Categories
Cyber Security

Write a paper describing the how you would lead a global project team to launch a global product. My goal for this assignment is for you to have a real, actionable plan. This paper should be two pages double-spaced of your narrative not including the title page, figures/diagrams, references, and the appendix. (Size expectation: 500-800 words)

Write a paper describing the how you would lead a global project team to launch a global product. My goal for this assignment is for you to have a real, actionable plan. This paper should be two pages double-spaced of your narrative not including the title page, figures/diagrams, references, and the appendix. (Size expectation: 500-800 words)
Scenario:
You have been working at a global company, and you have been promoted. You are now a Project Manager and have been put in charge of launching a product. Pick a company where you would want to have a career. You can pick a good or service that this company could develop. For example: Kale flavored Coca-Cola. Please, do not used that gross example. You have been given everyone’s contact information and are expected to launch the product by October 1st, 2023. Here are the names and locations of your 16-person team (including yourself):
Bindi – Sydney
Jamal, Zoe, and You – Chicago
Lolita – Prague
Dan, Jiayi, Yan – Shanghai, China
Dieter and Greta – Berlin
Amal and Amir – Dubai
Maryam and Zara – New Delhi
Amani and Mubarak – Nairobi
Based on what you are creating, these team members will need various skills (you can choose).
Part 1 – Leadership Plan
Write a one-page, double-spaced plan detailing how you will lead the 16-person global team. Take special care to spend time and share information with everyone on the team. The natural bias we all have is to have better communication with the people in our physical office (Chicago).
Part 2 – Launch Plan
Write a one-page, double-spaced plan detailing how team will create, market, distribute, and sell the global product being especially mindful of cultural differences across the global marketplaces. Choose a good or service that you would like to create and sell to millions of customers world-wide. Think of this as a one-page, global business plan.
Use as many references as you need to develop your plan. You do not need to use academic references. Please use references from reputable business journals, magazines, newspapers, and other sources.
Create a title page with the title of your paper, your name, the date, and INFO 6250 Information Resource Management.
Please, i want the document in word document file.

Categories
Cyber Security

Student Athlete Registration System

Student Athlete Registration System
The Board of Education of Baltimore County invites qualified firms to submit proposals for a
student athlete registration system. Award Bidder shall provide a web-based solution to
facilitate data entry and reporting. The requirements outlined herein are intended as an aid to
acquaint Bidders with what could be required to execute the work on this contract. These
specifications will serve as the source document for services for the term of the contract.
Baltimore County Public Schools (BCPS) ranks among the 25 largest school systems in the
United States. The county covers 612 square miles in the north central part of Maryland, and
combines urban, suburban and business regions with vast farmlands and waterfront areas. The
school system reflects this diversity in the student population of over 113,000 students. For the
2018 – 2019 school year, BCPS will operate over 173 schools: 106 elementary schools (serving
grades Pre-K – 5), 27 middle schools (serving grades 6 – 8) and 24 high schools (serving grades 9
– 12).
Please give detailed Budget and Narrative.

Categories
Cyber Security

Artificial Intelligence

Topic: Artificial Intelligence
Abstract on the topic Artificial Intelligence ( 70-100 words)
A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography (word document)
PPT materials on Artificial Intelligence. (5-7 Slides)
Please provide references in the word document. Plagiarism must be less than 20%

Categories
Cyber Security

Why do you believe more Military & Veterans should be in cybersecurity?

Cybersecurity Scholarship
» Why do you believe more Military & Veterans should be in cybersecurity?
» What are your cybersecurity career goals and how would receiving this scholarship help you attain them?
Goals: multiple certifications, I already have a degree. Please expand » Why do you deserve this scholarship? Expand on low income family. Parents no degree from Mexico Additional Requirements:
Page length should be 2 pages full.
Must include in-text-citation.
APA format style

Categories
Cyber Security

5 Ways to Solidify Organizational Cybersecurity Compliance

Cybersecurity: Compliance
use this link to discussion 5 Ways to Solidify Organizational Cybersecurity Compliance
Cite your sources using APA format with links

Categories
Cyber Security

Assume you are an entry-level security administrator working for Always Fresh. Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia

