Tuesday 15 December 2020

CIS 527 Contingency Plan

 

 CIS 527 Contingency Plan

 

Contingency Plan

DLIS needs to prepare for the prevailing computer incidents of today and tomorrow. A computer incident response team (CIRT) plan can help prepare an organization for many computer security incidents that might occur.

For this assignment, you will discuss a CIRT plan, which is often used as a contingency plan, for DLIS. A system administrator noticed yesterday that several of the file servers at HQ were responding very slowly. The DLIS headquarters (HQ) handles all incidents, so the plan will have its roots at HQ. Read a recent article, like the latest IBM Threat Intelligence Index, to gather information on current threats and remember to leverage the BCP and DRP you generated for the organization last week.





https://hwacer.com/Tutorial/cis-527-contingency-plan/







Write a 5–6 page paper in which you:

  1. Describe purpose and primary elements of a CIRT plan.
  2. Discuss the relationship between a CIRT plan and risk management.
  3. Discuss the five Ws (who, what, where, when, and why) found in a CIRT plan in regard to the incident given in the above scenario.
  4. Explain how DLIS can leverage their BCP and DRP to develop and support its CIRT plan.
  5. Explain how you think threats will evolve to impact DLIS in the future and how the CIRT plan should be updated to combat them.
  6. Discuss at least five best practices to follow when creating a CIRT plan.
  7. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good source for resources.

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

 

Friday 11 December 2020

Term Paper Project Designing a Secure Network

 

Term Paper Project Designing a Secure Network

 

Term Paper Project: Designing a Secure Network
Due Week 10 and worth 210 points
This term paper involves putting together the various concepts learned throughout this
course. You are tasked with designing the most secure network possible, keeping in
mind your goal of supporting three (3) IT services: email, file transfer (centralized), and
VPN. Your first step is to design a single network capable of supporting three (3)
different services. Once you have fully designed your network, you will need to provide
three (3) workflow diagrams explaining how your designed network handles the three (3)
different transactions. The first is an internal user sending an email using his / her
corporate email address to a user on the Yahoo domain with an arbitrary address of
user534@yahoo.com. The second workflow diagram should show a user initiating an
FTP session from inside your network to the arbitrary site of ftp.netneering.com. The
third workflow is an externally located employee initiating a VPN session to corporate in
order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.
Write a paper in which you complete the following three (3) parts. Note: Please use the
following breakdown to complete your assignment:




https://hwacer.com/Tutorial/term-paper-project-designing-a-secure-network/







 Overall network diagram
 Datapath diagrams (one for each of the steps in the scenarios below)
 Write-up
Part 1
1a. Using Microsoft Visio or its open source alternative, create a diagram showing the
overall network you've designed, from the user or endpoint device to the Internet cloud,
and everything in between, in which you:
i. Follow the access, core, distribution layer model.
ii. Include at a minimum:

o The authentication server (i.e. Microsoft Active Directory)
o Routers
o Switches (and/or hubs)
o Local users
o Remote users
o Workstations
o Files share (i.e. CIFS)
o Mail server
o Web servers (both internal and external)
o Firewalls
o Internet cloud
o Web proxy
o Email proxy
o FTP server (for internal-to-external transport)

1b. Explain each network device's function and your specific configuration of each
networking device.
1c. Design and label the bandwidth availability or capacity for each wired connection.
Part 2
2a. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the
following scenario:

