Business Proposal

Conduct an internet search using the phrase “small office local area network” for network diagram examples to help you complete this assignment.

As you continue to work on Great Day Fitness Tracking’s website, you now need to gather business requirements and user requirements to identify the hardware, software, and network requirements to support the online business.

Write a 2- to 3-page proposal in Microsoft® Word. Your proposal should:

Describe how you would select appropriate hardware and software to develop the internal business infrastructure.

Explain at least two possible approaches to managing the data for easy access and security.

Describe possible networks that might be used to support business needs.

Create a logical system diagram with a software of your choice showing possible internal connections as well as those between the site and the potential customers. 

Format your assignment according to APA guidelines.

Practical Connection

 

This is the Practical Connection Assignment for this course. The purpose of this assignment is to help connect the concepts learned in this course to real-world situations that you may face as an IT professional.

For this assignment, you will write an essay addressing the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional. Your essay should address the following.

  • a definition and overview your selected law or regulation
  • consideration of the duties of an Information Technology professional
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. This is not a formal paper, but should maintain scholarly tone and rigor, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus. 

Here are a few details about the overall research paper.

  • Your paper does not require a Title page.
  • Your paper must include a Reference page.
  • Your paper should NOT include an abstract.
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers)
    • Cited sources must directly support your paper (i.e. not incidental references)
  • Your paper must be at least 500 words in length 
    • Reference pages are NOT included in calculating the paper length. (Neither are Title pages or abstracts if present).

If you are not sure how to identify peer-reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

1. Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 2. Use a search engine to find the names of five different cyber viruses.

 

Question 1:

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the  https://libguides.nec.edu/az.php , not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.

Readings:

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

Question 2:

 

Use a search engine to find the names of five different cyber viruses.

Using WORD, write a short paragraph on each.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Readings :

 https://www.youtube.com/watch?v=bjYhmX_OUQQ 

Information Security Laws

 

Locate 2 laws that impact information security in an organization. One law needs to be a US law and the other a foreign law from any country. Three 2-3 pages where you compare and contrast the two laws. Be sure to include at least 2 scholarly sources and write in APA format. 

Note: Do NOT use GDPR and CCPA

case study 6

Read The Case of Plant Relocation and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-case-of-plant-relocation/

Kindly answer to the question at the end.

Pros and cons of each country and ethical challenges.

Security Design and Architecture Assignment

 

  • How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

 This assignment should be in APA format and have to include at least two references. 

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.
    4000 words 

movie review

 

Have you heard of The American Film Institute (AFI)?  According to their website they are:

” America’s promise to preserve the heritage of the motion picture, to honor the artists and their work and to educate the next generation of storytellers.”

In 1998 AFI gathered a wide variety of individuals from across their community to help compile a list of the top 100 films of all time.  This list was adjusted in 2007, but we’re going to stick with the original list seen below.  The full list can be seen here: Link (Links to an external site.)Links to an external site.

Watch: THE GODFATHER (Links to an external site.)Links to an external site.

1972

Using at least three or more of the dimensions of the film we have covered up to this point:  narrative, mise-en-scene, cinematography, editing, and sound, write an essay exploring THE GODFATHER movie.  Your essay can be organized in a number of ways, but students are often most successful when they pick a scene for each element and discuss how the cinematic element best plays out in said scene.  Be sure to use terms we’ve learned over the past 4 weeks and provide specific examples from the film to support your points.  The paper should be 4 pages long, double-spaced, typed in Times New Roman and 12 point font.  Include a Works Cited section at the end of the essay listing the film and any references you may have used to write your paper