Discussion

Description

For this discussion, you will be assessing the following help desk ticket below from Chikako (connectivity issue). Use the CompTIA 6-step troubleshooting process below to help figure out the connectivity issue.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable, implement preventative measures.
  6. Document findings, actions, and outcomes.

[Forwarded Ticket]

Assignee: Open

Raised by: Chikako Sato, buyer, Tokyo office

Category: Connectivity Issue

Priority: High

Message:

THIS IS URGENT. Chikako called me at the help desk, saying his computer is up and working but cannot log into the domain. He has a meeting in 25 minutes and needs files and the PowerPoint for the meeting!

I cannot take over their machine remotely nor can I ping it. Can you help?

-Jen

There are multiple potential solutions. You can pick one of the four below or have a different potential solution of your own.

  • bad cable
  • bad NIC
  • switch failure
  • DHCP server down

Focus on only one of the potential solutions for stepping through the six steps of the troubleshooting process. Answer the first four out of the six steps in your post. For the third CompTIA step, what would it take to prove your theory correct or incorrect? Example: If I do X and Y happens, then that is the issue. If Z happens, it is something else.

WU The Waterfall Linear versus Iterative Life Cycle Models Analysis

Description

Below is a chart showing the comparison between waterfall/linear life cycles and iterative life cycles. With a linear life cycle, the biggest risks are not usually apparent until the integration phase, which is near the end of the project. These projects fail only after spending a great deal of time and money. In contrast, iterative life cycles attempt to identify and address the biggest risk items first. If these risks cannot be resolved, the project fails quickly and much cheaper.

This comparison, along with others, shows why many software engineering projects have switched to an iterative life cycle. That being said, the waterfall/linear life cycle is still commonly used. Why would a customer or company choose to use the iterative life cycle over the waterfall/linear life cycle? What are the benefits to using the waterfall/linear life cycle?

In this Discussion, you answer these questions about iterative life cycles through the lens of a real-world case study.

To prepare:

Read “From Waterfall to Iterative Development—A Challenging Transition for Project Managers and “Changing the Paradigm of Software Engineering,” focusing on the risks and benefits of switching to the iterative life cycle, Attached below.

Post a summary of a case study in which an organization moved away from the waterfall/linear software development cycle to an iterative or agile life cycle. Explain the resulting changes to process, project plan, and product. 

University of The Cumberlands Risk Management Essay

Description

During this semester, we reviewed a number of areas in risk and risk management, risk assessment and the way in which companies can try and minimize their risk exposure. Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics. Since you have already examined several research articles, another way would be to examine previous dissertations in these areas. Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on risk, a model, framework, some approach to minimizing risk, etc. Here are some pointers that will help critically evaluate some viable topics:

  • Is the topic attainable for a first-time dissertation student?
  • Is the problem rooted in the literature?
  • Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
  • Is there a theoretical model or framework discussed?

Discuss the topic, the problem the model has been used in the research, and any present findings.

Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.

KSU Internet Redundancy Security and Network Management CWAN Routers Project

Description

You will design a secure network. You will do this by drawing a logical network diagram using the tool of your choice (it can even be hand drawn). You will need to show 2 separate gigabit WAN interfaces for redundancy and bandwidth aggregation purposes. You will need to show a dual wan router/firewall (no WiFi built in), 3 separate WAP’s, 8 IP cameras (default port 8000), 1 network video recorder (default port 80), 10 client PC’s, 10 IP phones, and 3 Windows servers (mail, NAS, web). Lookup the default ports for each device with ports not already specified and assume common ports. You will need to configure the router’s port forwarding. You will also need to use port translation to allow outside ports to be non-common non-default ports for security reasons (ports inside the network should be default). Design your network to be segmented with higher value equipment protected from high-risk equipment. Consider physical segments using separate media versus VLAN’s. While you do not need to specify manufacturer and model for the network devices, do specify what the logical attributes are for speed and ports.

Optional challenge 1: use a simulator such as Cisco Packet Tracer (https://www.netacad.com/courses/packet-tracer) or GNS3 (https://gns3.com/).

Optional challenge 2: design your network with IPv6 only.

APUS Computer Science Programming Code Project

Description

Directions

  1. Rewrite your program from Unit 5 so that it reads strings from the file and builds the list courses instead of defining all the data as part of your program itself.
    The file aspect should be the only thing that you change – the rest of the program logic should remain the same.
    Note that when reading from a file, each line contains a newline character, ‘n’, which will cause your table to be double spaced. See the string method .strip() in Chapter 9.5 for an easy way of fixing this.
  2. Add your test cases from the program in Unit 5 at the end of the text file.
    You can edit the text file with Notepad, or IDLE, or Thonny or any text editor on your system.

  1. Write a reflection in the comment box answering the following questions:
    1. In a sentence or two, what did you learn?
    2. In a sentence or two, what did you like about this project?
    3. In a sentence or two, what did you find confusing or would like to see done differently regarding this project?
    4. In a sentence or two, if you had another hour or two, what would you like to add to the project or how would you do things differently?

