Executive Summary

 You are a member of the IT team at Don & Associates, a financial  consulting company that provides services to small- and medium-sized  companies. Because the company is looking to expand into neighboring  states within the Northeast region, its leaders have tasked you  with determining if cloud computing is a viable solution to the need for  infrastructure.

 

you will be submitting a one- to two-page executive summary to the  owner of Don & Associates. It should briefly explain the major cloud  service providers, cloud computing service models, and the potential  benefits and risks of migrating Don & Associates’ technical  infrastructure to the cloud.

Use this executive summary template. In  the template, you will see specific instructions in the document.  Delete the instruction text before you submit your project.

Your summary should include: 

  • the types of cloud computing (private, public, hybrid)
     
  • three major cloud service providers
     
  • three cloud computing service models 
     
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud
     

Be sure to cite any sources you use.

Template

  

Project Description

Include the name of the project here.

Statement of Need 

Explain what the company is struggling with and how the company could benefit from moving to the cloud.

Cloud Service Providers

Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.

Recommended Plan

Provide your recommendation for a cloud service provider and justify your selection.

Impact of Recommended Plan 

Describe how your recommended plan will address the needs of the stakeholders. Briefly describe the potential risks of migration/potential drawbacks for the company.

References

Assignment and Discussion

 

Week 8 – Discussion

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.

Writing Assignment – WK 8

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

 

Task 3 Do Homework

  • 8.1 What is the difference between RFC 5321 and RFC 5322?
  • 8.2 What are the SMTP and MIME standards?
  • 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 8.4 Briefly explain base64 encoding.
  • 8.5 Why is base64 conversion useful for an e-mail application?
  • 8.6 What is S/MIME?
  • 8.7 What are the four principal services provided by S/MIME?
  • 8.8 What is the utility of a detached signature?
  • 8.9 What is DKIM?

Discussion:

 In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information.  How can a network administrator prevent this type of attach from happening? 

5 details that should be included in your cloud SLA.

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Final Exam

 

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

Why is Happy Wheels shutting down?

Happy Wheels – one of the most interactive games and the most played online free web browser-based game of all time.

The game is best known for its graphic violence and features several player characters, who use different, sometimes atypical, vehicles to traverse the game’s many levels. 

Happy Wheels is a side-scrolling, physics-based, there is a dark and tricky physics-based puzzling arcade game that is fun for some and horrifying for others. 

Features: over 60 unique and challenging levels, deadly obstacles: spikes, mines, wrecking balls, harpoons, and much more, smooth, realistic physics…

How To Play

Use arrow keys to move.

Use the space key to primary action (after ejecting: Grab).

Use Shift/Ctrl to perform secondary actions.

Use Z to eject.

Tips and Tricks

You can pause/resume/restart on the game screen.

You can change character in-game.

You can view/save your replay.

  

Update Happy Wheels apk online.

Assignment

 Discussion #1: Compare the IoT with regular Internet.

 Discussion #2: Discuss the potential impact of autonomous vehicles on our lives. 

 Discussion #3: Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

Discus7-350 words

Research the ethical issues of self-driving cars and offer opinions based on findings.

Note:

need proper APA format

reference