Assignment Instructions:
Using Word or a Word-compatible word processor, submit the following deliverables. For written responses, each answer should be 350-400 words (2-3 nice paragraphs/about a page) at a minimum, well-written, and cover the topic fully. Use a standard 12-point font (Calibri preferred), double-space, and use 1” margins all around. If you use information found outside of the text in your answer (this is highly encouraged), cite your source(s). Make sure to number your answers appropriately. If you are skipping an answer, number as usual and note “No Answer” or “Question skipped.”
Assignment Overall Scenario:
Assume you are an entry-level security administrator working for Always Fresh. Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.
Scenario After the recent security breach, Always Fresh decided to form a computer security incident
response team (CSIRT). As a security administrator, you have been assigned the responsibility of
developing a CSIRT policy that addresses incident evidence collection and handling. The goal is
to ensure all evidence collected during investigations is valid and admissible in court. Consider the following questions for collecting and handling evidence: 1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state? 4. What information and procedures are necessary to ensure evidence is admissible in
court? Tasks Create a policy that ensures all evidence is collected and handled in a secure and efficient
manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not
the individual steps.
Address the following in your policy:
• Description of information required for items of evidence
• Documentation required in addition to item details (personnel, description of
circumstances, and so on)
• Description of measures required to preserve initial evidence integrity • Description of measures required to preserve ongoing evidence integrity
• Controls necessary to maintain evidence integrity in storage • Documentation required to demonstrate evidence integrity

Categories
Cyber Security

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay format not in outline, bulleted, numbered or other list format. Use the five paragraph format. Each paragraph must have at least five sentences. Include an interesting meaningful title.

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay format not in outline, bulleted, numbered or other list format. Use the five paragraph format. Each paragraph must have at least five sentences. Include an interesting meaningful title.
Include at least one quote from each of 3 different articles. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
required readings :
Required Materials and Textbook(s)
Securing the Oracle Database: A Technical Primer 4e (2021) (Williams/Dhanarani/Swaminathan/Schäumer/ Choudhary/Mesaros) is available for free here:
https://download.oracle.com/database/oracle-database-security-primer.pdf NEW EDITION
Chapter 2 in the text: Database authentication and authorization

Categories
Cyber Security

Explain the basic principle of separation of duty.

Explain the basic principle of separation of duty.
Discuss how cryptography/encryption can be used to implement separation of duty
2–3 pages
Coversheet
List of References Page.
Proofread – Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other reputable resources.

Categories
Cyber Security

Need to write about collaborative health IT ecosystem in Digital health ecosystem.

Need to write about collaborative health IT ecosystem in Digital health ecosystem.
Also need to provide alternatives for the same.
Make sure you provide all references and citations.

Categories
Cyber Security

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

ScenarioThe Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.
The senior network architect has asked you to create a network design that includes the following components:
Current infrastructure elements (include all hardware listed above; use max 10 computers instead of 50)
A logical topology that separates the Accounting and Sales departments
Redundant communications
Justification for continuing with IPv4 or upgrading to IPv6
TasksFor this part of the project, perform the following tasks:
Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, router) and their locations within the private and protected network segments.
Include a high-level plan that ensures communications are available 24/7.
Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.
Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. I prefer you use the Cisco Packet Tracer software for your diagram. You will update this design later in the project. Instructions for acquiring Packet Tracer software are below.
Create a draft report detailing all information as supportive documentation.
Cite sources, where appropriate.
Required ResourcesInternet access
Course textbook
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your preferred style guide
Length of report: 2 pages
Self-Assessment ChecklistI determined the best network design to ensure the security of internal access while retaining public website availability.
I designed a network configuration with physical and logical topologies, and identified major network hardware and their locations within the private and protected network segments.
I created a plan that ensures communications are available 24/7.
I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.
I created a basic network diagram that illustrates the current network and enhancements.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Install and Use Packet Tracer
In your browser, navigate to netacad.com/campaign/ptdt-4. You will be taken to an Introduction to Packet Tracer screen. Click on Sign up Today. You have to enter your name, school email address, and text verification to enroll in the course. Open the confirmation email and confirm your email address. Configure your account. You will need to remember your username and password. Now click on the Introduction to Packet Tracer tile. Now you can download and install the software. Download the latest version 7. If you need help with the download and install, launch the course and navigate to Chapter 1 beginning with section 1.2. If you are unfamiliar with using Packet Tracer, you can go through chapters 2 and 3 in the tutorial. Most students have already used this product in CIST 1401 and 2451.