security architecture solution as a diagram

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Cloud Provider Evaluation

 

THIS ASSIGNMENT  MUST BE SUBMITTED IN FOUR SEPARATE PARTS.  The first submission will be  Steps 2, 3, and 4, Next will be Steps 5,6, and 7, Then Step 8, and  Finally Step 9

INTRO:

Since you have become familiar with foundations of cloud computing  technologies, along with their risks and the legal and compliance  issues, you will now explore cloud offerings of popular cloud providers  and evaluate them to recommend one that would be the best fit for  BallotOnline.

In this project, you will first learn about networking in the cloud  and auxiliary cloud services provided by cloud vendors. Next, you will  explore cloud computing trends, best practices, and issues involved in  migrating IT deployments to the cloud, as well as typical architectures  of cloud deployments. Then, you will apply your findings to propose a  general architecture for BallotOnline’s cloud deployment to best address  the company’s business requirements.

Once you have selected a deployment architecture, you will research  two leading cloud vendors: Amazon Web Services (AWS) and Microsoft  Azure. Exploring and comparing the tools available for application  migration will enable you to recommend a vendor to the executives in  your final report. The final deliverable is a written report to  BallotOnline management, describing the results of your research and  recommending the cloud deployment architecture and the vendor for its  deployment, with justification.

Your final report should demonstrate that you understand the IT needs  of the organization as you evaluate and select cloud providers. The  report should include your insights on the appropriate direction to take  to handle the company’s IT business needs. You will also be assessed on  the ability to integrate relevant risk, policy, and compliance  consideration into the recommendations, as well as the clarity of your  writing and a demonstration of logical, step-by-step decision making to  formulate and justify your ideas.

Step 1: Research Networking and Auxiliary Services in the Cloud

The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of cloud providers (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Providers),  BallotOnline is considering using Amazon Web Services (AWS) and  Microsoft Azure, two of the top providers in the market. BallotOnline’s  executives want you to help determine which would be the best provider  for the organization.

You will start with learning about internet networking basics (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Internet%20Networking%20Basics) and cloud networking (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Networking). You will also research many cloud services (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Services)  that cloud providers make available to their customers to help them  take full advantage of cloud service and deployment models.

Step 2: Research Cloud Trends, Best Practices, and Migration Issues

The cloud computing revolution is redefining ways that companies of  all sizes use information technology. The cloud landscape shifts  rapidly, and current trends reflect this rapid pace of change. You  likely got an idea about this in the last step when you conducted  research on cloud architecture. Now, continue gathering information for  your final report by assessing:

In a separate piece of paper Discuss: Cloud Trends and Migration Issues, and post your findings.

Post your thoughts about new trends in cloud computing as well as  migration strategies for cloud deployments. Here are some possible  discussion topics:

1.   Which trends in the cloud computing industry do you consider the most important?

2.   What kind of future developments in the cloud industry would benefit companies like BallotOnline the most?

3.   Considering that BallotOnline would migrate the existing  application to the cloud, what elements should its migration strategy  embrace?

Your discussions will be helpful in determining proposed deployment architecture as well as a cloud vendor for BallotIOnline.

Step 3: Research Typical Architectures of Cloud Deployments

In the previous step, you considered best practices and trends in the  cloud industry. Next, you will have to look at the kinds of  architectures needed for cloud.

Because most elements of cloud deployments are implemented in a  virtualized environment controlled by software, the degree of freedom in  defining your deployment of cloud reference models is unprecedented (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Cloud%20Reference%20Models).  You can define the number of virtual servers required and the  configuration, and even change them dynamically as needed. You can also  define your virtual local area networks (LANs) and subnets, and place  servers in them to implement network security requirements.

The basic cloud deployment components are cloud consumer, cloud  provider, and cloud carrier, with cloud brokers and auditor as possible  additions.

Typical cloud architectures  (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Typical%20Cloud%20Architectures)  of cloud deployments vary from single server (suitable for  proof-of-concept engagements) and multiserver architectures with various  servers carrying different software components and occupying different  security zones, to geographically dispersed deployments to achieve high  availability, resilience, and speed of delivery. There are several issues to consider when selecting a server architecture, including cost, scalability, performance, and use of management (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Issues%20to%20Consider%20When%20Selecting%20a%20Server%20Architecture).

For this step, research the typical architectures of cloud  deployments and begin to consider what might be a good fit for  BallotOnline. Discuss your findings in a separate piece of paper and Discuss: Cloud Architectures.

Describe your findings about typical cloud deployment architectures. In particular, provide answers to these questions:

1.   Which features of these architectures would be difficult to implement in traditional, noncloud IT deployments?

2.   Which architectural elements would be important for the BallotOnline deployment?

3.   Which architectural elements are less important for BallotOnline?

Step 4: Propose Cloud Architecture for BallotOnline Deployment

Now that you have looked into cloud architectures, in this step, you  will propose the cloud deployment architecture for BallotOnline,  applying the knowledge of typical architectural elements of cloud  deployment from the project’s initial step. You will also consider  trends and migration issues from a previous step. Your recommendation  should consider the company’s business requirements.

Recall that the company has an existing web application that it wants  to move to the cloud, and also that the company wants to expand its  business to other parts of the world. In earlier projects, you learned  about and analyzed the IT business requirements for BallotOnline. Among  them were demands for application and data security, data encryption, and separation for deployments overseas (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Application%20and%20Data%20Security). Also, the application should handle load peaks during election times in different regions.

Specific technical requirements state that BallotOnline is a web  application, written using the popular open-source LAMP (Linux, Apache,  MySQL, PHP) software suite and the PHP application (https://lti.umuc.edu/contentadaptor/page/topic?keyword=PHP%20Application).

