Physical access security

Week 6 Assignment – Physical Access Security

Introduction

In this assignment, you will search the Web to identify incidents of current physical security breaches, analyze each incident, and identify best practices that could have been used to prevent the attacks.The specific course learning outcome associated with this assignment is:

  • Research examples of physical security breaches.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you analyze two physical security breaches.Using either the Wall Street Journal or U.S. Newsstream, search for the term “physical security breach.” Select two news articles on the search topic that were posted within the last six months.

Article 1
  • Summarize, concisely, the key details of the physical security breach described in Article 1. 
    • Include the date of the attack, the type of attack, who or what was affected, and any reported loss of revenue or personally identifiable information (PII).
    • Provide a screenshot that includes the article’s name and the date it was published, along with a valid URL.
  • Describe, clearly and accurately, the steps described in Article 1 that were taken, or are being taken, to alleviate the effects of the breach after the fact or to resolve the issue.
  • Explain whether the physical security breach described in Article 1 was preventable, why or why not, and if preventable, what preventive steps could have been taken. 
    • Note: These are steps that would have prevented the security breach from having occurred in the first place, not mitigation steps taken after the breach has already occurred.
  • Describe the physical access security best practices that could have been used to prevent the breach described in Article 1, citing specific, credible sources of best practices.
Article 2
  • Summarize, concisely, the key details of the physical security breach described in Article 2. 
    • Include the date of the attack, the type of attack, who or what was affected, and any reported loss of revenue or personally identifiable information (PII).
    • Provide a screenshot that includes the article’s name and the date it was published, along with a valid URL.
  • Describe, clearly and accurately, the steps described in Article 2 that were taken, or are being taken, to alleviate the effects of the breach after the fact or to resolve the issue.
  • Explain whether the physical security breach described in Article 2 was preventable, why or why not, and if preventable, what preventive steps could have been taken. 
    • Note: These are steps that would have prevented the security breach from having occurred in the first place, not mitigation steps taken after the breach has already occurred.
  • Describe the physical access security best practices that could have been used to prevent the breach described in Article 2, citing specific, credible sources of best practices.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence. 
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.

Se943 week 1 Di

What is the most important difference between generic software product development and custom software development? What might this mean in practice for users of generic software products?

Comments to 2 classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality learning environment through which you improve your knowledge and understanding of the subject matter.

Machine Learning Model Training, Evaluation and Deployment

 

Assignment 3 B: Machine Learning Model Training 2 

• Two multi-part, multiple-choice questions. with short answer questions

•  AI in Healthcare with Phase 3 data set from (HTML file)

• Details of the Q1 & Q2 m/c questions and short answer questions are shown in the attached question sheet

• Lecture notes on Machine Learning in Healthcare for your reference

Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

Access Chapter 4 Mid-Level 2 – Benefit Auction

Exp19 Access Ch04 ML2 Benefit Auction 1.0

Project Description:

You are helping to organize a benefit auction to raise money for families who lost their homes in a natural disaster. The information for the auction is currently stored in an Excel spreadsheet, but you have volunteered to import it to Access. You will create a database that will store the data from Excel in an Access database. You will create a form to manage the data-entry process. You also create two reports: one that lists the items collected in each category and one for labels so you can send the donors a thank-you letter after the auction.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_ML2_Auction.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Items table in Design view.   Change the ID Field Name to ItemID.   Add a second field named Description.   Accept Short Text as the data type   for the Description field and change the field size to 50.

 

Enter   the remaining field names in the table (in this order): DateOfDonation, Category,   Price,   DonorName,   DonorAddress1,   and then DonorAddress2.   Change the data type of the DateOfDonation field to Date/Time and the Price field to Currency. Accept Short   Text as the data type for the remaining fields.

 

Open   Excel, and then open the file Items.xlsx.   Examine the length of the Category, DonorAddress1, and DonorAddress2 columns.   Return to Access. Change the field size for the Category to 15,   DonorAddress1 to 25, and DonorAddress2 to 30.   Save the table, and switch to Datasheet view.

