ITNA359 Network Administration – discussion 3

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Research the Web, and select and discuss 3 tools that can be used to test network reliability.

Discussion Board Assignment Guidelines

   Research network reliability tools, and select 3 of them to analyze.

   Answer the following questions:

                           What is the objective of each tool?

                           How does each tool function with regard to network reliability testing?

   Post a new topic to the Discussion Board that contains your answers to the 2 questions above.

   Respond to 2 other students’ posts on the Discussion Board, and critique their answers.

   Use APA references and citations to support your assertions.

                           Do not include a table of contents or abstract.

Your submitted assignment (60 points) should include the following:

   40 Points: Your Discussion Board topic containing your responses to the 2 questions in the assignment guidelines

 

20 Points: Responses to 2 other students’ Discussion Board posts.

structured Assignment_ Preventative controls

Detection Controls vs. Prevention Controls – CompTIA Security+ SY0-301: 3.6
Duration: (6:06)

User: Professor Messer – Added: 6/9/11

 

 

Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system. Where feasible and cost effective, preventive methods are preferable to actions that may be necessary to recover the system after a disruption. Preventative controls include the identification of effective contingency planning preventive controls and maintaining these controls on an ongoing basis. Identify and incorporate a variety of preventive controls into your BCP. Some of the listed controls are the following:

  • Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls);
  • Gasoline- or diesel-powered generators to provide long-term backup power;
  • Air-conditioning systems with adequate excess capacity to prevent failure of certain components, such as a compressor;
  • Fire suppression systems;
  • Fire and smoke detectors;
  • Water sensors in the computer room ceiling and floor;
  • Heat-resistant and waterproof containers for backup media and vital non electronic records;
  • Emergency master system shutdown switch;
  • Offsite storage of backup media, non-electronic records, and system documentation;
  • Technical security controls, such as cryptographic key management; and
  • Frequent scheduled backups including where the backups are stored (onsite or offsite) and how often they are recirculated and moved to storage.

The rubric for this assignment can be viewed when clicking on the assignment link.

 

IT 2

 

CMPT641 IT for Managers Assignments Assignment 2

 

·       Read the questions through and make sure you understand them. The questions are open- ended, and you are expected to do your own research on each topic to answerthem.

·       Make sure you don’t simply list or copy and paste information from your sources. I expect you to synthesize your findings with you own words. All papers are submitted to Turnitin.

·       Use 2 pages per question to answer them. [Title & references pages excluded]. Use Times Fonts (12), leftaligned.

·       Upload your assignments to the course website according to the deadlinesposted.

·       Remember, I am looking for your insight not other sources’ opinions. Ensure that cite and list the references you use (max. 10% of paper content) usingAPA.

 

HINTS:

DO NOT REPEAT the question – paraphrase it as a heading.

INCLUDE an Introduction and a Conclusion. Hint: introduce the reader to the content of your paper. You could have a brief introduction/conclusion for each part (question).

 

1.     Question: BusinessIntelligence

 

What is a Business Intelligence system? How does it work? How can a Business Intelligence system help companies, large or small, to build or maintain competitive advantage? What concerns a business owner should have before investing in a Business Intelligence project?

 

2.     Question: Knowledge ManagementChallenges

 

Discuss the main challenges faced by companies planning to implement a Knowledge Management strategy. If you were a consultant, how would guide top management in terms of overcoming those challenges.

 

3.     Question: InformationSecurity

 

Discuss at three main information security challenges faced by organizations. Focus on prevention and troubleshooting.

week 7 case study

Case Study 3: Carlson Companies 
Due Week 7 and worth 80 points

Read the case study titled “Carlson Companies” found at the end of Chapter 10.

Write a three to four (3-4) page paper in which you:

  1. Assess how the Carlson SAN approach would be implemented in today’s environment.
  2. Compare the pros and cons of consolidating data on a SAN central data facility versus the dispersed arrangement it replaces.
  3. Evaluate the issues raised from the Carlson SAN mixing equipment from a number of vendors and determine the management options for dealing with this type of situation.
  4. Justify the reduction of administration and management of storage networking through Carlson’s IP SAN.
  5. Assess how cloud computing could be used by Carlson instead of a SAN. Create a diagram using Visio or its open source alternative software to illustrate the use of cloud computing. Note: The graphically depicted solution is not included in the required page length.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast among local area and wide area network technologies and architectures.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

CMIT312 – week 7

Which of the following are Bluetooth security issues? (Select all that apply.)

