WSUS and Windows Defender/ DHCP

 

Discussion Question 1:

Describe a role that WSUS and Windows Defender play in securing a Windows Network Infrastructure. What should the policy be to keep the nodes on your network updated with the latest security updates?

Discussion Question 2:

Describe in detail some of the aspects of DHCP related to Windows Server 2016 including leases, scopes, and commands, etc. Explain how DHCP is installed and configured on Windows Server 2016.

Portfolio Assignment – Disaster Recovery Plan

Create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided.

Should request prior authorization of the company to be addressed to ensure that all students are working on unique companies.

Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

You may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement. 

SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.

assignment

 

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-9

Discussion and Assignment

 Discussion

 In no less than 250 words, explain what is meant by an IDS and an IPS.  How are they different?  How are they connected to a network?  List a few examples of IDS/IPS tools that are currently on the market.  

Week 11 Assignment

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Discussion

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 

 

Internet Research – Wk 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs 

System Architecture and Design

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1, Business analytics logical data flow, from the link (
https://ebrary.net/84377/computer_science/business_analytics  ). 

How can the analysis system gather data from all these sources that, presumably, are protected themselves?

In 2016, who did the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to? Discuss the role or the IANA and how this move might effect internet services and security.

In 2016, who did the United States transferred the stewardship of the Internet Assigned Numbers Authority (IANA) to?  Discuss the role or the IANA and how this move might effect internet services and security. 

 Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 2-full pages in length with a minimum of 2 – sources. 

Individual Assignment for Operational Excellence

 

Chapter 7 – study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

Chapter 8- study questions 1-10, Exercise 2 ( from Information Systems for Business and Beyond textbook)

The above assignments should be submitted in a single word document.

IaaS cloud migration

Research IaaS then address the following scenario in essay format. Your essay should be 2-3 pages in length (not including cover and reference page) and should include at least two scholarly references and no less than four references total. Your paper must be in APA format.

XYZ corporation is a large hospital considering moving services to the cloud to reduce some data center expenses. The hospital must comply with HIPAA regulations while moving resources to the cloud. You are considering an IaaS solution for the hospital, but leadership is skeptical about the move.

Your job is to provide assurances through research as to why there is no need for concern. In this essay, you need to provide assurances that should address risks, legal compliance, downtime, and other key areas of IaaS migrations.

subject Name: security architecture and Design

Topic: discussion post on   Security Architecture  

Sample Discussion Post:

 

Compare and contrast five types of window glass.

 There are many sorts of glass that make windows. The different types have different uses or purposes that they aim to achieve with their various designs. There are several factors involved in choosing the type of glass to use on a window. The first one is the cost of the window glass, and the second factor is the amount of energy that your windows can help you save (Sayyed et al., 2019). There is also window glass for areas that are prone to harsh weather conditions like hurricanes and storms. The types of window glasses are:

            Float glass that gets its name from its formation procedure. It is formed when molten glass forms large and flat panels by floating it on the molten tin (Wang et al., 2017). It is then trimmed, treated, and improved. Float glass is just the ordinary fragile glass. This glass is weak and easy to break. The glass can be used to make various types of glass windows.

 Laminated glass is made of two pieces of float glass pressed together by a thin layer of resin. This glass is standard in car windshields (Wang et al., 2017). The glass is strong enough to prevent the windscreen from collapsing if it breaks due to the presence of resin, thus able to maintain the structural integrity of the windshield.

 Obscured glass is characterized by designs such as etched or beveled features that make it hard for one to see through, but light can penetrate (Sayyed et al., 2019). The glass is best for privacy purposes and can be used in bathrooms.

            Tempered glass is made from float gas that has undergone a tempering process. This process makes the glass extremely strong and hard to cut (Wang et al., 2017). However, the lens can still break into smaller and less dangerous pieces compared to float glass—Bess for low and big windows.

            Insulated glass is best suited for double and triple-pane windows. A space bar separated the two panes. Krypton and argon are added into the space to offer insulation between the glass panes. This glass is durable and increases the u-factor, and solar heat gains coefficient of the windows.

                                                            

References

Sayyed, M. I., Kaky, K. M., Şakar, E., Akbaba, U., Taki, M. M., & Agar, O. (2019). Gamma radiation shielding investigations for selected germanate glasses. Journal of Non-Crystalline Solids, 512, 33-40.

Wang, M., Wang, B., Krishnan, N. A., Yu, Y., Smedskjaer, M. M., Mauro, J. C., & Bauchy, M. (2017). Ion exchange strengthening and thermal expansion of glasses: Common origin and the critical role of network connectivity. Journal of Non-Crystalline Solids, 455, 70-74.