Final Project: Design with Focus on Business Continuity Assignment

  

Overview

This phase of the project completes the design phase and develops a business continuity and disaster recovery plan for the final solution. This phase of the project must include the secured design diagrams that minimize risk and appropriately address the threats identified in Project 1: Problem Identification Assignment. Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Any single points of failure must be addressed with appropriate fault-tolerant designs. Solutions must parallel the analyzed solutions. For example, if vulnerability was determined between 2 network gateways, a solution could include a virtual private network (VPN) with appropriate public key infrastructure (PKI) and certificates. If a man-in-the-middle network attack is a threat, Dynamic ARP Inspection and DHCP Snooping features on networking equipment can be indicated in the network design diagram to prevent these attacks.

Instructions

Each design must be justified by the textbook and peer-reviewed research. You will be evaluated based upon the appropriate security solutions to the identified problem. The final design must seek to construct the appropriate controls for the target given various, regularly used vulnerabilities. For example, if the target is availability and the vulnerability is connection flooding (e.g. SYN flood), appropriately designed solutions would likely include the minimum controls of an intrusion detection system (IDS), firewall, access control list (ACL) on the border gateway/router, and a honeypot to counteract unauthorized attempts. A design diagram must properly illustrate this secured solution, and the author must subsequently explain each dimension of the security strategy.

Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.

At the minimum, this phase of the project must include:

I. Executive summary and introduction

II. Systems Design

a. Detail the final systems design, supporting the results given the original review of the literature and the analysis performed in Project 2: Methodology Development Analysis Assignment

b. Design the final solution

i. Target of the attack

ii. Vulnerability

iii. Control

c. Create the appropriate design diagrams for the secured solution

d. NOTE: Required minimum length (8 peer-reviewed sources and at least 10 double-spaced, current APA-formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements

III. Business continuity and disaster recovery plan (must be supported by relevant and current research from scholarly, peer-reviewed journals)

a. Basic BCP Policy

b. Basic business impact analysis (BIA)

c. Preventative measures

d. Recovery and restoration

IV. Project conclusion

a. Summary of the solution

b. Future recommendations and implications for business

c. Final project conclusion

V. Diagram examples in this phase could include but are not limited to:

a. Secured and hardened advanced system and/or network architecture diagrams

b. Secured package, design class, system security, and system control diagrams

c. Secured CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings

d. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram, add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Project 1: Problem Identification Assignment

Threats from “distributed denial of service attacks” – include semantic attacks and brute force attacks. And also Man in the middle attack from include semantic attacks and brute force attacks.

Project 2: Methodology Development Analysis Assignment – Communication and interoperability with existing networks must be protected by the NGN’s security architecture NEXT GENERATION NETWORK (NGN)

discussion

 Dependencies and Normalization
Discuss the impact of dependency diagrams on the process of normalization of database tables. Provide examples of the violations of 1NF, 2NF, and 3NF. Minimum 300 words

 
Textbook:

Printed Textbook: Database Systems: Design, Implementation, and Management, 13th
edition, Coronel and Morris.  

Excel_5E_Law_Schedule

Excel_5E_Law_Schedule

  

Project Description:

In this project, you will manage a large worksheet and work on two workbooks at the same time. You will also add a hyperlink to your workbook.

     

Start Excel. Download, save, and   open the workbook named Student_Excel_5E_Law_Schedule_as.xlsx.   

 

Go to cell M50, and then insert   a COUNTIF function to count the number of unassigned (Staff) judges. In cell   K50, type Events with Unassigned Judges

 

Move to cell A1. Open the   downloaded file e05E_Judge_Requests.xlsx.   Switch windows, and then make your Student_Excel_5A_Law_Schedule_as file the active window. Arrange your two   files horizontally.
 

  Mac users, do not open the file, or if you have opened the 05E_Judge_Requests workbook, close the   file. In your 5E_Law_Schedule file,   click cell M3, type George Gates and then make cell A1 the active cell. Skip step   4, and then continue with step 5.

 

In the Student_Excel_5E_Law_Schedule_as workbook, go to cell A51, split   the window horizontally, and then click in any cell above the split in column   C. Use Find to locate the first Event # request from the e05E_Judge_Requests worksheet, and then type George Gates in the appropriate cell in the Student_Excel_5E_Law_Schedule_as   workbook to assign him as the Judge. Close the Find and Replace dialog box,   and then close the e05E_Judge_Requests worksheet. Maximize your   Student_Excel_5E_Law_Schedule_as worksheet, and then remove the Split.