Local user sends email to a Yahoo recipient. Local (corporate) user having email
address jonny.hill@Corp534.com sends an email to user534@yahoo.com.
i. Document and label the diagram showing protocols and path of the data flow as data traverses
through your network from source to destination.
ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols
that are used for each flow.
iii. Show user authentication when necessary.
2b. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the
following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site
(ftp.netneering.com). He has to access the secure shell using his active directory credentials to
authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his
desktop across the Internet to ftp.netneering.com.
 Document and label the diagram showing protocols and path of the data flow as data traverses
through your network from source to destination.
 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols
that are used for each flow.
 Show user authentication when necessary.
2c. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the
following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop,
DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing
to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using
her Active Directory credentials before the VPN tunnel is built.
 Document and label the diagram showing protocols and path of the data flow as data traverses
through your network from source to destination.
 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols
that are used for each flow.
 Show user authentication when necessary.
2d. Explain how your overall design protects the organization from both inside and
outside attacks. Give examples.
2e. Explain how your layered design compensates for possible device failures or
breaches in network security.
2f. Determine whether any possible bottlenecks exist in your design.
2g. Explain how to make the file transfer process more secure.
Part 3
1. Use at least five (5) quality resources in this assignment. (Note: Wikipedia and similar
websites do not qualify as quality resources.)
2. Include charts or diagrams created in Visio or an equivalent such as Dia. The
completed diagrams/charts must be imported into the Word document before the paper
is submitted.
3. Your assignment must follow these formatting requirements:
 Use proper APA format.
 Include a cover page containing the title of the assignment, the student's name, the professor's
name, the course title, and the date. The cover page and the reference page (if applicable) are
not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:
 Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior
and applications used in IP networking.
 Identify network security tools and discuss techniques for network protection
 Describe the foundational concepts of VPNs.
 Design a secure network to address a business problem.
 Use technology and information resources to research issues in network security design.
 Write clearly and concisely about Advanced Network Security Design topics using proper writing
mechanics and technical style conventions.

Assignment 2 Mister Network Engineer

 

Assignment 2 Mister Network Engineer

 

Assignment 2: Mister Network Engineer
Due Week 8 and worth 80 points
Using the network diagram located here, incorporate into the diagram the devices on the
lower right to create a secure corporate network. The devices you must incorporate into
the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus
server (client-based / server-based), Web proxy, intrusion detection system (IDS), and
authentication server.
Note: All client-based / server-based devices work where a client is installed on a
workstation, which has bidirectional communication with a corresponding server.
Write a paper in which you:







https://hwacer.com/Tutorial/assignment-2-mister-network-engineer/







1. Determine which devices you will use for both the current network diagram infrastructure
consisting of firewalls, routers, and workstations as well as the device(s) you need to incorporate.
Include the following for each:
a. Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.)
b. Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.)
c. IP address assigned to all devices
2. Establish the configuration for each device in which you:
a. Research each of the devices you chose and provide a basic configuration you would
use in your network.
b. Use IP addresses to describe your configuration.
c. Explain the impact that each of your configurations has on the security of the entire
network.
d. Highlight at least five (5) security features for each device, including devices in network
diagram.

3. Using Microsoft Visio or its open source alternative, create a final network diagram that
incorporates all devices into the existing network and ensures the following:
a. VPN sessions (from laptop) are only allowed to access the desktops in the IT department
by IT department employees.
b. All VPN connections from the Internet cloud into the corporate network terminate at the
VPN server.
c. Users from Engineering and Finance and Accounting CANNOT communicate.
d. Vulnerability scans occur daily in which all desktops are scanned at least once per day.
4. Use at least four (4) quality resources in this assignment. (Note: Wikipedia and similar websites
do not qualify as quality resources.)
5. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed
diagrams / charts must be imported into the Word document before the paper is submitted.
Your assignment must follow these formatting requirements:
1. Use proper APA format.
2. Include a cover page containing the title of the assignment, the student's name, the professor's
name, the course title, and the date. The cover page and the reference page (if applicable) are
not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
 Design a secure network to address a business problem.
 Use technology and information resources to research issues in network security design.
 Write clearly and concisely about Advanced Network

Wednesday 9 December 2020

Assignment 3: The Effects of Modern Development on the Health of the Population

 

Assignment 3: The Effects of Modern Development on the Health of the Population

 

Assignment 3: The Effects of Modern Development on the Health of the Population

Due Week 10 and worth 260 points

Building on the scenario in Assignments 1 and 2, you are in the final stages of preparing for your presentation at the conference on environment health issues.

Create an eight to ten (8-10) slide PowerPoint presentation in which you:

  1. Examine the role of global organizations in managing environmental health issues. Determine two (2) specific ethical concerns these organizations face in safeguarding the health of a global society. Support your analysis.
















