PowerPoint Presentation and Survey

  

READ CAREFULLY!

PART 1: As a user support specialist, you may be asked to prepare a slideshow presentation for use in a training activity to an individual or a large group. Create a Slideshow of 10 slides explaining/training others how to develop professional FILE MANAGEMENT (using folders, what type of names for folders, files, where do they come from (one creates a file in PPT)         Use attractive background color (1 color or 1 main color as in a template where the following slides use that color plus other colors).

Use the writing guidelines in this chapter along with the material in Appendix C to prepare a slideshow presentation. (chapter and Appendix C are attached check them down below)

PART 2:   Create a MONKEY SURVEY with at least 5 questions. Go to SurveyMonkey.com and SIGN UP FREE. Follow its instructions. 

computer

 

Please read case studies II-3 and II-4.

Answer these questions about the case studies:
II-3:
1. Describe the benefits of data warehousing and business intelligence at Norfolk Southern.

2. What did the company do right that has led to the successful deployment of data
warehousing and business intelligence within Norfolk Southern?

3. What has promoted the spread or growth of data warehousing and business intelligence
within and across Norfolk Southern over time?
II-4:

1. Why didn’t the California Franchise Tax Board do this type of data mining in 1980 or
1990?

2. How well did managers at the Filing Compliance Bureau address technical challenges?

3. How well did managers at the Bureau address various political and social challenges?

Instructions: Double spaced- 9-10 pages.

Please answer the following questions with complete sentences, well-thought-out paragraphs, and supported by information from the pertinent chapters. Use the case studies themselves for material and any pertinent sections of the textbook to support your answers; online sources are acceptable. Anytime you use sources outside of the textbook, they must be cited appropriately. Textbook sources may be briefly cited with a simple page number (e.g. “ref. p.34”).

Requirements: 9-10

Research Project Assignment

Cybersecurity policy sets the standards of behavior for activities such as the encryption of email attachments and restrictions on the use of social media.

Now, create a cybersecurity policy for the use of Social Media at New England College for the faculty and Staff.

The Final Policy must be comprehensive and include all of the information described in “Creating a Successful Policy”

Note: 3 pages with intext citations and 3-4 references must needed.

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 10): List the three main approaches to database programming. What are the advantages and disadvantages of each approach?

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Executive Program Practical Connection Assignment

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

 Assignment: 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Questionnaire on Computer Security

 

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

response due 5/19

RESPOND TO THE POST BELOW ON HOW YOU FEEL AND COME UP WITH THREE QUESTIONS AS WELL.

 

“Large-scale denial-of-service (DoS) attacks”

For this discussion, I selected the malicious activity of denial-of-service (DoS) attacks. A DoS attack is a method of disrupting the functionality of an organization’s network or system (Morris, 2021). This is executed to prevent normal users from accessing the resources of that network, which places the network in a position where services are unavailable. A recent example of a large-scale DoS attack would be the attack targeting Amazon Web Services (AWS) in 2020. In this attack, advisories targeted a user through connectionless lightweight directory access protocol reflection (Nicholson, 2023). Essentially, leveraging external servers to significantly increase the amount of data being transmitted to the target’s IP address; upwards of 70 times (Nicholson, 2023). This specific attack greatly impacted AWS, as an example noting that the largest cloud provider can be attacked and rendered nonoperational, as this attack lasted for 72 hours.

The scalable solution is a specific countermeasure AWS put into place to counter DoS attacks. In configuring your virtual infrastructure to be scalable, your resources can expand when the demand increases and consolidate when the demand decreases. This is done dynamically, making for a proactive way of ensuring DoS attacks have a smaller window to target. An additional countermeasure would be configuring a web application firewall for cloud resources. This would enable a mechanism to monitor “good” versus “bad” traffic, thus limiting your attack surface. Overall, the ultimate countermeasure is planning and being proactive with expected behavior. If organizations can conduct analysis and establish what the baseline of traffic looks like, they will be able to get ahead of suspicious behavior and limit the potential for DoS attacks.

References:

Morris, E. (2021) Dos vs. ddos: Which attack is more dangerous and why?, Cybrary. Available at: https://www.cybrary.it/blog/dos-vs-ddos-which-attack-is-more-dangerous-and-why (Accessed: 15 May 2023).