Discussion on global financial service sector which blockchain technology will likely change

Question and Text book attached. Read the attached doc file propely. 

Proper introduction and body and conclusion with References

Two or more references (One is book author and another one anyone)

Need three distinct questions from Chapter 1, 2 and 3. 

 

In chapter 3, the author describes eight core functions of the global financial service sector which blockchain technology will likely change. Create a new thread, choose one of the core functions described in chapter 3, and explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1, 2, or 3. You’re not trying to test each other, but you are trying to start a discussion.

Finally, go to three other students’ threads and post comments, answering at least one of their questions.

You must do the following:

1) Create a new thread. As indicated above, choose one of the core functions described in chapter 3, explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Business Intellegence

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Analyzing & Visualizing Data

 

What has been significant about this course that will help you effectively create technical data visualizations in the future.

Please refer to at least 2 items in the course that really stood out to either positive or negative.

NETWORK RESEARCH PROJECT

 

  • The Network Research Project (NRP) expectations are to explain the concepts you are learning as part of this Networking Fundamentals course.  This is not an extensive review of the topic areas, but instead a cursory exploration of any approved topic you find most interesting.
    You should consider the additional details below to guide you through completion of the NRP.

    • Quality is valued over quantity, but quantity is necessary for a quality project submission.  It is estimated that 4 – 6 pages (not including the title page) would be necessary to address each Network Research Project (NRP) topic.
    • Each Network Research Project (NRP) must have an Introduction.  The introduction should address the purpose of your project, and an overview of what you will convey to the reader.  It should summarize your research project in such a way that readers can rapidly become acquainted with the material.  Each NRP must also have a Conclusion.  The conclusion should summarize your findings in a succinct manner.  The conclusion will regurgitate key points of the research project for the reader.  The remaining format will be at your discretion.  It is suggested that you review the NRP details under each approved topic below, and outline the project accordingly.  You should maintain a consistent format throughout the entirety of the document.
    • You should use proper grammar, terminology, and expand acronyms in each paragraph they are used. For example, the first time in a paragraph an acronym is used it should be expanded (e.g., University of Maryland Global Campus (UMGC)).  Thereafter, and as long as you are in the same paragraph, the acronym (e.g., UMGC) can be used. When starting a new paragraph, the rule begins anew.  Student should leverage Grammar Essentials to aid in their research submission.
    • All sources must be cited using the APA 7th Edition. You will need to use multiple sources of information within the NRP. TestOut LabSim may be one of those sources. UMGC offers a Citing and Writing Portal that you should take advantage of.  Do not plagiarize any material or content.  The use of figures and diagrams is encouraged where appropriate.
    • You will be allowed to submit the NRP for review by your Professor up to three times under the Assignments tab of our class. The first two draft submissions are not graded, but will receive feedback if you choose to submit during the proposed submission period. If you choose not to submit during the proposed submission period, you will not receive feedback. The proposed submission period for feedback is as follows:
    • Upon receiving feedback, please make the necessary modifications or updates to your NRP and resubmit to the correct Assignment folder. The final draft is graded and should be submitted by Tuesday of Week 8You will not receive feedback or have an opportunity to resubmit a draft in Week 8.  A submission in Week 8 will be your final, graded version of the NRP.  If you are satisfied with your feedback prior to Week 8, you have the ability to submit you final draft early to the Week 8 Assignment folder.
    • Review the Network Research Project (NRP) grading rubric to understand the expectations, and how the final draft will be graded.
  • NRP Topic Details
    Details on each topic area are provided below to provide further understanding of expectations for the Network Research Project (NRP).  You will select one topic area to conduct the NRP.  At a minimum, you should address the details provided for each topic area.  However, you are not limited by these details.  You are encouraged to research and discuss additional aspects under any of these approved topic areas.