  1. Evaluate the primary negative effects of modern farming on population health. Provide two (2) examples of best practices in the farming industry developed in the private sector to help reduce the health threats associated with industrialized farming. Justify your response.
  2. Identify the purpose of epidemiologic research in the study of environmental health issues. Provide a specific example of how epidemiology has been used to manage a recent public health threat. Support your response.
  3. Select one (1) environmental hazard that you think represents the most significant health risk to a specific population group. Propose a solution that an organization or industry could develop in the private sector to help eliminate or reduce this risk.
  4. Use at least three (3) quality academic resources in this assignment. Note:Wikipedia does not qualify as an academic resource.
  5. Format your assignment according to the following formatting requirements:
    1. Be creative in your design so that is appealing to others.
    2. Ensure that all of the criteria are covered.
    3. Create bulleted speaking notes for your presentation to the shareholders in the Notes section of the PowerPoint. Note:You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
    4. Use a professional technically written style to graphically convey the information.
    5. Include a reference slide. Citations and references must follow APA format. The reference slide is not included in the required presentation length.

The specific course learning outcomes associated with this assignment are:

  • Examine the opportunities for improvement within environmental health based organizations.
  • Explain the role of organizations can have on improving environmental health along the impediments presented.
  • Determine the skill sets needed to address current administrative needs within food production.
  • Apply best practices of environmental health organizations to a scenario that is reflective of real concerns.
  • Use technology and information resources to research issue in environmental health management.
  • Write clearly and concisely about social environmental health management using proper writing mechanics.

BUS 599 Week 10 Assignment

 

BUS 599 Week 10 Assignment

 

This assignment consists of two parts:

  1. Your final business plan (an MS Word document).
  2. Your final business plan financials (using the Business Plan Financials Excel Template).

To successfully complete this assignment, you must attach both documents to the submission area as separate files and then click Submit.

Reminders and Notes
  • Your company, whether a startup company of your choosing or based on the snack food company scenario, will operate in a 100-mile radius from your home address. Your goal is to reach $1 million in sales by the end of the second year.
  • Be sure to follow the guidelines, whether you chose the snack food company scenario or the company of your choice:













Part 1: Business Plan—Final

Notes
  • The executive summary is a critical aspect of this assignment. Your ability to condense and highlight critical information about your chosen company to investors will determine whether they decide to invest in you and your company or not.  
  • Chapter 4, “The Executive Summary,” pages 53–66, provides information about writing the executive summary. You may write either a synopsis or a narrative summary. Pay particular attention to the:
    • Executive Summary Plan Preparation Forms on pages 58–61.
    • Sample Plans on pages 62–66. 
Instructions

In MS Word, construct a 10–20 page business plan in which you:

  1. Write a 1–2 page executive summary highlighting key aspects of each section of the business plan.  
  2. Incorporate feedback to produce a comprehensive business plan for the product or business. Specifically, you will be combining all of the previous assignments and revising them to build your business plan:
    • Week 3 Assignment: Company Overview and SWOT Matrix.
      • Be sure to include all the headings from the assignment.
    • Week 5 Assignment: Marketing Plan and Budget.
      • Be sure to include all the headings from the assignment; the budget part of this assignment will be addressed in Section 2.
    • Week 8 Assignment: Operations, Technology, Management, and Social Responsibility Plan (With Financials).
      • Be sure to include all the headings from this assignment; the financials part of this assignment will be addressed in Part 2.
    • The written section of the financials from the Week 8 discussion thread.
      • Be sure to include any financial information that will help to convince the investors.
Formatting

Format your assignment according to these requirements:

  • This course requires the use of Strayer Writing Standards (SWS). For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
  • Typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • You must include headings in your paper for each major topic.
  • Include a cover page containing the assignment title, your name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. All sources used must be listed in the source list page and have a corresponding in-text citation. Citations and references must follow SWS format. The source list page is not included in the required page length. 
    • There is no minimum requirement for the number of resources used in this assignment.

Part 2: Business Plan Financials—Final

Using the Business Plan Financials Excel Template, incorporate feedback from previous submissions to produce a comprehensive set of business plan financials the business's first two years.

BUS 599 Week 10 DQ

 

BUS 599 Week 10 DQ

For this week’s discussion, create a brief presentation addressing the following:

  • Your business plan is now complete. Imagine you are in front of a group of investors, presenting your business idea and encouraging them to invest in your chosen company.
    • Title Page with the company name and your name.
    • Outline of What You Do.
    • Target Market.
    • Market Size.
      • How big is the market or industry on which you’re focusing?
      • What are the growth opportunities?
    • Competition.
      • Who are your key competitors?
    • Your Management Team.
      • Who runs the business?
      • What are their roles and key skills?
    • Business Model.
      • How will your business make money?






















    • Financials.
      • What key financial information does your audience need to decide whether to invest in you and your business?
    • Funding You Are Seeking.
    • Why Will Investors Want to Invest in This Business and in You?