Management of Information Technology Paper

Description

Assignment Content

  1. Choose one of the 1 Security Topics from the Management of Information Security Book and write your final paper educating the reader on that topic. Use the sub-categories for each Security Topic presented in the book as a guide to your content for the paper.
    • Chapter 2 Compliance: Law and Ethics
    • Chapter 3: Governance and Strategic Planning for Security
    • Chapter 4: Information Security Polic
    • Chapter 5: Developing the Security Program
    • Chapter 6: Risk Management: Assessing Risk
    • Chapter 7: Risk Management: Treating Risk
    • Chapter 8: Security Management Models
    • Chapter 9: Security Management Practices
    • Chapter 10: Planning for Contingencies
    • Chapter 11: Security Maintenance
    • Chapter 12: Protection Mechanisms
    • This proposal should be an annotated outline of your paper. Use sample # 2 and 3 as your guide. The samples can be found here. Only write outlines describing what you are going to write about. Do not write paragraphs but make sure it is in outline form.
      Content for the paper should have the following at a minimum:
    1. Introduction to the topic
    2. A description of the each area of the topic
    3. How each area provides security for an organization
    4. What are the tools and methods used for each area
    5. What are the challenges in providing security and describe problems that can occur in each area
    6. A conclusion summarizing what you wrote

BIS 460 IWU Business Systems Analysis and Design Worksheet

Description

: Business Systems Analysis and Design

Getting Started

As you continue following this running case study, be sure to record answers for each instruction. Your results may be used in future assignments.

Upon successful completion of this assignment, you will be able to:

Describe functional requirements.

Explain why identifying user stories and use cases is the key to defining functional requirements.

Differentiate between the different information gathering techniques.

Examine the role of leadership in project management.

Instructions

  • Read Running Case Study “On the Spot Courier Services” at the end of Chapter 4.
  • Record your answers to questions 1–4 at the end of the case study in a Word document, titled “WS2 Class Diagram”. It should contain the finalized class diagram, including all your classes, attributes, primary keys, relationships, and multiplicity constraints.
  • Read Running Case Study “On the Spot Courier Services” at the end of Chapter 5.

Record your answer to question 1 at the end of the case study in a Word document, titled “WS2 Request a Pickup—Pickup a Package”.

When you have completed the assignments, save a copy for yourself and submit a copy to your instructor using the Assignment submission link. You should include the two Word documents, “WS2 Class Diagram” and “WS2 Request a Pickup—Pickup a Package”.

Taylor University Computer Science Essay

Description

Answer : 5 PAGES

Course: Emerging Threats and countermeas

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

——————————————————————————————————————————————

Answer : 3 PAGES

Course : Emerging Threats and countermeas

Review the article : Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

Silicon Valley University R and R studio Visual Analytics

Description

  1. get the structure of the gss_sm dataframe. What is the data type of race, sex, region and income? What do the levels refer to? 
  2. create a graph that shows a count of religious preferences grouped by region
  3. turn the region counts in percentages
  4. use dodge2() to put the religious affiliations side by side within regions
  5. show the religious preferences by region, faceted version with the coordinate system swapped
  6. using pipes show a 10 random instances of the first six columns in the organdata data set
  7. create a scatterplot of donors vs. year
  8. create a faceted set of line chart graphs showing donors for year for different countries
  9. create a boxplot of the data with coordinates swapped (because the mean is calculated in every boxplot and because R throws an error when trying to calculate means when there is missing data, add the na.rm = TRUE parameter to remove the NA’s).  
  10. Replace the boxplot with points
  11. jitter the points
  12. reduce the amount of jitter
  13. using organdata, create a table of summary statistics by country called by_country (show the mean of donors, gdp, health, roads, cerebvas, and the standard deviation of donors)
  14. what is the cerebvas column referring to?
  15. What conclusions can you draw from the previous plot?

CYB 302 UAGC Cybersecurity Risk Analysis Case Study

Description

Cybersecurity refers to the protection of sensitive information, specifically that which is stored or accessed via the Internet. It is critical to understand types of cyber vulnerabilities and how to approach the prevention and mitigation of such risk. Focus on how to identify potential vulnerabilities in modern organizations and how to create a strategic plan to analyze and control risk using governance and policy practices, management models and contingency planning. Should security beaches happen, you should be able to outline effective incident response execution.

Store My Bits International (SMBI) is a well-known cloud data storage company of which you are the Chief Information Security Officer (CISO). Recently, a phishing scheme was released that introduced multiple viruses into your environment. After spending over $2 million eradicating these threats, the CEO demands that a full cybersecurity analysis be performed and a strategic plan be drafted to reduce the company’s exposure to breaches. As part of the plan, he wants to know how vulnerabilities will be identified, how incidents will be responded to and what contingencies will need to be in place. Your job is to come up with the plan to address these issues.