Tuesday 20 October 2015

BUS 515 Week 9 Assignment 3

BUS 515 Week 9 Assignment 3


Due Week 9 and worth 320 points
Using the same scenario from Assignment 1, present the following findings to your Chief Executive Officer.
Create a presentation in a common format (PowerPoint or a similar program) with a minimum of twenty (20) slides and corresponding speaker notes in which you:
1. Determine which statistical technique you will employ to measure the quality characteristics of your organization. Provide examples to support the rationale.




2. Analyze the current facility location, and then use the three-step procedure to determine a new location.
3. Analyze the key concepts related to capacity planning and facility location for the new location.
4. Examine the current work system design, and determine your organization’s selected feasibility in the job design (i.e., technical, economic, behavioral). Assess key elements of the rationale in the work design competitive advantage.
5. Using the method analysis described in the textbook, defend the new change implementation process and the rationale for the change of method.
6. Develop a diagram showing network planning techniques, in which you use the program evaluation and review technique (PERT) and the critical path method (CPM).
7. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.  ·           
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.  ·           
Include corresponding speaker notes for each slide included in the presentation.  ·

CIS 534 Week 8 Discussion 2

CIS 534 Week 8 Discussion 2


"VPN Management Techniques" Please respond to the following:
  • Review and explain each of the following:  DMZ-Based, Bypass Deployment, and Internally Connected Deployment implementation.  Explain the architecture that you consider to be the preferred technique for a VPN.  Provide a rationale for your response.






CIS 534 Week 8 Discussion 2

CIS 534 Week 8 Discussion 1

CIS 534 Week 8 Discussion 1

CIS 534 Week 8 Discussion 1,
"VPN Management" Please respond to the following:
  • There are both commercial and open source types of Virtual Private Networks (VPNs) available.  Examine and explain each one of these.  Select the best type you recommend for a small business.  Provide a rationale for your response.




ANS;
There are both commercial and open source types of Virtual Private Networks (VPNs) available.  Examine and explain each one of these.  Select the best type you recommend for a small business.  Provide a rationale for your response.

CIS 534 Week 8 Discussion 1

CIS 534 Week 7 Discussion 2

CIS 534 Week 7 Discussion 2

CIS 534 Week 7 Discussion 2,

"Using Firewalls" Please respond to the following:
  • Some argue that operating systems host firewall software may offer sufficient security for some. Therefore, it is suggested before discounting the operating systems host firewall software that it should be evaluated.  Examine and evaluate Window’s 7 host software firewall and one other operating system host firewall (other than Linux).  Select the one that you feel is superior.  Provide rationale for your response. 



ANS:

"Using Firewalls" Please respond to the following:
  • Some argue that operating systems host firewall software may offer sufficient security for some. Therefore, it is suggested before discounting the operating systems host firewall software that it should be evaluated.  Examine and evaluate Window’s 7 host software firewall and one other operating system host firewall (other than Linux).  Select the one that you feel is superior.  Provide rationale for your response.

CIS 534 Week 7 Discussion 2

CIS 534 Week 7 Discussion 1

CIS 534 Week 7 Discussion 1

CIS 534 Week 7 Discussion 1,
"Firewall Management" Please respond to the following:
  • There are many recommendations, guidelines, and  best practices for firewall management.  List and explain five of these guidelines or practices.  Select two of best practices that you feel are more important than the others.  Provide rationale for your response.


ANS; • There are many recommendations, guidelines, and best practices for firewall management.  List and explain five of these guidelines or practices.  Select two of best practices that you feel are more important than the others.  Provide rationale for your response.
Recommended guidelines in this week lecture included:
....................



CIS 534 Week 7 Discussion 1

CIS 534 Week 6 Discussion 2

CIS 534 Week 6 Discussion 2

"Firewall Security Strategies" Please respond to the following:
  • Examine and explain four security strategies used for firewalls.  Explain the two that you would highly recommend being implemented.  Provide a rationale for your response. 


ANS:

"Firewall Security Strategies" Please respond to the following:
  • Examine and explain four security strategies used for firewalls.  Explain the two that you would highly recommend being implemented.  Provide a rationale for your response. 
Unified threat management (UTM) is the deployment of a firewall as an all-encompassing primary gateway security solution. The idea behind UTM is that you can use a single device to perform firewall filtering, IPS, antivirus scanning, anti-spam filtering, VPN endpoint hosting, content filtering, load balancing, detailed logging, and potentially other security services, performance enhancements, or extended capabilities. UTM has its advantages, mainly in the ability to deploy a single product and manage multiple security services from a single interface.
CIS 534 Week 6 Discussion 2

CIS 534 Week 6 Discussion 1

CIS 534 Week 6 Discussion 1

CIS 534 Week 6 Discussion 1,
"Firewall Basics" Please respond to the following:
  • A common concern with using firewalls is that they will slow communications.   If a firewall is installed properly it should not have any delay in communications and should operate at the network speed.  Examine and explain two or more techniques that can be used to improve a firewall’s performance.  If only one of these methods could be used which one would you recommend.  Provide a rationale for your response.