Formatting

  • PowerPoint with notes; no more than 10–12 slides.

 

Fiscal Planning and Management Presentation

 

Fiscal Planning and Management Presentation

 

Fiscal Planning and Management Presentation

Instructions

As a regional health care administrator for a long-term care organization, you have been asked to train a new group of health care administrators who just completed their degrees. They have no work experience in health care administration or financial management. For this assignment:

  • Develop a 10–12 slide narrated PowerPoint presentation explaining the role of health care administrators in fiscal planning and financial management.
  • Be sure to address the following:
    • Strategic planning.
    • Budgeting.
    • Regulatory compliance.
    • Insurance and reimbursement.
    • Human resources, human capital, and staffing.















  • Include cover and references slides as well as speaker's notes in each slide. Note that cover and references slides are not part of the required slide count.

BUS 309 Discussion Week 10

 

BUS 309 Discussion Week 10

 

BUS 309 Discussion Week 10

 

job discrimination (Chapter 11, pages 401-433), is the topic for this week. We will explore areas such as disparity, affirmative action policies, bias wage systems, hostile work environments, sexual harassment, and many other job discrimination topics.

For this week's discussion, I want you to think about the concept of comparable work for comparable pay. Most companies provide a job description that details the work involved for the positions, the expected experience and education needed to properly do the work, as well as the physical abilities needed to hold the positions. The applicant is well aware of the requirements needed and makes the decision to submit an application, cover letter, and resume.




https://hwacer.com/Tutorial/bus-309-discussion-week-10/










Now here is where I would like your opinion on the hiring process and the determination of the wages to possibly avoid wage discrimination based on gender.

Respond to the following:

  • Post a discussion based on the following question. You might be familiar with how the television show The Voice works. The judges do not see the singer until they hear the singer and make the choice to accept the person onto their team. Do you think if all of the names were removed from all the application documents prior to presentation for candidate selection, and a set wage assigned before a face-to-face interview is held, that it would help to reduce the gender disparity in wages, as the potential for gender identity is not disclosed prior to interview selection? Explain your answer.
  • Be sure to respond to at least one of your classmates' posts.

ACCT 100 Week 10 Discussion

 

ACCT 100 Week 10 Discussion

 

Artificial Intelligence (AI) is not a new phenomenon, but it is still a growing concern for many industries. While the human element remains the most important factor in most businesses, the accounting industry is not exempt from the threat of new technologies. If you were the owner of a medium to large company, how could you use new technologies such as AI to support your daily operations? Select and discuss one of the options below.




https://hwacer.com/Tutorial/acct-100-week-10-discussion/







  • Option A: Cost savings associated with payroll and other personnel costs (i.e. training and development, employee hiring)
  • Option B: More accurate and efficient financial reporting (i.e. reduction in human errors, increased productivity)
 

Friday 4 December 2020

Acc 100 week 9 Assignment

Acc 100 week 9 Assignment

 

Effective financial reporting depends on sound ethical behavior. Financial scandals in accounting and the businesses world have resulted in legislation to ensure adequate disclosures and honesty and integrity in financial reporting. A sound economy is contingent on truthful and reliable financial reporting.

Instructions:

  • Read the following scenario.
  • Answer the questions that follow. This will be a 2-3 page submission in a question and answer format (also in paragraph form). An introduction and conclusion is not required.
  • Refer back to your textbook for guidance on how to think through the scenario.













You have been recently hired as an assistant controller for XYZ Industries, a large, publically held manufacturing company. Your immediate supervisor is the controller who also reports directly to the VP of Finance. The controller has assigned you the task of preparing the year-end adjusting entries.  In the receivables area, you have prepared an aging accounts receivable and have applied historical percentages to the balances of each of the age categories.  The analysis indicates that an appropriate estimated balance for the allowance for uncollectible accounts is $180,000.  The existing balance in the allowance account prior to any adjusting entry is a $20,000 credit balance.

After showing your analysis to the controller, he tells you to change the aging category of a large account from over 120 days to current status and to prepare a new invoice to the customer with a revised date that agrees with the new category.  This will change the required allowance for uncollectible accounts from $180,000 to $135,000. Tactfully, you ask the controller for an explanation for the change and he tells you “We need the extra income, the bottom line is too low.”

