Case Study 2

 Discussion Points 1. Do some Internet research on Chevron’s use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil and gas reservoirs.  C6-7 2. Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize the major security concerns associated with these systems and steps than can be taken to enhance their security. 3. Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud. 4. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why they are important in business intranets and extranets. 5. Why is it increasing most important for a CIO or IT executive who oversees geographically distributed enterprise networks to be business literate? 

Sources

 [CHEV12] Chevron.com “Seismic Imaging.” Retrieved online: at http://www.chevron.com/deliveringenegy/oil/seismicimaging. [GALL12] Gallant, J. ”Chevron’s CIO Talks Transformation and Why IT Leaders Should Smile.” April 12, 2012. Retrieved online at: http://www.cio.com/article/print/704095. [SCRI11] Scribd.com. “Chevron Corporation CRUSH Report.” August 17, 2011. Retrieved online at http://www.scribd.com/doc/62481977/ChevronCRUSH-Report-09A1. [STAT12] Statistic Brain. “Chevron Company Statistics.” February 12, 2102. Retrieved online at: http://www.statisticbrain.com/chevron-companystatistics/. 

PLEC11

 

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Practical Connection

  

Course Description:

Course : Fall 2020 – Application Security (ISOL-534)

This course covers techniques and strategies for securing computers running Microsoft Windows operating systems, and their applications. Focusing on Windows Server 2012 and newer versions, and Windows 10 for clients, the course introduces the Windows operating system platforms and major areas of security vulnerabilities. Students will learn how to assess Windows computers for security vulnerabilities and how to make them more secure.

Course Activities and Experiences:

Students are expected to: • Review any assigned reading material and prepare responses to homework assigned. • Actively participate in activities, assignments, and discussions. • Evaluate and react to each other’s work in a supportive, constructive manner. • Complete specific assignments and exams when specified and in a professional manner. • Utilize learned technologies for class assignments. • Connect content knowledge from core courses to practical training placement and activities

Week 3 Research Paper: Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 3-4 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Hacking1

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT

Type of research Framework

Choose your choice of research (Qualitative, Quantitative, or Mixed) describe the benefits of using a research framework in 350 to 400 words in APA writing assignment. 

Order # 13436

Title: Wireless Network Design

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Preparation

Before you begin this assessment, please complete the practice labs as they will be helpful to you.

Then use the Internet and the Capella library to research the assessment topic. You will need at least three recent, relevant, and professional resources to support your work.

Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Assessment 1 Resources for more information.

Instructions

For this assessment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs). The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network.

Start with the network diagram you created in the Assessment 2. You may want to make some changes depending on the feedback you received from your instructor. Using this diagram, complete the following:

•Add a wireless infrastructure to your network diagram. ◦Include your IP addresses. Calculate and add your IP ranges and subnets into your diagram.

•Explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions.

•Explain your IP addressing strategy.

•Describe at least three wireless standards that influenced your network structure.

The assessment you submit should be approximately 3–4 pages in length, including the diagram you create. Be sure your document is professionally written, free of errors, and that your citations and references follow APA guidelines.

Additional Requirements

•Include a title page and references page.

•At least three recent, relevant, and professional resources.

•Times New Roman, 12-point font, double spaced.

Data visualization

 

Research: Annotation and Color

Background: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.

Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.

Emerging Threats

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

word document edit

 

  1. Open the VaccinationSchedule-04.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

NOTE: If group titles are not visible on your Ribbon in Word for Mac, click the Word menu and select Preferences to open the Word Preferences dialog box. Click the View button and check the Show group titles check box under Ribbon. Close the Word Preferences dialog box.

  1. Select the tabbed text in the middle of the document and convert it to a table (accept default settings). Don’t include the blank line below the tabbed text.
  2. Select the entire table and apply the following changes:
    1. Select Banded Rows in the Table Style Options group [Table Tools Design tab] and deselect all 
    2. Apply the List Table 1 Light – Accent 2 table style (Figure 4-120).
    3. Change the font size on all the text in the table to 10 pt.
    4. AutoFit the table and choose AutoFit Window.
    5. Change row height to 0.25″.
    6. Center all text vertically within each cell. (Hint: Use the Cell tab in the Table Properties dialog box.)
    7. Sort the table by Name of Vaccine in Ascending order. Be sure to select Header row in the My list has area of the Sort dialog box.
  3. Make the following changes to the table:
    1. Insert a row above the first row.
    2. Merge the three cells in the new first row and type the following:
      RECOMMENDED VACCINATION SCHEDULE
    3. Bold and center the first row and change the font size to 11 pt.
    4. Bold and italicize the column headings in the second row.
    5. Select the first row and apply borders with the following settings: solid line, Black, Text 1 color (second color in the first row of Theme Colors), 1 ½ pt. width, and apply a top and bottom
    6. Select the second row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border. Do not remove the top border applied in the previous step.
    7. Select the last row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border.
    8. Align Center [Table Tools Layout tab, Alignment group] the column headings.
    9. Align Center the text in the third column.
  4. Insert the following information alphabetically into the table. Insert rows where needed.

This table lists text to be typed in a table

Meningococcal conjugate (MCV)

At 11-12 years

1

Hepatitis B (HepB)

At birth, 1-2 months, and 6 months

3

  1. Modify the title of the document (“Vaccination Schedule”).
    1. Apply the Title style to the title of the document.
    2. Change the After paragraph spacing to 8 pt.
    3. Center the title horizontally.
    4. Apply small caps and bold formatting to the title.
  2. Insert and modify a picture.
    1. Place the insertion point after the title and insert the CMPLogo-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change text wrapping to Top and Bottom.
    3. Change the height of the logo to 1″. Verify the logo remains proportional.
    4. Apply the Offset: Bottom Right shadow picture effect (Outer category).
    5. Set the Horizontal Absolute position to 0.2″ to the right of Page.
    6. Set the Vertical Absolute position to 0.2″ below Page.
  3. Insert a picture and add a caption.
    1. Place the insertion point at the end of the first body paragraph and insert the Vaccination-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change the text wrapping to Square.
    3. Change the height of the picture to 1.3″. Verify the graphic remains proportional.
    4. Drag the picture to the right of the first and second paragraphs.
    5. Insert a caption, delete the caption placeholder text, and type Don’t neglect your vaccinations! as the caption text.
    6. Center the caption text, change the font color to Red, Accent 2 (sixth color in the first row of Theme Colors), and turn off italics if it is applied to the text.
    7. Select the caption and the picture and Align Center.
    8. Group the caption and the picture.
    9. Set the Horizontal Absolute position to 6″ to the right of Margin.
    10. Set the Vertical Absolute position to 0.8″ below Margin.
  4. Edit the alt text of the graphic objects.
    1. Edit the alt text of the CMP logo and type Courtyard Medical Plaza logo as the alt text.
    2. Edit the alt text of the graphic of a doctor, type Graphic of a doctor as the alt text, and close the Alt Text pane.
  5. Save and close the document (Figure 4-121).