 

Insert a new blank row 1. In   cell A1, type Schedule of Academic Events with Unassigned Judges and then Merge & Center the   title across the range A1:M1. Apply the Title cell style.

 

Create a New Table Style named Academic Team   Schedule.   Format the First Row Stripe using the Fill tab and in the sixth column, click   the third color. Format the Second Row Stripe using the sixth column, fifth   color. Format the Header Row using the eighth column, first color. Set as the   default table style for this document.

 

Select the range A2:M49 and apply the Custom table   style—Academic Team Schedule.

 

Autofit columns A:M. Set the   orientation to Landscape, set the Width to 1 page, center the worksheet   Horizontally. Insert a footer with the file name in the left section and page   number in the right section. 

 

Add a page break on page 1 after   row 40. Repeat row 2 at the top of each page.

 

Insert a hyperlink in cell J2 to   the downloaded e05E_Academic_Coaches.xlsx   workbook. Change the ScreenTip to read Click here for contact information and then test your hyperlink.   Close the e05E_Academic_Coaches.xlsx workbook.

 

Save your workbook and then   close Excel. Submit the workbook as directed.

Discussion 300 words

 

Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process.

remove space after paragraph option

Consulting skills Unit 1 memo

 

The product of this Assignment will prove that you are able to use professional language, identify conversational speech, effectively handle ethical concerns, format a professional memo, and use advanced features of Microsoft Word.

Assignment 1 Instructions

There are two Assignments this week. The first one will present you to some scenario where ethical violations were made by a couple of employees. The assignment includes practice in proper communication and formatting, with content relating to ethics, which are all important parts of the IT Consultant’s job. The second Assignment will send you to the Internet for researching about Cloud Computing and how the technology and services can help advance organizational goals

Content

Scenario

You are the lead consultant for an IT consulting firm that specializes in software. Pearson Waters, Inc. is a large, national company that offers property and casualty insurance to businesses and individuals. Your consulting team was hired by Pearson Waters to investigate the possibility of specialized productivity software for their employees to use in storing and retrieving customer data and product details, as well as performing various estimates to show to customers. After researching options, the company approved the design of a new software package, which your team has just now completed.

While you are wrapping up the project, you make some shocking discoveries:

  • Some of the programming code completed by your team was actually copied from another company’s proprietary software.
  • Two images used in the Employee Instruction Booklet were randomly found on the Internet, and no permission was secured for their use.

These are clear ethics violations. To rectify the situation, you were forced to fire the programmer who stole the code, hire another programmer to ethically rewrite that part of the software package, reprimand the employee who stole the images, locate alternative images for which permission was granted, and reprint the Employee Instruction Booklet.

Write a memo to your team about the above situation. Follow all instructions below and make sure you have also completed the unit reading:

  • Your wording must be professional: give facts, explain ramifications, and refrain from emotional writing.
  • Do not name the guilty employees or even specify their jobs; the idea is to explain the situation, not to write anything that could leave you open to a future lawsuit.
  • The length of the body of your memo must be no less than 250 words and no more than 350 words.
  • Do notuse sources – this must be written entirely in your own words without reference to any sources or quotes.
  • Organize your memo to include separate paragraphsfor each of the following:
    • Briefly explain the issues that were found
    • Explain how the issues were resolved
    • Explain how these issues affect the client
    • Explain how these issues affect your company
  • Follow the “deductive” method of writing, with most important information at the beginningof each paragraph.
  • Write with full sentences, and do not include any lists.
  • Your memo’s format must follow the instructions given below. You will therefore be responsible for the formatting; Assignments submitted on ready-made templates will notbe accepted.

Assignment Requirements

Memo formatting (Required)

A memo is a method of communication used within a company to share important information between coworkers or from administrators to employees, etc. While they can be several pages long, memos can also be rather short.

The formatting of a memo and the organization of its contents are not like college papers. When you do your Assignment for this unit, use these instructions to create a memo starting in a new, clean Word document:

  • Initial set-up:
    • Make sure margins are 1″ on all sides.
    • Set your document for single spacing.

      For the best control over blank lines in your document, you may wish to set the document for 1.0 line spacing and remove space before and after paragraphs:remove space after paragraph option

    • With the exception of the word “Memo” (see below), use only Times New Roman font size 12 or Arial font size 10 or 12.
    • Use left-alignment for the entire memo.
  • The heading:
    • Type the word Memo at the top. Press the enter key twice.
  • The address block:
    • Click on the ruler at 1″ to set tabs.
    • Type To: and press the tab key. Type the name of the person or group for whom this memo is intended.
    • On the next line, type From: and press the tab key. Type your name.
    • On the next line, type Date: and press the tab key. Type the date.
    • On the next line, type Re: (this means “Regarding”) and press the tab key. Type a short phrase to provide a descriptive of title for your memo.
    • You can make the headings To: From: Date: and Re: bold if you wish, but do not make any other content bold.
    • Press the enter key twice. Type three hyphens ( – ) and press the enter key. A line should now appear across your document. Press the enter key again.
    • You can remove the tab marker on the ruler by clicking and dragging it away.
  • The body:
    • Type the paragraphs for your memo.
      • Write in full sentences.
      • Each paragraph should begin with the most important information, followed by details. This is called “deductive” writing.
      • Since the idea is to get to your point rather quickly, most memo paragraphs tend to be short 4–7 lines long.
    • Provide a blank line between paragraphs.
    • Do not write a salutation (“Dear Joe”).
    • Do not sign the memo.
    • Do not indent paragraphs; memos are in “block style.”
    • For one-page memos such as our Assignment this week, do not use any subheadings.
  • Final formatting:
    • Return to the word Memo and make it larger and heavier than the rest of the memo. Recommended: Arial Black font size 24.
    • You can double space (or use 1.5 spacing) for the address block if you wish.

memo example

Advanced use of Word (Required)

To show an understanding of your communication vehicle (Microsoft Word), you must also include the following in your memo. Both track changes and comments are found on the Review ribbon.

  • Write just one phrase in your memo that would be considered “conversational.” If you are unsure what this means, use a search engine to learn more about conversational speech and clichés.
  • Then highlight the conversational phrase, click on the track changes button in the Review ribbon, and type a more appropriate wording. Your Assignment will show the “mistake” as well as the correction. An example:

    track changes example

  • Highlight the date in your heading and then click on “New Comment” in the Review ribbon. In the resulting comment bubble, type the following message (presumably to your administrative assistant): When should we send this? Example:

    word comment example

    For more information on APA style formatting, go to APA Style Central under Academic Resources of this course or visit the Writing Center.

    Also review the university policy on plagiarism. If you have any questions, please contact your professor.

For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

it470 week 6

 

Week 6 – Discussion 6

Discuss the following…

A) What current dedicated networks are there? Does anyone know how much it cost?

B) Can someone search when to use ring, mesh, star (pick one)? when to use what?

Do not forget to comment on another colleagues answer. Or feel free to ask the class a question. Also, you do not have to write page and pages a 350 words answer 

Feel free to show diagrams or videos or animation to help others understand.

Please name your file

  

Please name your file “Firstname Lastname Homework 09.pdf” (see below for more details).

IMPORTANT: Remember that I encourage you to work in groups, but each student must submit his/her own homework. Every student’s homework assignment should look significantly different from all other students (i.e., each student’s work should be a representation of their own work).

Solve the following problems in Matlab. Please use the Snipping Tool (Start menu → Snipping Tool) to document your input/output in Matlab. Paste the snips into a Microsoft Word (.doc or .docx) file or a Google doc but your final product must be a .pdf file! MS Word and Google Docs can both produce .pdf files (Google this if you don’t know how!). Fully show all input and output in Matlab, sufficient to explain/show how you arrive at an answer for each problem. You may also wish to add text commentary in your file.

The file upload for this assignment must be a .pdf file (no other file extensions will be accepted – this is to preserve the formatting of figures and code).

1. The wind chill factor (Twc, °C) is given as a function of ambient temperature (Ta, °C) and wind speed (V, km/h):

Twc = 13.12 + 0.62157. – 11.3770.16 + 0.39657,70.16

Create an m-file called windchill that can be run and a table of wind chill factors will be displayed. You should use ambient temperatures between 0°C and 40°C in increments of 10°C and velocities from 0

km/h to 40 km/h in increments of 5 km/h in your table.

