Research paper

  

Research topics: Biometrics in Physical security

Paper must be 6-7 pages excluding title page and reference 

The paper must contain 4 section- Introduction, Literature Review, Details and Conclusion

linux

1. For this discussion topic, you will need to research storage virtualization and its benefits. Your initial post should focus on what benefits exist from virtualizing the storage attached to the hypervisor.  

2. or this discussion topic, you will need to research network virtualization and examine the resources you find carefully. While most of the information you find will be targeted at the reasons to virtualize networks, you need to determine what pitfalls exist. Summarize your findings in your initial post.  

3. For this discussion topic, you are expected to do research and post your findings on the pros and cons of implementing and using a virtual desktop infrastructure. 

4. In IT, sometimes a large part of the battle when developing a solution to a problem is knowing what options exist.  For this assignment, you will research what companies offer network virtualization products and how their products differ with the goal of writing up a summary of what options exist.  You should include in your summary if any of these solutions come from existing network hardware companies.   

5. For this assignment do research on either VMware Horizon or Microsoft Remote Desktop Services and complete a plan to implement a virtual desktop infrastructure based on up on the business details provided.  You plan should include details as to how many of what types of servers would be needed, how many and what types of virtual desktops would be needed and any other considerations you might encounter.  

6. For this assignment you will research the common client hardware and software that is used by end users to access virtual desktop environments.   You should explore each of the client connection methods in detail list both pros and cons for each connection method or device.  You need to have a minimum of 3 different devices or connection types discussed in your paper.  

SQL ( fund of data systems)

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Bank Enterprise Information Security Policy

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel
· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers
· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer
o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel
· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking
Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures
Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]
RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.  

Network Security

A.) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share? 

B.) Answer Below Question in a sentence each:

1 List three design goals for a firewall.

2 List four techniques used by firewalls to control access and enforce a security policy.

3 What information is used by a typical packet filtering firewall?

4 What are some weaknesses of a packet filtering firewall?

5 What is the difference between a packet filtering firewall and a stateful inspection firewall?

6 What is an application-level gateway?

7 What is a circuit-level gateway?

9 What are the common characteristics of a bastion host?

10 Why is it useful to have host-based firewalls?

11 What is a DMZ network and what types of systems would you expect to find on such networks?

12 What is the difference between an internal and an external firewall?

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400–500 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear and use examples to reinforce your ideas.

There are numerous times when the information collected from a real organization will not conform to the requirements of a parametric analysis. That is, a practitioner would not be able to analyze the data with a t-test or F-test (ANOVA).

Presume that a young professional has read about tests—such as the Chi-Square, the Mann-Whitney U test, the Wilcoxon Signed-Rank test, and the Kruskal-Wallis one-way analysis of variance—and wants to know when it is appropriate to use each test, what the test is used for, and why each would be used instead of the t-tests and ANOVA. How would you address this young person’s concerns?

Information governance

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

produce visualizations and then tell the story of your visualizations

  1. Background: This week you will be given a dataset and the documentation that goes along with the dataset. Up until today, I have told what to graph or what to fields to plots in the graphs.
    Assignment: Use the provided dataset to produce visualizations and then tell the story of your visualizations. The dataset and dataset documentation will be found in this week’s folder. I will also create a video that will provide more details for the assignment.
    Graphs to Produce:
    ggplot2 – Bar Plot: (Use dataset_budget_share_Food_Spanish_Households.csv)
    ggplot(dataset_name, aes(x=categorical, fill=categorical)) + facet_wrap(~categorical) + theme_bw() + geom_bar(position=”dodge”)

    • Label the x-axis.
    • Label the y-axis.
    • Give the graph a title.
    • What story is presented in this visualization?
    • ggplot2 – Histogram: (Use dataset_budget_share_Food_Spanish_Households.csv)
      ggplot(dataset_name, aes(x=continuous, fill=categorical)) + theme_bw() + facet_wrap(~categorical) + geom_histogram(binwidth=5)  — you can decide the binwidth
    • Label the x-axis.
    • Label the y-axis.
    • Give the graph a title.
    • What story is presented in this visualization?
    • ggplot2 – Box Plot: (Use dataset_budget_share_Food_Spanish_Households.csv)
      ggplot(dataset_name, aes(x=categorical, y=continuous, fill=categorical)) + theme_bw() + facet_wrap(~categorical) + geom_boxplot()
    • Label the x-axis.
    • Label the y-axis.
    • Give the graph a title.
    • What story is presented in this visualization?
    • ggplot2 – Scatter Plot: (Use dataset_budget_share_Food_Spanish_Households.csv)
      ggplot(dataset_name, aes(x=continuous, y=continuous, shape=categorical, col=categorical)) + facet_wrap(~categorical) + theme_bw() + geom_point() + geom_smooth(method=”lm”,se=F)
    • Label the x-axis.
    • Label the y-axis.
    • Give the graph a title.
    • What story is presented in this visualization?
    • Please put all screen shots in a MS Word (other word processors are fine to use but save it in MS Word format). Don’t upload the screen shots individually in the assignment folder! Submit your assignment on or before the due date.

Apply: Database Management Plan: Part 1 – Storing and Extracting Information

 

Scenario

You are the Vice President for Information Technology at a small, growing business. You have been tasked with developing a plan for maintaining databases for storage of business data and use in business analytics. In Weeks 1-5 you will work on gathering information in a Database Management Plan. In Week 6, you will present your plan in a 20-minute presentation (10-12 slides) to the President of Information Technology. 

Create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. In your Database Management Plan entry, ensure you:   

  • Provide an overview of how databases can be used in a company to store and extract information. 
  • Decide what data elements need to be stored. 
  • Analyze major component of the SDLC when developing this database application. 

A Database Management Plan template is available to help you record and organize your information.

Submit your assignment.

Case Study 2

 

Read the ModMeters Case Study From attached document. Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.

The paper MUST BE between 600 – 1200 words (minus the cover page, abstract, graphs, and references). These grading guidelines will be STRICTLY enforced as this is a Master’s program where writing is required!