Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

infoTech

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Spr1.2

 Assignment 1

In Chapter 2, the author talks about four key stages with regards to data visualization workflow. Select one key stage and expand on the author’s comments about the stage.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

· BitLocker

· BitLocker To Go

· File encryption via Encrypting File System (EFS)

· Folder encryption via EFS

Answer the following question(s):

Ø Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 2.

Refer to the “Project Part 2-Access Controls Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

discuss some key terms in business.

Discussion: This week we discuss some key terms in business.  Please define what a business process is and note the tools of documentation within business processes and why they are important to understand.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Use Sage to solve the following problems.

Use Sage to solve the following problems. 

For this questions assume that we are using dsa with domain parameters:

p = 7,877,914,592,603,328,881

q = 44449

g = 2,860,021,798,868,462,661

Use these domain parameters to determine if the signatures are valid in parts (a)-(c)

  1. public key y = 3798043471854149631, hash value H = 59367, and signature (r,s) = (31019, 4047)
  2. public key y = 1829820126190370021, hash value H = 77241, and signature (r,s) = (24646, 43556)
  3. public key y = 4519088706115097514, hash value H = 48302, and signature (r,s) = (36283, 32514)

Perform a signing operation for the below parts (a)-(b)

  1. private key x = 8146, hash value H = 22655
  2. private key x = 1548, hash value H = 32782

Discussion

 

At the end of chapter 8,  case studies and examples are presented about actual exploited risks. Choose Critical Infrastructure case studies and describe the risk that was exploited.  Also,  tell how you think that exploit could be avoided using proper technology and security policies.  

Your main post needs to be at least 300 words long 

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

essay- Cloud Computing

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Data Storage in the Cloud, Cloud Storage Device Mechanisms, or Collaboration in the Cloud.

You may choose to review only scholarly peer reviewed articles and papers.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier 

URL: https://ucumberlands.libguides.com/security