Security Admin security Plan

1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan. Submit by Friday of Week 4 11:59 PM EST in order to receive timely input.

2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.

Order # 12529

Title: Network Protocols

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, create and describe the information flow of an OSI model.

To begin, select a generic work environment, such as any office that would use a phone system, to use as an example to describe how this is done.

Also, complete the practice labs provided in the Virtual Resource Portal activity for this assessment. Use these labs and the Internet to gather the information necessary to create your own analogy essay of the flow of information through the OSI model. Your analogy will include network protocols and compare these against the OSI model.

Then, complete the following:

1.Create an OSI model for a generic work environment. You can use Microsoft Word to do this.

2.Write a report that addresses the following, based on the OSI model you created. ◦Provide an explanation of at least three different network protocols used in the OSI model.

◦Explain the purpose and role of at least three of the network protocols you identify.

◦Describe the importance of the work performed by the network protocols you identify. This may include how well they do with network security. Examples include TCP/IP traffic and port security.

◦Apply the concepts from the practice lab activities for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

Metadata

 Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

Need in a word document with no less than 25o words.

Execute Summary

The proposal will consist of the executive summary, communication plan, proposal introduction, policies and procedures, proposed solutions to the security vulnerabilities, and plans to continuously monitor the organization for malicious behaviors. 

I have the communication plan and policies and procedures. I just need a two page executive summary

Recursion with the Sierpinski Gasket

This week’s discussion has introduced working with graphics programming, particularly with respect to primitives and attributes. One of these applications is the Sierpinski gasket. Discuss the Sierpinski gasket.

In your answer, specifically think of and give a real-life scenario where:

  • The Gasket can be utilized.
  • Recursion can/cannot be applied.