2 Discussion questions and 1 weekly Summary 1 Page

At least 200 Words Each Discussion 

Discussion 1.1

What is the difference between “reactionary mentality” and “proactive mentality”?

How are both useful in Network Defense?

Provide an example of each in your initial statement.  

Discussion 1.2

What are the meanings of the following terms?

1) Advanced Persistent Threat

2) Remote Access Trojan

Provide an example of each in your initial statement.  

Weekly Summary 1.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Chapter 1 and PPT attached Please take this as reference for Weekly summary 1.1

Bash Scripting – Three easy tasks

Please find the attachments for three tasks listed. Use bash scripting template attached (.sh file) to complete the three tasks. Please add comments wherever appropriate. 

Ask if you have questions, and need anything. 

Thank you!

IT Project Management Topic

 

Instructions

For this assignment, your group will write an issue paper on a project management topic. The paper has to be APA style, 4-6 pages long, including references.

The paper will provide an intellectual treatment of a Project Management-relevant topic. Specific paper topics will be decided in consultation. Therefore, check with me early to discuss your ideas.

I will provide feedback on one intermediate version of the group project if the group so desires. My assessment and feedback of these versions do not count towards your grade.

My topic is the issues with the Project Management Triad of Scope, Cost, and Time and how it is no longer adequate. Explain what the PM triad is and how it is used in 3 pages. Use one page to briefly explain the issues including issues with the quality of deliverables, issues with customer service, and how it ignores end-user adoption.

Algorithm analysis

 

We  have n stations along a river, numbered 1 to n in the direction of the  current. You can rent a boat at any station i, go down the river to a  station k> i, return the boat and pay a fee c (i, k) for the tour. It  is possible that c (i, k) is greater than c (i, j) + c (j, k), with j  being an intermediate station between i and k. In this case, it is  cheaper to rent a boat from i to j and then another from j to k. Give an  efficient algorithm that calculates the minimum cost of a trip from 1  to n. Depending on n, how long does your algorithm consume?

Discussion

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

Subject: Business Continuity Plan & Disaster Recovery Plan

Linux Ubuntu assignment

 Problem Statement DOMAIN: Linux Fundamentals Focus: Development Tom needs to create user accounts for new joiners Jane and Jack in his system and give them permission to view and edit common repositories. He needs to create a cron job to delete empty files and directory every day at 00:00 am and need to upgrade the system every week on Tuesday 6:00 am. As part of his role he also needs to monitor system usage (CPU load, Memory usage, disk usage, network usage, active logged in users). He needs to install Git as SCM in a remote system and put system usage data there. He would need to fetch the data on remote server and needs to maintain the remote server from his desktop as well. He also needs to restrict users to access youtube from this machine. Approach to Solve: 1. Tom creates user accounts for Jane and Jack in his system. 2. Separate home directories are created for each of the three users. 3. They have a common repository script where every user has access to view and edit files. 4. Tom installed git as the SCM in a remote system. 5. He set a chron job to delete empty files and directory from /tmp folder at 00:00 am. 6. He set a chron job to upgrade the system every week on Tuesday 6:00 am. 7. Tom creates a script which has functionalities to display CPU load, Memory usage, disk usage, network usage, active logged in users. 8. He puts them in git repository. 9. He runs the scripts to get data for remote server to check and maintain the remote server from his desktop. 10. He restricts users to access youtube from this machine.