Cyber security planning and management – research

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT. 

There is an EXAMPLE attached to show you the format requirements. (Attached)

Plagiarism is unacceptable. 

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/

Practical Connection Assignment

   Legal Reg, Compliance, Invest : Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories in this course could be applied,  in a practical manner to your current work environment. If you are not  currently working, share times when you have or could observe these  theories and knowledge could be applied to an employment opportunity in  your field of study.  

Wireless Network……

 

First Section 

In a 350- to 500-word essay, address the 4 questions. 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget

computer forensics

“Forensic Labs and Certification” 

  • From the reading, outline the process of forensic lab accreditation and determine what a laboratory needs to do in order to fulfill the requirements. Identify an ASCLD accredited lab in your geographic location and conduct further research on this lab. Summarize the location and the type of lab.  Explain whether you believe lab certification is a requirement for law enforcement agencies and provide justification.

How The Cloud Will Impact Future Operating Systems

 

Home

Computer Science homework help

create a post where you discuss how the cloud will impact future operating systems.  Initial posts should be a minimum of 400 words that cites sources and follows APA formatting.  Also, respond to at least three peers’ posts. Responses should be substantiative and clear and further the conversation by stating what you learned from the post and asking questions. A suggested minimum is 150 words.

Disaster Recovery Plan for An Organization

** RESEARCH PAPER**

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762).

This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

    Introduction

    Roles and Responsibilities

    Incident Response

    Plan Activation

    Document History

    Procedures

Your paper should meet the following requirements:

Be approximately six to eight pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Assignment

Find an article of your choice and discuss it in the forum. The article published within the last 5 years and located on Google Scholar. 

software antivirus

  

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?[700 words]