Cloud Computing

 

After reading the article this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Post should be 300-350 words

Data Communications

Please write the research paper on topic ” Windows Server Dynamic Access Controls”. find the abstract of the topic and continue the research paper according to the Abstract provided.

week 10

 

This week’s journal articles focus on empowering leadership and  effective collaboration in geographically dispersed teams, please answer  the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to  collaborate on a geographically dispersed team. Please note the pros  and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

 

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

 

https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Infrastucture and Security

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
  • Document (MS Word).
  • Microsoft Visio Plan (MS Visio).
Section 1

Write a 3–4 page deliverable in which you:

  • Explain the major cyber governance issues in an organization, and examine how organizations develop communication protocols because of those issues.
  • Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  • Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2

UFO Sightings- building website

Do certain areas have higher concentrations of sightings?

What is the most common shape of a sighting?

What is the average duration of a sighting?

Is there a higher concentration of sightings at night?

Data sets are here:   

https://www.kaggle.com/NUFORC/ufo-sightings/metadata (Century of data)Attached

http://www.nuforc.org/webreports/ndxe202004.html (April sightings 2020) 

Sketch ideal visuals 

Bubble Map to view concentration levels of sightings (Leaflet)

example: https://www.d3-graph-gallery.com/bubblemap.html

Lollipop Chart to view the most common shapes of a sighting 

example: https://www.d3-graph-gallery.com/lollipop.html

Violin Chart to view the bins of duration for a sighting

example: https://www.d3-graph-gallery.com/violin.html

Word Cloud of submitted summaries for each sighting (D3)

example: https://www.d3-graph-gallery.com/graph/wordcloud_size.html

Requirements: 

Your assignment should: 

Include A dashboard page with multiple charts that updates from the same data

Should include Json amCharts (https://www.amcharts.com/javascript-maps/) 

Must include some level of user-driven interaction(e.g, menus, dropdowns. textboxes)

Main web page with navbar (possible separate pages for charts as well)           

Main page with a filter for selected dates/locations with a collective chart change 

Main Chart on top of screen – Map of locations (Bubble)

Secondary chart below or beside Bubble: Amchart pictorial 

(This chart will show how many sightings per period selected) 

Filtered charts per date or location:  

Violin, Lollipop, Word Cloud                                                 

A combination of web scraping and Leaflet or Plotly 

Discussion – 500 Words 4 References

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization. 

cloud computing

Describe the various types of virtualization.

List the pros and cons of virtualization.

Be sure to include at least 2 scholarly sources and use APA format.

Physical security 101

 

  • Search the Internet for an article where physical security failed
  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 5 full pages double spaced (not including cover page, reference pages, abstract or table of contents)
  • No photos or graphs
  • Reference all sources used
  • Your paper must be APA formatted (including a separate cover page and reference page) 
  • Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section

Computer Short Answers wanted in 18 hours

  Totally 1-2 pages for these two Questions.

Conduct a security audit of your personal use of computer systems and computer technology

1. Identify points of vulnerability and weakness. (No more than 10).

2. Describe what you will do to address these.

Review the videos associated with the powerpoint lecture 9.  The links are also in the pdf file below. 

Review the case described in the pdf and answer questions 1, 2, 4, 5