Safe Assign Report

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Case Study 2: Solid State Drives
Due Week 6 and worth 130 points

Read the article titled, “Enterprise IT shops now choose SSD storage,” located here

and at http://searchsolidstatestorage.techtarget.com/feature/Enterprise-IT-shops-now-choose-SSD-storage.

Use the Internet and Library to research the benefits and hazards to organizations that use solid-state drive (SSD) storage devices.

Write a three to four (3-4) page paper in which you:

1. Examine the major benefits for an organization to use SSDs.

2. Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.

3. Recommend whether or not Delaware Health and Social Services and the Disabled American Veterans should seriously consider SSDs for their organizations. Provide a rationale for your response.

4. Determine whether SSDs are more or less difficult for computer forensics personnel to examine. Suggest whether or not an organization, such as Health and Social Services and the Disabled American Veterans, should consider the difficulty of computer forensic examinations when considering the purchase of SSDs. Provide a rationale for your response.

5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Analyze the main classes of hardware and system software components in an enterprise context.

· Discuss common input / output technologies.

· Use technology and information resources to research issues in enterprise architecture.

· Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

Project Proposal

IN THIS FORMAT THE PROJECT PROPOSAL IS TO BE MADE.

  1. Title page
    1. Project title
    2. Name and student number
  2. Table of Contents
  3. Executive Summary
  4. Overview
    1. Purpose or objectives of this proposal
      • i. Identify the problem to be solved or need to be filled.
      • ii. What will be in scope and what is not going to be included.
      • iii. Explain how the project will be conducted. Will it be managed by embedding and tailoring PRINCE2 to suit the project or will you use /create another methodology? You should explain any alternative methodology in detail or provide some information to show that you understand the process embedding and the detail of your tailoring.
    2. Describe how you believe is the best way to measure the success of the project and explain why your suggested measures are appropriate over alternative measures.
  5. Expected Benefit sand Dis-benefits
    1. Context and analysis
      • i. To provide context, briefly explain corporate social responsibility, why your organisation might want to raise its profile and how the proposed project will align
      • ii. Provide a SWOT analysis to improve a reader of your proposal a balanced understanding.
      • iii. Provide further analysis using a weighted scoring model.
        1. You are to determine the criteria. The criteria should consider the way you would expect the success of the project will be measured
        2. To conduct a weighted scoring analysis, you will need to have an alternative to compare it with. You can create an alternative proposal if it can be quickly summarised, or your alternative could be the act of not doing the project.
      • iv. Include more context by explaining how / why you developed the idea
    2. Identify the expected benefits and dis-benefits, ensuring they are informed by the strategic context (social responsibility context you have explained above).
      • i. This paragraph is an opportunity to sell the value of your project to decision-makers.
  6. Project requirements
    1. List and describe the requirements needed to carry out this project.
      • i. Include human resources
    2. List and describe the possible assumptions for this project.
    3. List and describe the constraints for this project.
  7. Costs
    1. Estimate how much it will cost.
      • i. Breakdown to major milestones
    2. Explain how you estimated costs.
      • i. e.g. If you used a three-point method, explain what it is and show a couple of examples of how you did your calculations
  8. Major Risks
    1. Identify five (5)risks and quantify their potential likelihood and severity.
    2. Indicate how each of the above-mentioned risks will be managed
      • i. This could include, Avoid, Transfer, Mitigate or Accept, but you will need to explain what is meant by the terms that you use and why you plan to use them. You are not required to use all four.
  9. Timescale
    1. How long is the estimated time to complete the project?
    2. List and describe the major milestones.
  10. Conclusion

References

All statements must have legitimate references. (Harvard Style)

CHOOSING YOUR PROJECT (word limit 2000 words)

  1. Area of Study–It’s best to do something that is related to your degree program. It can also be related to your current work or profession. The reasoning behind this is that we want you to focus on Project Management and how it will relate to your area of interest.
  2. Project proposal does NOT mean a running a business

Consider hosting an event. There are thousands of charities out there that undertake some sort of clever fundraising initiatives. Google away.

Background

You work for a large organisation that has recently introduced PRINCE2 (name of the book) as a required method for managing projects. Several policies, templates and other resources have not yet been developed, which means that you might be required in this.

Your employer wants to improve their profile as being more socially responsible and has decided to allocate up to $50,000, spent over the next 12 months to achieve this goal.

