network security layers

Assume you are a network administrator. You keep the internal network secure through a defense-in-depth strategy. Your company has many remote users, all of whom must adhere to a comprehensive VPN policy The policy states that only company-owned devices may connect to the internal network over a VPN connection. However, the company president, who is a former tech consultant, set up VPN access from her personal laptop for convenience.

Answer the following question(s):

How do you enforce the VPN policy for the company president? Provide rationale for your answer.

Privacy Compliant Systems Design

Draw an annotated DFM diagram for the following ER scenario. Use annotations from the list in  Week 3 documents. 

Upon your arrival at the Department of Emergency Medicine, you will need to register at the reception desk located at the waiting room. You have to complete a paper form with the requested information and deliver the form to the clerk at the admission desk. The clerk may ask you few follow up questions based on the information you provide in the form. Your information is entered by the admission clerk in a computer systems and the paper form is filed in a cabinet. Our hospital systems have five locations in Texas, Louisiana, Arkansas, Mississippi and Missouri. You can receive services at all these locations in the future since they will have access to your electronic admission records which is stored in in amazon cloud. All communications between Amazon cloud and the local systems use secure protocols.  While patients’ name, SSN, address and telephone number, and dates of visits are stored in Amazon cloud as plain texts, patients’ health and insurance related information are saved in encrypted form. Admission clerks have access to unencrypted data, but the doctors, hospital administrators, and billing personnel have access to all data. Treatment category (not specific disease information) information is shared with the specified insurance companies for the billing purposes. Copies of the health records are made available to the medical researchers after removing patients’ name, SSN, address and telephone numbers. 

Python

 This is the topic: You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report: Prepare in APA format Include references Report length: 500 – 700 words Briefly describe Telecommunication company (Ex: Charter communication, ATT, TMO) Briefly describe Python Give an overview of Machine Learning Report on:’ Implementation plans, Technical training, Python libraries required, How Python will be used And Types of reports that will be produced.

programming

1>

Give examples showing how “super” and “this” are useful with inheritance in Java. Include examples of using “super” and “this” both as constructors and as variables. (300 words)

2>

attached

Unit 3 Assignment: Smith, Smith, Smith and Smith

Smith, Smith, Smith, and Smith is a regional accounting firm that is putting up a new headquarters building. The building will have a backbone network that connects eight LANs (two on each floor). The company is very concerned with network errors and reliability.