IT472 week 2

No more than 350 words 

DQ2:

  • During the analysis phase, the analyst determines the functional requirements for the
    new system. Explain what is meant by a functional requirement. What are two types of functional requirements? Give two examples of each. Also, explain what is meant by a nonfunctional requirement. What are the primary types of nonfunctional requirements? Give two examples of each. What role do nonfunctional requirements play in the project overall? 
  • Identify the different kinds of stakeholders and their contributions to requirements definition

Ensure you follow the rubric when responding to the DQ and provide good supporting rationale and references. You may record a mini presentation instead of typing your response.

Help2

IPsec and DNSSEC to enhance the protection of the domain. Note: IPsec is a security protocol that provides network-based authentication and confidentially between servers via a set of standards, while DNSSEC is a set of extensions that provide integrity to the DNS server to aid in deterring attackers from hijacking the DNS process.  

Using the above enterprise architecture scenario, which consists of different components (e.g., servers, clients, databases) with information that has various temporal and distribution constraints, networks, multiple sites, and trusted and untrusted clients, write a 500- to the 750-word summary, making sure to:

  1. Describe the appropriate cryptographic tools/algorithms/protocols that can be applied at various locations throughout that architecture in order to achieve a variety of goals.

  1. Define the purpose of IPsec (including the various modes, IKE, ESP vs AH, Windows firewall integration, and IPv6) and DNSSEC (relationship to PKI, DNS Zones, and trust anchors).

  1. Briefly describe what you accomplished from the procedures supplied, and how these protocols enhance the security of servers. Provide references to recent articles (less than a year old) that demonstrate the use and benefits of an organization that has implemented IPsec and DNSSEC.

  1. Describe the management challenges/tradeoffs associated with implementing various security controls and protocols in an enterprise network.

NOTE: Each question should be a heading

Cybersecurity

                                           

Discussion wk 14 Containment

View Containment strategies in the images (A, B, C).  Under what conditions would you use each of these strategies?  Why and for what outcome? 

IMAGE A

IMAGE B

IMAGE C

JUST ONE PAGE 

IT470 week 7

Week 7 discussion topic

Share and explain what is the point of virtualization? Also feel free to explain to add what devices or areas in the computer that are virtualized or how it is virtualized?

Feel free to share diagrams, small videos, or links that can help understanding the topic. Ask questions if you need help understanding anything.

not more than 350 words. use diagrams, videos etc. to help explain.

Grading Rubric for Discussion Board (attached)

The main response to the DQ must be loaded to UniCheck for Plagiarism validation. Find the loading folder under week 7.

Implementation of SQL

 An Insurance firm is implementing a Microsoft® SQL Server® database that will track customer information, policy information, and transaction histories. The biggest concern is providing access to the information each team needs. Sales representatives need to access customer information to better serve their clients. Claims representatives must access policy information to determine coverage. Supervisors would like to access transaction histories to monitor employee performance. Compliance officers often must gather different and varied information for various regulatory agencies. Mertel executives want to monitor key metrics stored in the database to gauge company performance. 1.   Based on tyour experience, and your research, respond to the following in a minimum of  200 words: (1) Describe what methods you would recommend that the insurance company will use to retrieve information from its databases and why do you recommend those methods?; (2) Discuss whether you would use a custom application or a more generic tool like SAP® BusinessObjects™ or Microsoft Excel; (3) Discuss if a team of analysts would be in charge of running reports and distributing the information; and (4) Discuss if the same approach work for all the users? Defend your recommendation. 2.   create a 700-word minimum – Database Administration and Data Governance Evaluate and assist company decision makers in understanding the importance of database administration and data governance in relation to building scalable and robust applications.

  • Describe how SQL constructs could be used to create data definition language (DDL) and data manipulation languages (DML).
  • Explain how the design would be checked from each role’s perspective, according to the information they require.
  • Use these roles as an example:
  • The administration team needs access to records and permission to update and enter new data.
  • The development teams need to write the expected transactions relatively easily, which might depend on the degree of normalization.
  • The application team needs access to any and all data to manage the interface.

 

Client Response Memo

 

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

How Will My Work Be Evaluated?

In writing a clear and concise memo in response to senior management queries, you are demonstrating your communication skills, technical expertise, and responsiveness to customer/client needs and concerns.  

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas. 
  • 2.3.2: Incorporate relevant evidence to support the position. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 
  • 12.3.2: Describe the implementation of controls. 
  • 12.4.1: Document how IT controls are monitored.