Security Architecture.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum length of 800 words.

  1. When should the architect begin the analysis?
  2. What are the activities the architect must execute?
  3. What is the set of knowledge domains applied to the analysis?
  4. What are the tips and tricks that make security architecture risk assessment easier?

Research Papers Summary

 

1. Pick your 5 papers from the pool attached.

2. Read them and summarize them in your own words. Content will be analysis for two issues:

A. Not copying from those references or any other references.

B: Not copying from other students. Both cases will cause problems

3. Minimum size, 500 words, excluding title and reference page.

SAS PROGRAMING PROBLEM

The National Adult Tobacco Survey (NATS) was created to assess the prevalence of tobacco use, as well as the factors promoting and impeding tobacco use among adults. NATS also establishes a comprehensive framework for evaluating both the national and state-specific tobacco control programs.

NATS was designed as a stratified, national, landline, and cell phone survey of non-institutionalized adults aged 18 years and older residing in the 50 states or D.C. It was developed to yield data representative and comparable at both national and state levels. The sample design also aims to provide national estimates for subgroups defined by gender, age, and race/ethnicity.

The Original and Historical Survey Data can be found from : Center for Disease Control and Prevention: NATS. The data and code book is available in

Server virtualization and cloud computing

 For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

Assignment

  

Questions for Discussion

1. What is Big Data? Why is it important? Where does Big Data come from?

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?

3. What is Big Data analytics? How does it differ from regular analytics?

4. What are the critical success factors for Big Data analytics?

5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?

Exercise 3:

At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. 

Demonstrating the Gap

Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network.

Using Microsoft Visio or another online network diagramming tool, diagram the network that was analyzed in the Topic 1 “Quantify the System” assignment.

Then, create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.

Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.

Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

APA style is not required, but solid academic writing is expected.

Refer to “Demonstrating the Gap Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

ALSO  PLEASE READ INSTRUCTOR ASSIGNMENT TIP

Hi Class, the link below can help you with week 4 assignment. The link is not an endorsement or affiliated in any way to GCU. However, you are welcome to use whatever application or site that will produce the end results for what is being asked.

https://creately.com/

Also, I don’t except to see 50-100 servers on your diagram. However, your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

This is an assignment that many students forget to label or include what is required. That said, I want everyone to do their best and get the best possible grade.

Journal Article Analysis on Negotiation

Submission must include the following information in the following format:

DEFINITION: a brief definition of the key term “Negotiation”.

SUMMARY: Summarize the article in your own words- this should be in the 150 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: 

cloud computing

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.