each connection to fulfill the Data Rates expectations? You should prepare a table and write WAN service for each connection among the hospital sites
Define the following Routing protocol: (10)
1. RIP
2. RIPv2
3. OSPF
4. IS-IS
5. EIGRP
6. BGP
Oveview Directions
Instructions
Write 1 thread of at least 250 words. You must support your assertions with at least 1 citation in current APA format. Acceptable sources include Cisco material, the Bible, and scholarly journals. You must also reply to the 2 threads below. Each reply must be at least 100 words.
Topic: Hierarchal Topology
Question/Prompt: At your workplace or school, research to determine 1–5 network devices in your hierarchal model. Create a simple network topology using Packet Tracer software. Place 1–5 devices at the appropriate levels of the Cisco three-layer hierarchical model design. The model must include:
If you are unable to do research at your workplace or school, or you do not have one to research, then create your own hierarchical model. Share your .pka in the Discussion Board Forum. Do you agree with the way the network is designed? If so, explain why. If not, state 1 way to improve the design and why you would make improvements.
Replies(100 words each)
Thread 1 Reply
Signal flow
From my understanding we are only a fraction of the pie. We do not have full access of the network we fall under. The hierarchy can be related to how the infantry is broken down to fire teams of 4. Yet in an a platoon theres about 100 people which means theres about 20 fire teams, creating 20 fire team leaders reporting to the Platoon Sgt who then reports to the Platoon Commander and then he passes it to the Company Commander etc. The purpose of having multiple bosses helps to not overload the main boss with meaningless questions or information not protaining to them. The way our network is design is to mitigate unnecessary mistakes made on the network, only affecting us at our level not disrupting the entire network enterprise. It also brings a sense of organization, structure, and management. If anyone has the proper (AAA) Authorization, Authentication, and Access to be in our domain to can be part of all broadcasting that may be informative to them. Also file sharing and the access to the share drive on lower networks can help not overload the pipeline to the higher echelon of the network. If you don’t have any business with management or the boss then just avoid it, communicate between those at your level and later with the proper authorities your message Will make it to Mr.CEO. The Hierarchical Model we use in the military could improve if there was a way to communicate with everyone that shares your Military Occupational Specialty, is the only improvement I would try to implement
Thread 2 Reply
Importance of Redundancy
Since I was not able to examine a network at school or work, I went to a small business owned by a family member to see what kind of setup they had. It turned out that only three employees worked there, so they only had a very simple point-to-point architecture that consisted of a modem, a router, and a switch (attached packet- “Office Hierarchy”). Because of the limited budget and needs, I believe this basic setup fulfilled their needs adequately. However, one of the downsides of this setup is that each device is a single point of failure. A key factor of network stability is implementing redundancy (Yeh & Fiondella, 2017). There is no device redundancy on this network. As such, I decided I would make a second diagram that implemented redundancy (“Three Tier Hierarchy”), even though realistically it would not be possible to implement in the business I examined. Another benefit that this setup provides is additional scalability if the company were to hire more employees. In its current state, this company only has one small switch, meaning the amount of traffic that can flow through is extremely limited, and it would be unwise to try to add a lot more users to this network. The high-capacity switches used in the “Three Tier” diagram would allow more users to easily connect in. Another way to identify that the smaller network is not scalable is not only to see if its hardware exceeds its userbase, but also to ask: If I were to expand my company, would I need to raze my entire network design and start over? In this case, the answer is yes—a significant size increase would mean that a fully different scalable topology, such as a virtual bus, would need to be created. The business could not function with its current topology. In conclusion, because the business has not grown in size for fifty years and is not planning to, I see no need for them to change anything; however, I would advise them to place a high priority on keeping their security up-to-date because of the vulnerability of the point-to-point network.
Overview:
For this assignment, write a two-page systems design paper on Sporting Goods. For example, if you chose “a cybersecurity system for a small company that has neglected computer security issues,” then discuss the details of a system that will meet the company’s security needs and requirements.