This is what you are trying to create:

>> windchill

-4.4162

7.9141

2.03

6295

13.1200

19.3350

25.5500

31.7650

37.9800

-1.5894

9.7551

21.0997

32.4442

43.7887

-3.3147

3.6315

20.5777

32.5239

44.4700

20.2

4

-5.2422 -5.9097 -6.4730

7.3761 6.9415 6.5746

19.9945 19.7926 19.6221

32.612932.643732.6697

45.2312 45.4948 45.7172

-6.9622

6.2560

19.4741

32.6923

45.9104

Non

-7.3959

5.9735

19.3429

32.7123

46.0817

32.5747

44.9050

(HINT: See the screencast “Vectorization in Matlab, Part 1”.)

2. We have a vertical tank that has a hemispherical bottom, hemispherical top, and cylindrical middle section (see diagram on the next page).

a. Create a user-defined function in Matlab called “tank(R,H,d)” that will calculate the volume in the tank as a function of the tank radius (R), tank height (H), and depth of fluid in the tank (d). The piecewise functions that follow will allow one to calculate the volume as a function of d.

b. In Matlab, make a single plot of volume (V) as a function of depth (d) ranging from 0 to H for one 

scenario of your choosing (e.g., R = 1 and H = 3). The plot must be color-coded based on the piecewise function: the first part (d

3. A pint glass has the following dimensions (see below). Use Matlab (document each step of your work!) to determine the difference in depth between when the glass contains 16 oz. and when the glass contains 12 oz. This is a somewhat open-ended, “real world” engineering problem that will require you to think outside the box, perform unit conversions, and use solving functions.

16

H

= 5.5″

75

HINT #1: The volume of a container like this can be thought of as a smaller cone subtracted from a larger cone. If you don’t know the volume of a cone, Google it!

HINT #2: I would recommend coming up with a function of volume in terms of depth:

Homework #9

Page 3

V = f(h)

then you can set that function equal to 12 oz. [f(h) = 12 oz.), redefine a new function, g(h), that is

formed by subtracting 12 oz. from both sides [9(h) = f(h) – 12), then use a solving function to find the zero of g(h), which is the depth at which the volume is 12 oz. Do something similar for 16 oz.,

then compare the two depths. Easy, peasy!

HINT #3: Your function above will most likely involve trigonometry (similar triangles)!

HINT #4: I guess I’ll give you some hints on the trigonometry part:

HTh This is the pint glass portion

H +a

Some equations we can set up, using similar triangles:

A) a Hua

=?b a= H(rb/rt) 1-rb/rt

B) = 1

+b = “hta) TE

h+a Hua

Hta a and b are just intermediates and should not appear in your final volume equation. On Canvas I have a file called “pintglasssymbolics.m” and you can download and complete it to find a final volume equation in terms of h, H, Tt, and th, and you can use the resulting expression in your calculations above.

It is important to document your process/solution with text, explaining the steps and

showing the code for how you determine your final answer (difference in depths for 12

OZ. Vs. 16 oz. of fluid in the glass).

Problem definition

  

Assignment 2 CMIS102 Homework 

Problem definition: Calculate the total price to purchase all the components required to build a state-of-the-art gaming computer from components available on the internet. 

A. Problem Analysis – Following the directions in the assignment, clearly write up your problem analysis in this section. 

B. Program Design – Following the directions in the assignment, clearly write up your problem design in this section and comment your pseudocode. 

// Gaming Computer Price Computation

// Programmer: Ese Jessa

// University of Maryland University College

// Version 2.5 – November 11, 2012

// This program computes the total cost, including shipping and handling to purchase

// different computer components required to build a state-of-the-art gaming computer.

// Variables used CPU(choice_CPU), Case(choice_Case), Power Supply(choice_Power), 

// Motherboard(choice_MB), Hard Drive(choice_HD), RAM(choice_RAM), 

// DVD(choice_DVD), Sound Card(choice_SC), Monitor(choice_Monitor), 

// Graphic Card(choice_GC), Operating System(choice_OS

// Declare the variables

C. Program Comments and Test Data – Following the directions in the assignment, include your test data and expected results in this section.

Table 1. Include your test data table here

Abbrivations of Computer components:

CPU (CPU) 

Case (Case)

Power Supply (Power)

Motherboard (MB)

Hard Drive (HD)

RAM (RAM)

DVD (DVD) 

Sound Card (SC)

Monitor (Monitor)

Graphic Card (GC)

Operating System (OS)