ANS:
Firewall Basics" Please respond to the following:
A common concern with using firewalls is that they will slow communications. If a firewall is installed properly it should not have any delay in communications and should operate at the network speed. Examine and explain two or more techniques that can be used to improve a firewall’s performance. If only one of these methods could be used which one would you recommend. Provide a rationale for your response.

The essence of anything is to understand the functions of what it is to provide in the IT arena. A fire wall is a unique device or software that is designed to control the flow of


CIS 534 Week 6 Discussion 1

CIS 534 Week 5 Discussion 2

CIS 534 Week 5 Discussion 2

CIS 534 Week 5 Discussion 2,

"Cloud Storage" Please respond to the following:
  • Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether or not you would recommend using cloud backup storage.  Provide a rationale for your response.




ANS:

Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether or not you would recommend using cloud backup storage.  Provide a rationale for your response.
Cloud backup is a type of service through which cloud computing resources and infrastructure are used to create, edit, manage and restore data, services or application backup.


CIS 534 Week 5 Discussion 2

CIS 534 Week 5 Discussion 1

CIS 534 Week 5 Discussion 1
Network Security Storage " Please respond to the following:
  • Examine the prevalence of honeypots and honey nets?  Evaluate the advantages and disadvantages of using each.   Explain which one of the two you would recommend your organization use and why?  Provide a rationale for your response.
Bottom of Form


ANS;

Network Security Storage " Please respond to the following:
Examine the prevalence of honeypots and honey nets? Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why? Provide a rationale for your response.
What is Honeypots?  “A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer
Network Security Storage " Please respond to the following:
  • Examine the prevalence of honeypots and honey nets?  Evaluate the advantages and disadvantages of using each.   Explain which one of the two you would recommend your organization use and why?  Provide a rationale for your response.
Bottom of Form



ANS;

Network Security Storage " Please respond to the following:
Examine the prevalence of honeypots and honey nets? Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why? Provide a rationale for your response.
What is Honeypots?  “A honey pot is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer
CIS 534 Week 5 Discussion 1

CIS 534 Week 5 Assignment 1

CIS 534 Week 5 Assignment 1 Submission
CIS 534 Week 5 Assignment 1 Defense in Depth,

Assignment 1: Defense in Depth
Due Week 5 and worth 70 points

Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

Corporate Site (Chicago)
  • All servers exist here (Web server, file server, print server, mail server, ftp server)
  • Connection to the Internet (50mbps)
  • 300 employees who only need access to local corporate resources and the Internet



1 Remote Site (8 miles away)
  • 20 employees who need access to all resources at corporate  plus the Internet
  • Connection to the Internet (3mbps)
Write a four to five (4-5) page paper in which you:
  1. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
    1. All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)
    2. The interconnections between network devices
    3. The end user (client) devices (desktops, laptops)
    4. The Internet cloud, generically, to represent your network’s interface to the Internet
Note: The graphically depicted solution is not included in the required page length.
  1. Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
  2. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Identify network security tools and discuss techniques for network protection.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.


CIS 534 Week 5 Assignment 1 Submission

CIS 534 Week 4 Discussion 2

CIS 534 Week 4 Discussion 2


CIS 534 Week 4 Discussion 2,

"Protecting the System" Please respond to the following:
  • There are many techniques that are used to harden a system. Examine the various techniques that are used and select two that you would recommend being used in your organization and two that you would not recommend.  Provide a rationale for your response.



ANS:

  • There are many techniques that are used to harden a system. Examine the various techniques that are used and select two that you would recommend being used in your organization and two that you would not recommend. Provide a rationale for your response.
  • ............................................


CIS 534 Week 4 Discussion 2

CIS 534 Week 4 Discussion 1

CIS 534 Week 4 Discussion 1

CIS 534 Week 4 Discussion 1,

"Network Infrastructure" Please respond to the following:
  • Many times in the IT world redundancy is avoided.  However, some state that redundancy is part of the recommended planning process for networks and network security.  Examine network planning and determine what your examination finds,indicating that redundancy is recommended.   Explain what is being recommended to be redundant and whether or not you agree.  Provide a rationale for your response.