Instructions:
Design a system that will meet the needs and requirements of the Sporting Goods project. This must include recommendations on new hardware, new software, interfaces, data, new/revised procedures, and new/revised policies. Make sure to include the major tasks that are necessary to perform during a systems design process. A list of these tasks can be found in the System Design in Software Development (< Requirements: • Your systems design paper should be 2 pages in length, with additional cover and reference pages. • The summary should be double-spaced, written in 12-point Times New Roman font, and use a 1-inch margin. • Use at least two (2) scholarly sources in your assignment and include all references and citations properly formatted in APA. • Use complete sentences and appropriate grammar and spelling.
All the instructions are within the Task sheet and the resources are attached as a zip file.
Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors found that the majority of PBI’s operating units did not have specific plans in place to address data breaches and, in general, the company was deemed “not ready” to effectively prevent and/or respond to a major data breach. The insurance company has indicated that it will not renew PBI’s cyber insurance policy if PBI does not address this deficiency by putting an effective data breach response policy and plan in place. PBI’s executive leadership team has established an internal task force to address these problems and close the gaps because they know that the company cannot afford to have its cyber insurance policy cancelled.
Unfortunately, due to the sensitivity of the issues, no management interns will be allowed to shadow the task force members as they work on this high priority initiative. The Chief of Staff (CoS), however, is not one to let a good learning opportunity go to waste … especially for the management interns. Your assignment from the CoS is to review a set of news articles, legal opinions, and court documents for multiple data breaches that affected a competitor, Marriott International (Starwood Hotels division). After you have done so, the CoS has asked that you write a research report that can be shared with middle managers and senior staff to help them understand the problems and issues arising from legal actions taken against Marriott International in response to this data breach in one of its subsidiaries (Starwood Hotels).
1. Read / Review the readings for Weeks 1, 2, 3, and 4.
2. Research the types of insurance coverage that apply to data breaches. Pay attention to the security measures required by the insurance companies before they will grant coverage (“underwriting requirements”) and provisions for technical support from the insurer in the event of a breach. Here are three resources to help you get started.
b. https://www.travelers.com/cyber-insurance
c. https://wsandco.com/cyber-liability/cyber-basics/
3. Read / Review at least 3 of the following documents about the Marriott International / Starwood Hotels data breach and liability lawsuits.
a. https://www.insurancejournal.com/news/national/2018/12/03/510811.htm
c. https://www.bbc.com/news/technology-54748843
d. http://starwoodstag.wpengine.com/wp-content/uploads/2019/05/us-en_First-Response.pdf
e. https://www.consumer.ftc.gov/blog/2018/12/marriott-data-breach
4. Find and review at least one additional resource on your own that provides information about data breaches and/or best practices for preventing and responding to such incidents.
5. Using all of your readings, identify at least 5 best practices that you can recommend to Padgett-Beale’s leadership team as it works to improve its data breach response policy and plans.
Write a three to five (3-5) page report using your research. At a minimum, your report must include the following:
1. An introduction or overview of the problem (cyber insurance company’s audit findings regarding the company’s lack of readiness to respond to data breaches). This introduction should be suitable for an executive audience and should explain what cyber insurance is and why the company needs it.
2. An analysis section in which you discuss the following:
a. Specific types of data involved in the Starwood Hotels data breaches and the harm
b. Findings by government agencies / courts regarding actions Starwood Hotels / Marriott International should have taken
c. Findings by government agencies / courts regarding liability and penalties (fines) assessed against Marriott International.
3. A review of best practices which includes 5 or more specific recommendations that should be implemented as part of Padgett-Beale’s updated data breach response policy and plans. Your review should identify and discuss at least one best practice for each of the following areas: people, processes, policies and technologies. (This means that one of the four areas will have two recommendations for a total of 5.)
4. A closing section (summary) in which you summarize the issues and your recommendations for policies, processes, and/or technologies that Padgett-Beale, Inc. should implement.
Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)
1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own.
2. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use.
3. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
4. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).