The SymbOS/MultiDropper.CG malware targets the Symbian operating system and comes bundled with different multidropper mobile phone ____________.

____________ is a method that attackers use to hijack BlackBerry connections and make use of the BlackBerry environment to penetrate the security perimeter and attack the host network.

This USB hacking tool runs in the background and automatically downloads the content of any USB drive connected to the system. This tool can be integrated with other hacking tools such as USB Hacksaw and scripts to send downloaded files to remote locations through encrypted e-mail or FTP.

When this is used in an RFID tag, a command can be sent to deactivate the tag and can never be reactivated

This Bluetooth attack causes no damage to the targeted device but may be annoying and disruptive to its victims, similar to e-mail spamming.

This Bluetooth attack allows the attacker to control the Bluetooth-enabled device. After taking control, the attacker can initiate phone calls and send and read SMS messages.

In this Bluetooth attack, the attacker poses as one of the two devices and sends a message to the other, claiming that the device has forgotten the link key and prompting the devices to pair again and generate a new link key. The attacker then uses the new key to eavesdrop on communication between the two devices.

USB drives have a common design flaw: the improper storage of ____________ in the EEPROM.

This cryptographic key is used to generate working session keys for the encrypted exchange of information between two Bluetooth devices.

The ____________ worm spreads by copying itself to removable storage devices as the hidden file oso.exe and creating a hidden Autorun.inf. The worm may also copy itself to the device with nonalphanumeric filenames and with a PIF extension.

A mobile device that is locked, damaged, or destroyed is often called a ____________ device.

____________ is a security tool that alerts system administrators anytime a removable USB storage device is used on any computer on the network.

Electrical attacks on USB drives involve ____________ access to a device’s circuit board.

What type of attack on a USB device driver can allow an attacker to bypass Windows security and gain administrator access on the host machine?

____________ usually happens when large volumes of RFID tags are read together in the same radio-frequency field.

Which type of RFID tag has a read-only chip?

This Bluetooth attack causes a buffer overflow in the victim’s device and is similar to an ICMP ping of death attack.

____________ is a method used to allow the installation of third-party software on an iPhone or iPod Touch device.

 

____________ is a communication service standardized in the GSM mobile communication system that allows exchange of short text messages between mobile telephone devices.

risk management

1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment for
an IT Infrastructure lab in this lab manual, what is the primary focus of your message to executive
management?
3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have on
prioritizing your identified risks, threats, and vulnerabilities?
4. What risk-mitigation solutions do you recommend for handling the following risk element: User
inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned
computers?
5. What is a security baseline definition?
6. What questions do you have for executive management to finalize your IT risk-mitigation plan?
7. What is the most important risk-mitigation requirement you uncovered and want to communicate
to executive management? In your opinion, why is this the most important risk-mitigation
requirement?
8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-term
risk-mitigation tasks and ongoing duties?
9. For which of the seven domains of a typical IT infrastructure is it easy to implement riskmitigation
solutions but difficult to monitor and track effectiveness?
10. Which of the seven domains of a typical IT infrastructure usually contains privacy data in
systems, servers, and databases?
11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it
on local hard drives and disks?
12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?
13. When considering the implementation of software updates, software patches, and software fixes,
why must you test the upgrade or software patch before you implement it as a risk-mitigation
tactic?
14. Are risk-mitigation policies, standards, procedures, and guidelines needed as part of your longterm
risk-mitigation plan? Why or why not?
15. If an organization under a compliance law is not in compliance, how critical is it for your
organization to mitigate this noncompliance risk element?

IT Evaluation and Implementation II Unit III DBs

IT Evaluation & Implementation II (Unit III) Assessment

 

DUE DATE:    FEB 8, 2015

 

1.  Functional organizations are described by organizational charts.  Explain why a temporary 

 

organization such as a project can benefit from using an organizational chart.  Your response 

 

should be at least 75 words in length.  You are required to use at least your textbook as source

 

material for your response.  All sources used, including the textbook, must be referenced; 

 

paraphrased and quoted material must have accompanying citations.

 

2.  Identify the four elements of the project human resource knowledge area and briefly describe 

 

each.  Your response should be at least 75 words in length.  You are required to use at least your 

 

textbook as source material for your response.  All sources used, including the textbook, must be 

 

referenced; paraphrased and quoted material must have accompanying citations.