Required:

 

In a 2-3 page paper, discuss the following:

  1. Consider what you have learned relative to ethics and financial reporting. What is the rationale for the calculations/process used to estimate the $180,000 uncollectible allowance?
  2. How do you think the misstatement of funds will impact the income statement and balance sheet?
  3. What is the ethical dilemma you face? What are the ethical considerations? Consider your options and responsibilities as assistant controller.
  4. Identify the key internal and external stakeholders. What are the negative impacts that can happen if you do not follow the instructions of your supervisor?
  5. What are the potential consequences if you do comply with your supervisor’s instructions? Who will be negatively impacted?

Wednesday 2 December 2020

BUS 599 Week 9 dq

 

BUS 599 Week 9 dq

 

For this week’s discussion, please respond to the following:

  • Develop a 30-second elevator pitch for your selected company (whether you're working with the snack food company scenario or the company of your choice), using the tips provided in the videos and article.
    • Enclose your elevator speech within quotation marks.
  • Provide a rationale for the components included in your pitch.












Optional: Week 9 Video Response Challenge

You may choose to make a video of your elevator speech if you wish, but this is not required. This will give you  excellent practice for doing a "live" elevator speech someday!

Business Continuity and Disaster Recovery Plans

 

Business Continuity and Disaster Recovery Plans

 

Business Continuity and Disaster Recovery Plans

This assignment consists of three parts: a business continuity plan (BCP), a disaster recovery plan, and a summary. You must submit all three files (in either Word or PDF format) in the same submission for this assignment. Include BCP or DRP in the name of those files.

For this assignment you will need to download, extract (unzip), and install the Business Continuity Planning Suite. Step by step instructions can be found at the site. 

Scenario

You are an information technology (IT) manager working for the Defense Logistics Information Service (DLIS) headquartered in Battle Creek, Michigan. DLIS is an organization within the Defense Logistics Agency (DLA), which is the largest logistics combat support agency for the Department of Defense. DLIS creates, manages, and disseminates logistics information to military and government customers using the latest technology.

Senior management at DLIS decided that your team must develop a BCP and a DRP in order to overcome issues that might occur now or in the future since your team is doing so well. You have been assigned to develop these new plans. Take into consideration the following information on the DLIS IT infrastructure:

DLIS has a global reach and has at least 50 file servers and multiple (12) databases running everything from an enterprise resource planning (ERP) system to the organization payroll system that has an electronic funds transfer (EFT) capability. Also worth noting is that there is a warm site within 50 miles of the headquarters data center. No plans exist for it. You will want to use it in your planning. Each remote location also has local servers and desktop computers that are not connected to the HQ data center. Currently all system backups are performed by an outside vendor; however, your team will want to recommend a new process and vendor, and develop a new back-up plan for approximately five terabytes (TB) of critical classified data.

Events to consider include, but are not limited to, hardware and software malfunctions, failed storage systems, power outages, terrorist attacks, computer viruses, and natural disasters such as snowstorms, hurricanes, earthquakes, and pandemics.

Part 1: Business Continuity Plan

Run the Business Continuity Planning Suite tool by clicking Start Now. Click on the Business Continuity Plan Generator to extract and run the tool (see install instructions). Create your BCP using the information provided in the scenario. When complete, print your file and save it as a Word or PDF file. Note that in your BCP at Chapter 2 – Critical Business Information, you only need to select the IT/telecommunications team.

Part 2: Disaster Recovery Plan

Click the Disaster Recovery Plan Generator to extract and run the tool (see install instructions). Create your DRP using the information provided in the scenario. When complete, print your file and save it as a Word or PDF file.

Use your imagination while filing in the forms. Be verbose while filling in the template for areas such as the policy and objectives. Make up a fictional organization chart and use fictional contact names.

Part 3: Summary

Write a one-page summary addressing the following;

  1. What was your strategy in using the information provided within the scenario to fill in the BCP template and what assumptions did you make while incorporating the information into the form?
  2. What was your strategy in using the information provided within the scenario to fill in the DRP template and what assumptions did you make while incorporating the information into the form?
  3. Describe your opinion of the tool and if you would use it in your current or future career as a planning tool for events. If you would not use the tool, discuss what tool or methods you would use to capture BCP and DRP information.

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Evaluate and categorize risk with respect to technology, individuals, and the enterprise, and recommend appropriate responses.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...