ANS;

  • Many times in the IT world redundancy is avoided. However, some state that redundancy is part of the recommended planning process for networks and network security. Examine network planning and determine what your examination finds, indicating that redundancy is recommended. Explain what is being recommended to be redundant and whether or not you agree. Provide a rationale for your response.
"Network Infrastructure" Please respond to the following:
  • Many times in the IT world redundancy is avoided.  However, some state that redundancy is part of the recommended planning process for networks and network security.  Examine network planning and determine what your examination finds,indicating that redundancy is recommended.   Explain what is being recommended to be redundant and whether or not you agree.  Provide a rationale for your response.



ANS;

  • Many times in the IT world redundancy is avoided. However, some state that redundancy is part of the recommended planning process for networks and network security. Examine network planning and determine what your examination finds, indicating that redundancy is recommended. Explain what is being recommended to be redundant and whether or not you agree. Provide a rationale for your response.

CIS 534 Week 4 Discussion 1

CIS 534 Week 3 Discussion 2

CIS 534 Week 3 Discussion 2



"Network Security Threats and Issues" Please respond to the following:
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  Examine the many different types of attacks and select the two that you believe are the easiest for success and why you consider these the easiest for success.  Provide a rationale for your response.  Include an explanation as to how the hacker tools are used.




ANS:
"Network Security Threats and Issues" Please respond to the following:
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  Examine the many different types of attacks and select the two that you believe are the easiest for success and why you consider these the easiest for success.  Provide a rationale for your response.  Include an explanation as to how the hacker tools are used.
A denial of service (DoS) attack interrupts the normal patterns of traffic,
"Network Security Threats and Issues" Please respond to the following:
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  Examine the many different types of attacks and select the two that you believe are the easiest for success and why you consider these the easiest for success.  Provide a rationale for your response.  Include an explanation as to how the hacker tools are used.



ANS:
"Network Security Threats and Issues" Please respond to the following:
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  Examine the many different types of attacks and select the two that you believe are the easiest for success and why you consider these the easiest for success.  Provide a rationale for your response.  Include an explanation as to how the hacker tools are used.
A denial of service (DoS) attack interrupts the normal patterns of traffic,


CIS 534 Week 3 Discussion 2

CIS 534 Week 3 Discussion 1

CIS 534 Week 3 Discussion 1

Network Security Threats and Issues" Please respond to the following:
  • There are a wide variety of hacker tools.  Perform a search on the World Wide Web and review the hacking tools that are available.  Evaluate the available tools and explain which one(s) are the predominant tools that you found during your search.  Analyze the predominant ones discussed and available for download?




  • Network Security Threats and Issues" Please respond to the following:
    • There are a wide variety of hacker tools.  Perform a search on the World Wide Web and review the hacking tools that are available.  Evaluate the available tools and explain which one(s) are the predominant tools that you found during your search.  Analyze the predominant ones discussed and available for download?
CIS 534 Week 3 Discussion 1

Thursday 8 October 2015

HSA 599 Week 7 Assignment 2

HSA 599 Week 7 Assignment 2

Assignment 2: Developing a Strategic Approach
Due Week 7 and worth 300 points

For this assignment, continue your role as the administrator of the organization you created for Assignment 1.
                        
Write a six to eight (6-8) page paper in which you:
1.        Create a mission and vision statement for your organization. Determine three (3) specific strategic goals that align with the ideals in those two (2) statements.
2.        Recommend one (1) specific adaptive strategy or combination of adaptive strategies that would be most effective in ensuring that the organization achieves its strategic goals. Support your recommendation with examples of the successful application of the recommended strategy or strategies.
3.        Outline three (3) service delivery and three (3) support components that will be necessary elements of the organization’s value chain geared toward achieving the strategic goals that you identified. Examine, in detail, the main reasons why the delivery and support components of the value chain that you identified are essential to the achievement of the organization’s goals.
4.        Suggest one (1) specific approach to maintaining the selected adaptive strategy or strategies in order to ensure that the organization achieves its mission and vision.
5.        Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites to not qualify as academic resources.

Your assignment must follow these formatting requirements:
·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:
·         Differentiate between strategic management, strategic thinking, strategic planning, and managing strategic momentum.
·         Examine the organizational value chain, including the components of the service delivery and support activities.
·         Analyze the roles of and the relationships among organizational mission, vision, values, and strategic goals, and why they are called directional strategies.
·         Apply analytic skills to define strategic problems, generate and evaluate strategic alternatives, and develop implementation tactics.
·         Examine the nature of directional, adaptive, market entry, and competitive strategies.
·         Use technology and information resources to research issues in the strategic management of health care organizations.
·         Write clearly and concisely about strategic management of health care organizations using proper writing mechanics.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.



HSA 599 Week 7 Assignment 2

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...