System Architecture and Design

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1, Business analytics logical data flow, from the link (
https://ebrary.net/84377/computer_science/business_analytics  ). 

How can the analysis system gather data from all these sources that, presumably, are protected themselves?

In 2016, who did the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to? Discuss the role or the IANA and how this move might effect internet services and security.

In 2016, who did the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to?  Discuss the role or the IANA and how this move might effect internet services and security. 

 Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 2-full pages in length with a minimum of 2 – sources. 

Individual Assignment for Operational Excellence

 

Chapter 7 – study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

Chapter 8- study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

The above assignments should be submitted in a single word document.

IaaS cloud migration

Research IaaS then address the following scenario in essay format. Your essay should be 2-3 pages in length (not including cover and reference page) and should include at least two scholarly references and no less than four references total. Your paper must be in APA format.

XYZ corporation is a large hospital considering moving services to the cloud to reduce some data center expenses. The hospital must comply with HIPAA regulations while moving resources to the cloud. You are considering an IaaS solution for the hospital, but leadership is skeptical about the move.

Your job is to provide assurances through research as to why there is no need for concern. In this essay, you need to provide assurances that should address risks, legal compliance, downtime, and other key areas of IaaS migrations.

subject Name: security architecture and Design

Topic: discussion post on   Security Architecture  

Sample Discussion Post:

 

Compare and contrast five types of window glass.

 There are many sorts of glass that make windows. The different types have different uses or purposes that they aim to achieve with their various designs. There are several factors involved in choosing the type of glass to use on a window. The first one is the cost of the window glass, and the second factor is the amount of energy that your windows can help you save (Sayyed et al., 2019). There is also window glass for areas that are prone to harsh weather conditions like hurricanes and storms. The types of window glasses are:

            Float glass that gets its name from its formation procedure. It is formed when molten glass forms large and flat panels by floating it on the molten tin (Wang et al., 2017). It is then trimmed, treated, and improved. Float glass is just the ordinary fragile glass. This glass is weak and easy to break. The glass can be used to make various types of glass windows.

 Laminated glass is made of two pieces of float glass pressed together by a thin layer of resin. This glass is standard in car windshields (Wang et al., 2017). The glass is strong enough to prevent the windscreen from collapsing if it breaks due to the presence of resin, thus able to maintain the structural integrity of the windshield.

 Obscured glass is characterized by designs such as etched or beveled features that make it hard for one to see through, but light can penetrate (Sayyed et al., 2019). The glass is best for privacy purposes and can be used in bathrooms.

            Tempered glass is made from float gas that has undergone a tempering process. This process makes the glass extremely strong and hard to cut (Wang et al., 2017). However, the lens can still break into smaller and less dangerous pieces compared to float glass—Bess for low and big windows.

            Insulated glass is best suited for double and triple-pane windows. A space bar separated the two panes. Krypton and argon are added into the space to offer insulation between the glass panes. This glass is durable and increases the u-factor, and solar heat gains coefficient of the windows.

                                                            

References

Sayyed, M. I., Kaky, K. M., Şakar, E., Akbaba, U., Taki, M. M., & Agar, O. (2019). Gamma radiation shielding investigations for selected germanate glasses. Journal of Non-Crystalline Solids, 512, 33-40.

Wang, M., Wang, B., Krishnan, N. A., Yu, Y., Smedskjaer, M. M., Mauro, J. C., & Bauchy, M. (2017). Ion exchange strengthening and thermal expansion of glasses: Common origin and the critical role of network connectivity. Journal of Non-Crystalline Solids, 455, 70-74.

NS-10 -P

  • 0.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Cyber-attacks

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Post should be at least 300 words.

Upload Assignment: Week 2 Assignment

Complete the following assignment in one MS word document: 

Chapter 3 –discussion question #1-4 & exercise 12

Chapter 4 – discussion question #1-5 & exercise 1

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 3

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824269?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25203_Analytics%252C%2520Data%2520Science%252C%2520%2526%2520Artificial%2520Intellience.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200901T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200901%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=79ca50856b53a560c4740192c3518c11dc425f27210b2a53fca1397a6d4480d7

Chapter 4

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824270?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25204_Analytics%252C%2520Data%2520Science%252C%2520%2526%2520Artificial%2520Intellience.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200901T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200901%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=acba21c45f208cec48ef8bffc5352d3b440c6a5aefb69e826b6f000bbaa9d4c9

http://www.youtube.com/watch?v=VSDDKlrVidc

http://www.youtube.com/watch?v=RNQmvY_LA0E

Web Assignment

 

  • You are going to write a 2-3 page research paper in APA format, with all supporting references and visuals on the following :
    You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

    https://technumero.com/most-popular-web-browsers/
    https://www.toptenreviews.com/best-internet-browser-software