Network Security Analysis

You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company.Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your company’s system) can impact the company’s network, particularly in terms of security.You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers.Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long.Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper.1. Overview of Networking and SecurityYou decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the company’s network.Discuss the potential security risks for each layer of the OSI model and the risks in each of the following:· Distributed vs. centralized computer systems and why your department chose to be distributed/centralized· Different network topologies and why your department chose the topology it did· Why standards bodies are essential in networking and how your department complies with standards· The importance of communication protocols and which one(s) your department chose· The differences between LAN, WAN, and wireless technologies, and how your department incorporated each· The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performanceClick or tap here to enter your speaker notes.2. Routing and SwitchingDescribe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your department’s commitment to achieving 24/7 availability, describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks.Click or tap here to enter your speaker notes.3. Effective Security PolicyDescribe at least 3 characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.Click or tap here to enter your speaker notes.4. Security StrategiesExplain strategies your department used to build security directly into the design of your company network.Click or tap here to enter your speaker notes5. MalwareDefine malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your company’s network against malware.Click or tap here to enter your speaker notes.6. ClosingSummarize your presentation.Click or tap here to enter your speaker notes.

Read more

Artificial Neural Networks

1.What are artificial neural networks (ANN)? Identify 5 types of ANN and what they can be used for.2.Use Google Scholar (scholar.google.com) to locate two papers since 2016 that use machine learning in one subject area (health, retail, oil and gas, etc.). Identify the problem domain. Compare and contrast the analysis methods. Do you feel one method was better than the other?3.List and briefly describe the nine-step process in conducting a neural network project.4.How can deep learning be used to fight fraud? List some of the tools that can be used and how they detect the fraud.5.List and explain 3 methods of deep learning. Give examples of when they should be used.Note: Each question requires a response of at least 300 words. Proper citations and references should be used.

Read more

Strategies to Implement

 To facilitate cultural assimilation, IT and non-IT must become more integrated.  What are some strategies to implement to allow this type of interaction to occur?  300 words.

Read more

Measure Your Life

How Will You Measure Your Life?This is by necessity an individual project. Two of the key learning objectives for this course are to 1) learn about individual behavior and 2) learn about interpersonal behavior. One subcomponent of interpersonal behavior is leadership. And yet one of the most difficult people to learn to lead is oneself; what I refer to as “that guy or girl that we see in the mirror every morning.”As leaders of organizations, we frequently participate in strategic planning wherein, we document the organization’s values, purpose, mission, and strategy. In this project, you will reflect upon and document your personal values. You will think about your purpose and propose a mission. You will develop a life and career strategy based on your own strengths and weaknesses. We will effectively answer for each of ourselves, the question that Harvard Professor Clayton Christensen asked of the HBS class of 2010, “How will you measure your life (Links to an external site.)?”The good news is that there are no wrong answers because only you can answer these questions for yourself. However, the bad news is that nobody can give you the answers either. Your grade on this project will be based on the level of thought that you put into it. This type of reflection can positively affect the trajectory of your career and your life. You will get out of it, only what you put into it. Carpe Diem!Essay format with text of 4-5 Pages, Double Spaced, 12 point font.Rubric:MGMT 5113How Will You Measure Your LifeGrading RubricOverviewThe HWYMYL project is the first and often the most popular assignment in MGMT 5113. It is an assignment that students prepare individually. Students are assigned to apply strategic planning concepts to their careers and personal lives.The assignment is usually 4-5 pages in length. However, there is not a hard and fast rule on the length of the paper. Rather the focus of the grader should be on how well the student applies the specific concepts presented in the assigned reading and videos.Students are assigned to:Read the HBS article, “How will you measure your life?”Document 4-6 core values.Write a statement of purpose.Write a mission statement.Perform a SWOT analysis.Based upon the student’s vision (values, purpose & mission) and their SWOT analysis, they should develop a life strategy that includes Objectives, aka SMART Goals.Document how they will measure their progress going forward.The paper includes 4 – 6 core values that are such that the values are likely to never change; i.e. not dependent on technology, the economy etc.+ / -The paper includes a statement of purpose that is such that it could potentially last the person their entire life.+ / -The paper includes a mission statement such that it can be clearly evaluated whether or not it has been achieved by the date indicated; i.e. has a clear finish line.+ / -The paper includes an analysis of the student’s strengths, weaknesses, opportunities, and threats (SWOT). Note that the strengths should meet Marcus Buckingham’s definition in that they are not simply something the person is good at. Strengths are activities that make the person feel stronger.+ / -The paper includes specific Objectives that meet with definition of a SMART Goal; i.e. specific, measurable, attainable, results oriented, time-bound.+ / -The student has indicated what type of Measurement System that they will use to track their progress toward their Mission+ / -There is a particular consistent theme between the different components of the student’s submission; i.e. innovation, adventurousness, conservatism, frugality etc. The particular theme is not as important as the fact that there is a consistency between the different components that indicates a coherent strategy.+ / –

Read more

Cryptocurrency Bitcoin

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Read more

Artificial Neural

Discussion and exercises:Chapter 5:· Discussion 1: What is an artificial neural network and for what types of problems can it be used?· Discussion 2: Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?· Discussion 3: What are the most common ANN architectures? For what types of problems can they be used?· Discussion 4: ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.· Exercise 6: Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.Chapter 6· Discussion 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?· Discussion 2: List and briefly explain different learning paradigms/ methods in AI.· Discussion 3: What is representation learning, and how does it relate to machine learning and deep learning?· Discussion 4: List and briefly describe the most commonly used ANN activation functions.· Discussion 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.· Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.

Read more

Metrics And Information Visualization

Respond to the following in a minimum of 175 words:The most frequently used measures of central tendency for quantitative data are the mean and the median. The following table shows civil service examination scores from 24 applicants to law enforcement jobs:83 74 85 7982 67 78 7018 93 64 2793 98 82 7868 82 83 9996 62 93 58Using Excel, find the mean, standard deviation, and 5-number summary of this sample.Construct and paste a box plot depicting the 5-number summary.Does the dataset have outliers? If so, which one(s)?Would you prefer to use the mean or the median of this dataset’s measure of central tendency? Why?

Read more

Security Vulnerabilities

Create a paper outline for the topic “VPN Security Vulnerabilities Exposed”. The outline should include the following all in APA format 100% original work. no plagiarism:· Title page with title· Top level headers which outline what you will be talking about in your paper (major topics)· Second level headers which outline specific detail headers for each of your top level headers.· A bibliography list with at least 5 references.Below is the link of what the outline should look like

Read more

Governments And Secrecy

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.1. Identify cybersecurity risks and threat agents that apply particularly to information systems in government organizations.2. How is classified information different from other sensitive information?

Read more

Theoretical and Technical Problems

Illegal Activities and SpeculationsCan currency be anonymous and transparent at the same time?Why would somebody give you approximately 27,000 $ for solving impractical mathematical equations?

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information