    • Compare and contrast the characteristics of network topologies, types and technologies
      • Wired Topologies (logical vs physical, star, ring, mesh, and bus)
        • Define and give an example of each topology.
        • Is one topology used more today than others?
      • Wireless Topologies (mesh, ad hoc, other infrastructure)
        • Define and give an example of each topology.
        • Is one topology used more today than others?
      • Types (LAN, WLAN, MAN, WAN, CAN, SAN, and PAN)
        • Define and give an example of each type of network.
      • Technologies that facilitate the Internet of Things (Z-Wave, Ant+ Bluetooth, NFC, IR, RFID, and 802.11)
        • Define and give an example of each technology.
        • Describe how these technologies are related.
    • Summarize cloud concepts and their purposes.
      • Types of services (SaaS, PaaS, IaaS)
        • Define and describe each type of service.
        • Compare and contrast these cloud services are related?
      • Cloud delivery models (Private, Public, and Hybrid)
        • Compare and contrast the cloud delivery models.
      • Connectivity methods
        • Provide further details on cloud connectivity methods.
      • Security implications / considerations
        • Describe security implications and considerations for organizations moving to the cloud.
      • Describe the relationships between local and cloud resources
    • Explain devices, applications, protocols and services at their appropriate OSI layers
      • Layer 1 (Physical)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 2 (Data Link)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 3 (Network)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 4 (Transport)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 5 (Session)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 6 (Presentation)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the layer above.
      • Layer 7 (Application)
        • Define, describe, and give an example of devices that operate at this level.
        • Describe how this layer interacts with the user.
    • Explain the functions of network services. Describe why multiple services are needed to a network to function properly.
      • DNS service (record types, internal vs external DNS, third-party/cloud hosted DNS, hierarchy, forward vs reverse zone)
        • Define, describe, and give an example of how organizations use DNS.
      • DHCP service (MAC reservations, pools, IP exclusions, scope options, lease time, TTL, DHCP relay)
        • Define, describe, and give an example of how organizations use DHCP.
      • NTP
        • Define, describe, and give an example of how organizations use NTP.
      • IPAM
        • Define, describe, and give an example of how organizations use IPAM.
      • VoIP
        • Define, describe, and give an example of how organizations use VoIP.
      • Simple Network Management Protocol
        • Define, describe, and give an example of how organizations use SNMP.
      • File sharing
        • Define, describe, and give an example of how organizations use File sharing.
      • WWW
        • Define, describe, and give an example of how organizations use the WWW.
      • Printing
        • Define, describe, and give an example of how organizations use Printing functionality.
    • Explain the purposes of virtualization and network storage technologies. Define, describe, and highlight the implications of each.
      • Virtual Networking Component (Virtual switch, firewall, NIC, router, hypervisor)
      • Network storage types (NAS, SAN)
      • Connection Type (FCoE, Fibre Channel, iSCSI, InfiniBand)
      • Jumbo Frame
      • Compare and contrast business continuity and disaster recovery concepts.
      • Availability Concepts (Fault tolerance, high availability, load balancing, NIC teaming, port aggregation, clustering)
      • Power Management (Battery backups/UPS, power generators, dual power supplies, redundant circuits)
      • Recovery (Cold sites, warm sites, hot sites)
      • Backups (Full, differential, incremental, snapshots)
      • MTTR
      • MTBF
      • SLA requirements
    • Explain common scanning, monitoring and patching processes and summarize their expected outputs.
      • Process (log reviewing, port scanning, vulnerability scanning, patch management, reviewing baselines, packet/traffic analysis)
      • Event management (notifications, alerts, SIEM)
      • SNMP monitors (MIB)
      • Metrics (Error rate, utilization, packet drops, bandwidth/throughput)
    • Explain authentication and access controls. Define, describe, and highlight the network security implications of each.
      • Authorization, authentication, and accounting (RADIUS, TACACS+, Kerberos, Single sign-on, Local authentication, LDAP, Certificates, Auditing and logging)
      • Multi-factor authentication (something you know, have, are, do, or somewhere you are)
      • Access Control (802.1x, NAC, port security, MAC filtering, captive portal, access control lists)
    • Summarize common networking attacks.
      • DoS (Reflective, amplified, distributed)
        • Define, describe, and give a recent example.
      • Social engineering
        • Define, describe, and give a recent example.
      • Insider threat
        • Define, describe, and give a recent example.
      • Logic bomb
        • Define, describe, and give a recent example.
      • Rogue access point
        • Define, describe, and give a recent example.
      • Evil twin
        • Define, describe, and give a recent example.
      • War-driving
        • Define, describe, and give a recent example.
      • Phishing
        • Define, describe, and give a recent example.
      • Ransomware
        • Define, describe, and give a recent example.
      • DNS poisoning
        • Define, describe, and give a recent example.
      • Brute force
        • Define, describe, and give a recent example.
      • Exploits vs. Vulnerabilities
        • Define, describe, and give a recent example.
    • Compare and Contrast network policies and best practices. Define, describe, and highlight the implications of each.
      • Privileged user agreement
      • Password policy
      • On-boarding/off-boarding procedures
      • Licensing restrictions
      • International export controls
      • Data loss prevention
      • Remote access policies
      • Incident response policies
      • BYOD
      • AUP
      • NDA
      • System life cycle (asset disposal)
      • Safety procedures and policies

reflection of my course

Assignment:  Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

System breach

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Business contingency and disaster recovery

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting

Cyber Security planning and Management

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

Upload your completed assignment here by clicking the BLUE assignment link above.

report

 

its a group assignment about dorm management system

1 need 1 page report only due in 1 hrs about analysis of similar systems weaknesses , strengths, problems) for https://popartdorms.com/en/ , https://www.ciu.edu.tr/dormitories,https://www.emu.edu.tr/dormitories)