 

3.  Identify and briefly describe some tools project managers can use for determining the 

 

resources in an organization that are available for scheduling.  What are some rules of thumb that 

 

project managers can use when assigning resources?  Your response should be at least 75 words 

 

in length.  You are required to use at least your textbook as source material for your response. 

 

All sources used, including the textbook, must be referenced; paraphrased and quoted material 

 

must have accompanying citations.

 

4.  Identify which of Covey’s “7 Habits” you find to be most compelling, and describe how you 

 

would incorporate it in your project management style.  Your response should be at least

 

 75 words in length.  You are required to use at least your textbook as source material for your 

 

response.  All sources used, including the textbook, must be referenced; paraphrased and

 

quoted material must have accompanying citations.

I would like to know if you can help me with the answer for this homework (below on description field)

FORMAL REPORT ( I choose the topic about THE CORE OF TECHNOLOGY AND COMMERCIAL BANKS RELATIONS)

The Final Project for this class is a Formal Report. It is due on Wednesday of Week Four by 11:59 PM Eastern time. You will follow the format found on pages 417-430 of your textbook. Please review the sections that should be included as indicated below.

Your paper will need to identify a problem and three potential solutions. The topic should be appropriately related to your area of study or a professional matter. The topic should be specific and career based. Consider issues such as occupational safety, cultural diversity, violence or bullying, staffing or personnel, technology, communication, policy or compliance. Avoid general topic or topics unrelated to professional life. The questions on page 413 (24.8 and 24.9) offers some guidance on topics, you may review these for example only. These are not the topic selections.

REQUIREMENTS

  • 1500- 1800 minimum word requirement includes the LETTER OF TRANSMITTAL (no more than one page), EXECUTIVE SUMMARY(no more than one page), and BODY of the report (minimum of 1000 words). The Title Page, Table of Contents, and the References Page DO NOT count in the required word count. Papers with less than 1500 words will earn a grade deduction based on a percentage of words submitted to words required. The key here is to address the material directly.
  • You must include five appropriate sources. Use of the Keiser eLibrary databases is strongly recommended.
  • You must use in-text citations in APA Style. NOTE: The example in the book uses MLA format. APA format is required for citing sources and reference page. Manuscript format should follow the book.

plagiarism free week 4

  • If you are using the Blackboard Mobile Learn iOS App, please click “View in Browser”
    Click the link above to submit your assignment.

    Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
    Instructors, training on how to grade is within the Instructor Center.

    Case Study 2: Design Process
    Due Week 4 and worth 90 points

    You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. 
     
    Write a four to five (4-5) page paper in which you:
    1. Suggest the prototyping technique you would use for this system and support your rationale.
    2. Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 
    3. Explain each stage of the management plan and justify your rationale.
    4. Estimate the length of time it will take to complete each stage of the management plan.
    5. Compare and contrast the self-check-in interface with the interface a receptionist would use.
    6. Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not included in the required page length.
    7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
    Your assignment must follow these formatting requirements:
    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
    • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted. 
    The specific course learning outcomes associated with this assignment are:
    • Analyze and evaluate interface design models.
    • Develop an interface design plan that addresses and solves a proposed business problem.
    • Use technology and information resources to research issues in human-computer interaction.
    • Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.
    Click here to view the grading rubric for this assignment.

Normalization of Database

Write a two to three (2-3) page paper in which you:

1.Describe the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.

2.Provide one (1) example that is relevant to a college environment that illustrates reasons for converting database tables to the First, Second, and Third Normal Forms.

3.Explain typical situations when denormalizing a table is acceptable. Provide one (1) example of denormalizing a database table to justify your response.

4.Explain the significant manner in which business rules impact both database normalization and the decision to denormalize database tables.

5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

•Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

 

The specific course learning outcomes associated with this assignment are:

•Recognize the purpose and principles of normalizing a relational database structure.

•Design a relational database so that it is at least in 3NF.

•Use technology and information resources to research issues in database systems.

•Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

 

Thoroughly described the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.

Thoroughly provided one (1) example that is relevant to a college environment that illustrates reasons for converting database tables to the First, Second, and Third Normal Forms.

Thoroughly explained typical situations when denormalizing a table is acceptable. Thoroughly provided one (1) example of denormalizing a database table to justify your response.

Thoroughly explained the significant manner in which business rules impact both database normalization and the decision to denormalize database tables.

Exceeds number of required references; all references high quality choices.