Action Item

Describe your proposed architecture by submitting a report with a  drawing of the architecture (hand-drawn or computer-created) diagram and  explaining its elements in a separate piece of paper.

There are some sample drawings here under typical cloud architectures to give you an idea (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Typical%20Cloud%20Architectures).

Step 5: Research AWS

You’ve described your proposed architecture and included a diagram to  provide leadership a way to envision the system. Now, it’s time to look  closely at the leading cloud providers to see if their services will  fit BallotOnline’s needs.

Each cloud provider provides a unique profile of services, so it is  good practice to compare cloud vendors and evaluate their reliability,  performance, ease of use, cost, security and compliance measures. As  more providers enter the marketplace, many will specialize on specific  needs and use cases, making this evaluation even more critical.

In this step, you will explore AWS and assess the feasibility of this platform for deploying the architecture proposed in the previous step (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Explore%20AWS). You should also consider issues related to AWS Pricing (https://aws.amazon.com/pricing/).

Based on your research, determine to what degree AWS supports the  elements of the BallotOnline business and technical requirements.

Share your thoughts in a separate piece of paper and Discuss: Amazon Web Services Feasibility

Post your findings on the features and services of AWS, including:

1.   Do you find the AWS offering feature-rich? Which features do you  like the most? Do you feel there are some features missing?

2.   What features support architectural elements such as  auto-scaling, load balancing, application auditing, or multigeography  deployments?

3.   Does the website, tutorials, and services usage seem easy and user-friendly?

Step 6: Research Microsoft Azure

Now that you have had a chance to research AWS, it’s time to explore Microsoft Azure (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Explore%20Microsoft%20Azure), another cloud provider that could be used to deploy the proposed architecture. You should also consider issues related to Microsoft Azure pricing (https://azure.microsoft.com/en-us/pricing/).

Based on your research, determine to what degree Microsoft Azure  supports the elements of the BallotOnline business and technical  requirements. Share your thoughts in a separate piece of paper and Discuss: Microsoft Azure Feasibility 

Post your findings on the features and services of Microsoft Azure, including:

1.   Do you find the Azure offering feature-rich? Which features do  you like the most? Do you feel there are some features missing?

2.   What features support architectural elements like auto-scaling,  load balancing, application auditing, multi-geography deployments?

3.   Does the website, tutorials, and services usage seem easy and user-friendly?

Step 7: Generate AWS Proof of Concept (POC)

With your research complete, you will now deploy a simple one-page  PHP application to the AWS cloud. It will allow you to explore  deployment methods, ease of use, provisioning speed, etc., for the  Amazon cloud.

Action Item

As you may have already discovered in your research on AWS, it makes a cloud migration tool called Elastic Beanstalk available for customers to migrate their existing applications into the AWS cloud (https://aws.amazon.com/elasticbeanstalk/). We will use this tool to deploy your AWS proof of concept (POC) (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Proof%20of%20Concept%20(POC)).

Follow the steps in the AWS lab instructions to complete your AWS POC (https://content.umgc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/4/AWS%20Lab%20Instructions.pdf).

In a word single page, upload the URL linking to your application running in the AWS portal.

Step 8: Generate Azure Proof of Concept (POC)

Now that your AWS POC is complete, you can proceed with a similar POC deployment for the Microsoft Azure cloud.

Action Item

Follow the steps in the Azure lab instructions to complete your Azure POC (https://content.umgc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/3/MicrosoftAzureLabInstructions.html).

In a word single page, upload the URL linking to your application running in the Azure portal.

You are ready for the last step: writing the final report with  recommendations on the cloud providers for the BallotOnline executives.

Step 9: Write the Final Report Evaluating AWS and Azure Providers

Now that you have completed your research, shared your ideas with  colleagues, and explored the two vendors, it is time to compile your  findings and recommendations for the BallotOnline executives. You may  find these considerations for cloud provider selection helpful in making your decisions (https://lti.umuc.edu/contentadaptor/page/topic?keyword=Considerations%20for%20Cloud%20Provider%20Selection).

Use the Final Report Evaluating AWS and Azure Providers Template  to write your report and submit your work to the classroom  (https://content.umuc.edu/file/c91e7ce0-9040-442d-b244-0b511f07cbad/3/FinalReportEvaluatingAWSandAzureProvidersTemplate.docx).

Rubrics:

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below,  which your instructor will use to evaluate your work. A good practice  would be to use each competency as a self-check to confirm you have  incorporated all of them. To view the complete grading rubric, click My  Tools, select Assignments from the drop-down menu, and then click the  project title.

2.2: Locate and access sufficient information to investigate the issue or problem.

2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

2.4: Consider and analyze information in context to the issue or problem.

2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

5.4: Articulate insights to leadership on the appropriate course of direction on the identified IT business needs.

6.1: Articulate the systems architecture of the cloud – cloud infrastructure, cloud service, cloud platform, and cloud storage.

6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).

6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs.

ETCM-Research-6

Need this research paper by Thursday USA time. (5 days from now).

5 pages without references and Title page. Follow APA 7 format and citations.

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Microsoft Access Project

The instructions for creating the data base is in the link below.

https://lms.pennfoster.edu/nodes/microsoft-access-graded-project-unit-cloned-1579636842/objectives/create-a-home-inventory-database-that-can-be-referred-to-in-of-20180621-cloned-1579636842/resources/graded-project-microsoft-access-2016-resource-54740-1-cloned-1579636842

bitcoin economics research paper

 Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

5 pages , APA format, 3 scholar references

Conflict Managment Dis 3

 In a hostage crisis, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting the terrorist once his hostages are released? 

Need a 400 word content with minimum 2 references in APA