SECURITY POLICY PROJECT

For Project Part 3, Infrastructure Research B

Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the
WAN, Remote Access, and System/Application Domains.

Discussion: What did you learn about risk when managing track covid vaccinations project – IS Project management

Discussion: 

What did you learn about risk when managing your project?

Subject: Information Technology Project Management

Chapter 11 – Project Risk Management 

Project:

Plan and build digital system to capture and track covid vaccinations. This App can share its data with different state and each state has unique ID system. Incorporate that into the various state Id systems. This app will be completely digitalized and avoid manipulation or duplication or forging etc possible with paper Vaccination records.

Software, Databases, Information Systems, and Big Data

Databases and Big Data can be exactly that: big. Based on what we have discussed this week and your new experience in systems administration, think about what is needed to host a database or map reduce system (Big Data). Now with that in your mind, why are backups so important? Just looking at this week’s homework, where is most of the time spent when building a system?

Answer the following questions in this discussion board based on your experience:

  • Describe why you think backups of configuration are equally important to backups of data and describe how you would back up your virtual machine
  • Write 10 sentences about this topic in the discussion board and then review other students’ posts and reply

Aligned Objectives

  • Generate backup plans
  • Identify administrate databases, DNS, mail, backups, and similar system software
  • Provide software repository recommendations
  • Monitor software and equipment using simple test scripts

Response Parameters

  • Write at least two peer responses
  • Each initial post should be 250 to 350 words. Respond to at least one peer’s post by providing potential solutions to their concern

Lastly add few lines of peer response with suggestions with clear headings stating peer response and suggestions . 

person writing on printing paper

WEEK 6 DISCUSSION

 

Discussion Points:

●    Discuss Alignment, Hierarchy, Contrast, Repetition, Proximity, Balance, Space. What role do each of them play in design? Illustrate with examples.
●    How does knowledge of the basics of visual design help designers to follow design principles? ●    Explain the need, process of creation and essential components of the storyboard or wireframe of the digital product of your choice. What are essential components of the storyboard and wireframe? Illustrate with examples.person writing on printing paper 

Computer Science

 

Discussion:

Describe and discuss the use of at least five  applications of WEB-GL in the real-world.

Limit you answer to 300 words.

Write a program that generates

Write a program that generates our recurring theme of the month and random rainfall. For this assignment, you will need to use pointers for the months and rainfall data.

Unlike the previous assignment this time the random rainfall will be double data type formatted as shown.Add header file #include to your code so you can display the required results.

The first two lines of your output will show the type for the months and rainfall. You can name your pointer anything you want but the following is the required aforementioned code using ptr_month and ptr_rainAmountcout << "Month has type :" << typeid(ptr_month).name() << "n";cout << "Rainfall has type :" << typeid(ptr_rainAmount).name() << "n"; Your output should resemble:

Discussion 300 words

 

What is Ethical Hacking?

Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions :

What information/locations/systems can an attacker gain access?
What can an attacker see on the target?
What can an attacker do with available information?
Does anyone at the target system notice the attempts?

An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts