Private Sector Organizations

 

Instructions

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

Journal Article: Decision Learning

Journal Article: Decision Learning

Your submission must include the following information in the following format: 

DEFINITION: a brief definition of the key term – (the definition should come from the article) 

SUMMARY: Summarize the article in your own words- this should be in the 150-words range. Be sure to note the article’s author, note their credentials, and why we should put any weight behind his/her opinions, research, or findings regarding the key term. 

DISCUSSION: Using 300-words, write a brief discussion, in your own words of how the article relates to the selected key term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts, and opinions. This is the most important part of the assignment. 

REFERENCE: The source for the analysis must be listed at the bottom of the submission – APA format required. Use only peer-reviewed journal articles for these assignments. Refrain from using blogs, .com’s, or other unreliable internet sources. Be sure to use the headers (Definition, Summary, Discussion, Reference) in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment. Further, any flagged documents will result in zero points for the assignment. Flagged documents mean that an attempt at plagiarism exists, or manipulation of the Turnitin process has been attempted. This is unacceptable conduct and will not be tolerated.

NOTE: All criteria (Definition, Summary, Discussion, Reference) for these assignments should be derived from the article that you select based on the key term. No other resource is required.

responding back to classmates

 

Social media can help you create opportunities and have a positive impact as well.  

Here are some examples of a positive social media impact. 

  • Social media can help you meet mentors to help guide your career or education goals. 
  • Social media can motivate you to strive for greatness. 
  • Social media can lead to more communication. 
  • Social media can be used to spread social awareness and kindness.  

Here are some negative social media impact. 

  • Inappropriate photos or messages could affect you getting a new job or promotion. 
  • Communication skills tend to be laxed on social media and does not demonstrate one’s ability to communicate effectively.  
  • Social media can cause an employer to question your professionalism. 

What can you do to make sure social media does not have a negative impact on your professional life? 

paraphrase 270 words

 The purpose of the virtual lab is to provide a hands-on learning experience of Wireshark and to analyze IP Protocols without compromising our own personal workstations or the workstations of others. The importance of this lab to cybersecurity is that, we as individuals who want to enter the profession of cybersecurity, knowing these protocols and getting familiar with their purpose is conducive to doing that job effectively. These tools are what makes a Cybersecurity Professional who they are. In this lab, we explored Wireshark and learned how to capture information between a source and a destination. The source can differ as you can see in my findings of frame 546 compared to frame 545. For Frame 546, the source was IntelCor while for Frame 545 the source was HonHaiPr, taking screenshots of both for reference. We learned how to identify a MAC address and what codes the IEEE assigns to a manufacturer which are the first 6 hexadecimal characters that are the representation of the source. This OUI (Organizationally Unique Identifier) is important cause it identifies the location of which the interaction occurred. We also got a glimpse of how to run a Command Prompt, though it was only to ping the IP address of the computer, it was nice start because it was the first time I have ever had the opportunity to do that. We also accessed the Flow Graph, in order to identify the handshake and the time that it occurred, between the IP Host and Google. Lastly, we used the Filter Box to filter out all DNS-related packets and screenshotted it for reference. 

Please provide turnitin report

unit 4 assignment

I need attached file to be completely paraphrased so that it shows less than 10% on turnitin.com report.

Please provide turnitin.com report with it.

Don’t worry about the references. 

Poject

 For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

title : Top Ten Recommendations for Securing Virtual Servers

  

Research Project 

1. Five sources annotated bibliography 

2. Slide presentation with 12 or more slides 

3. Summary or Abstract containing at least 750 words. 

The topic must be appropriate for the graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the  Research Databases available from the Danforth Library, not Google. 

https://libguides.nec.edu/az.php 

Proof of Concept Report

 

This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

  • Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
  • Address the topics listed in the Proof-of-Concept Report Template
  • Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
    • Start Lab page
    • AWS Management Console Name with your name visible from user drop-down
    • Task 1: Create Your VPC
    • Task 2: Create Additional Subnets
    • Task 3: Create a VPC Security Group
    • Task 4: Launch a Web Server Instance

How Will My Work Be Evaluated?

As a cloud professional tasked with developing a proof of concept for the companies cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.1.2: Describe the context surrounding the issue or problem.
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
  • 2.3.4: Address alternative viewpoints, perspectives, and methods.
  • 11.1.3: Install software.
  • 11.2.1: Configure technology according to stakeholder specifications and requirements.
  • 13.1.1: Create documentation appropriate to the stakeholder.