 

Copy   and paste the 26 rows from the Excel spreadsheet into the Items table.   AutoFit all of the column widths so all data is visible. Save and close the   table.

 

Verify   that the Items table is selected in the Navigation Pane. Create a new form   using the Form tool.

 

Select   all of the fields and labels in the Detail section of the form. Change the   layout of the form to a Tabular Layout. With all of the fields selected,   switch to Design view and use the Property Sheet to set their widths to 1.3″. Change the width of the ItemID,   Category, and Price columns to 0.75″.

 

Add   conditional formatting so that each Price that is greater than 90   has a font color of Green (in the   first row, under Standard Colors). (Hint:   Search Conditional Formatting   in the Tell me box). Save the form   as Auction Items Form.

 

Switch   to Form view and create a new record. Enter iPad   as the Description; 12/31/2018   as the DateOfDonation; House   as the Category; $400   as the Price; Staples   as the DonorName; 500 Market St   as the DonorAddress1; and Brick, NJ 08723   as the DonorAddress2.

 

Add   a sort to the form, so the lowest priced items display first. Save and close   the form.

 

Select   the Items table in the Navigation Pane and create a report using the Report   Wizard. Include all fields except the two donor address fields, group by   Category, include the Sum of Price as a Summary Option, accept the default   layout, and then save the report Auction Items by   Category.

 

Switch   to Layout view. Resize the DateOfDonation   control so that the left edge of the control aligns with the left edge of   the column label. Select the Price   and Sum of Price controls and   increase the width to 0.75″.   Select any value in the DonorName   column and drag the left edge of the controls to the right to decrease   the width of the column. Preview the report to verify the column widths are   correct.

 

Switch   to Layout view, and then sort the report so the least expensive item is displayed   first in each group. Save and close the report.

 

Select   the Items table in the Navigation   Pane. Create mailing labels based on the Avery 5660 template. (Hint: Search Labels in the Tell me box and then click the Labels tool in the results.) Place DonorName on the first line, DonorAddress1   on the second line, and DonorAddress2   on the third line. Sort the labels by DonorName.   Name the report Donor Labels.   After you create the labels, display them in Print Preview mode to verify   that all values will fit onto the label template. Close the label report.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Discussion9

200 words+

Discuss what is Network capacity Planning and how do you measure/determine the capacity of your network? Are there any tools to assist you in network capacity planning?

                                             Please list your reference/s

Routers in Digital Forensics

 It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation? 

WEB Security Study

Please go through the 2 slides below

1.  Bowser Security – Issues and Best Practices.

2.  Server Security – Issues and Best Practices 

and summarize the content of each slide in one paragraph each.

Use an APA format to conduct separate research that is related to the topics in the two slides in another paragraph (now 3 paragraphs), Everything should be between 1 and 2 pages.

APA FORMAT

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Requirements:

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Wk 5 – Apply: Summative Assessment: Request for Proposal

 

This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. In this position, your responsibilities may include proficiently working with a variety of technologies, conducting meetings with stakeholders, creating and forecasting budgets, and designing project plans. 

The CIO of your chosen organization wants the organization to purchase and integrate 6 new web servers. The CIO envisions more business travelers using the Internet to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed. 

Research information about your chosen organization to complete this week’s assignment. 

Create a 3- to 5-page request for proposal (RFP) in Microsoft Word for the CIO, which will minimize procurement-related risks for this project. Include the following components in the RFP: 

  • The purpose of the RFP 
  • The organization’s background as it applies to the use of the request for new web servers 
  • An analysis of procurement risks 
  • Methods for managing procurement risks 
  • Basic requirements for the current and new hardware and software 
  • Software and hardware environment 
  • A statement of work/requirements and schedule information 
  • The process for evaluating the RFP 

Include APA-formatted citations to support your assignment. 

discusssion

 

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?