To receive the funding, the project must meet the following criteria:

  • It is to benefit a community in the Northern Territory, Australia or a target audience in the Northern Territory.
  • It is to be a unique endeavour
  • It is to be completed within one (1) year
  • It is to be limited toa budget between $25,000 and $50,000
  • It can create income; however, proceeds are to be donated the cause
  • It should relate to your area of study (degree program). (Bachelor of software engineering)
  • It is not to include additional sponsorship, grants, donations beyond the $50,000. If the organisation’s staff are required to volunteer in the project during normal work hours the opportunity costs to the organisation’s normal work must be included as an expense.

Survey Project

Part   1

Create   Survey

Create a survey or questionnaire   that could be used and collect data for a purpose or project of your choice.   The idea is to think through the process and identify questions that would   assist you in understanding how data is collected to make meaningful data   visualizations.

Your survey should consist of at   least 25 questions, include at least five items to collect demographic   information.

Within your survey include a at   least three of the following in addition to the 5 demographic questions.

At least:

3 multiple choice questions

3 Yes or No questions

3 Likert Scale Question

3 Open Ended questions

Part   2

Administer   Survey

Distribute   and collect your survey from 30 participants.  (Your classmates are not your participants for your survey project, you will need to give your survey out to people who may be interested in your topic.  You can give your survey to: Friends, Family, Co-worker, Employers, Other Students etc.)

Part   3

Analyze   Results

Compile   your survey data into a spread sheet (Excel) or some other tool (this is your   raw data)

Evaluate   and analyze your survey data to brainstorm creating visual presentations of   your data.  You should include a   variety of data visualization tools such as:    tables, charts, graphs, plots etc.    Be reasonable but creative with your data presentation.  * Microsoft Excel offers a variety of   tools.*

Part   4

Create   Data Visualization

Create   a visual presentation of your survey results

Part   5

Complete   Journal

Reflect   on your development of each part of the survey project.  An optional template has been provided

Make   sure your complete Journal Reflection includes:

  1. An Abstract
  2. A detailed description of your process for   completing each of part of the project.    Parts 1-4.
  3. Include a   Reference Page (this is for any outside sources that you may have used)
  4. Appendix
    • Your survey
    • Raw data
    • Your data visuals

Detective Controls 1 – DAM & Auditing

Discuss in 500 words or more why Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER. Include a discussion of what database auditing is and what it does. Consider why these new roles were introduced and what problem they are meant to resolve. Do not simply define the roles. Explain why they are useful.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

Cite your sources in-line and at the end. Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Your SafeAssign score is rendered irrelevant when you properly cite your work.  Use quotes to indicate where you have used other’s words.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Project Plan

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Battleship Game

For your Project, you will develop a simple battleship game. Battleship is a guessing game for two players. It is played on four grids. Two grids (one for each player) are used to mark each players’ fleets of ships (including battleships). The locations of the fleet (these first two grids) are concealed from the other player so that they do not know the locations of the opponent’s ships. Players alternate turns by ‘firing torpedoes’ at the other player’s ships. The objective of the game is to destroy the opposing player’s entire fleet. In our game, ‘firing a torpedo’ will be allowing the player to take a guess at where on the grid their opponent may have placed a ship.

In the requirements, we will set forth other simplifying rules to limit the scope of this project.

Requirements

Given the requirements as a rough specification, you are to design the classes and implement the game. In our imaginary game company, the requirements below were developed by the Product Development Team and your instructor is the Product Owner. You are in full control of the choice of classes (please use classes appropriately or points will be deducted), data structures, algorithms, internal file format, detailed user interface scheme, or any other pertinent design decisions you need to make. As the Product owner, I care that it compiles and runs like it is supposed to, meets all the functionality and requirements I have set forth, and is easy to play and understand.

The Battleship game you are designing and implementing is a simplified version of the electronic Battleship game played in one player mode.

The game is played on four grids, two for each player. The grids are typically square and in our case will be 10 by 10. The individual squares in the grid are identified by the x coordinate (indicated by a letter) followed by the y coordinate (indicated by a number). The following is an example of a 5 by 4 grid with an X in the position B3.

A     B      C      D      E

 

X

 

1

2

3

4

Each player uses two grids. Each player uses one of their grids to arrange their ships and record the torpedoes fired by the opponent. On the other grid, the player records their own shots and whether they hit or missed.

Before play begins, each player secretly arranges their ships on their primary grid. Each ship occupies a certain number of consecutive squares on the grid (sizes of ships are in the following table), arranged either horizontally or vertically. The number of squares for each ship is determined by the type of the ship. The ships cannot overlap so only one ship can occupy any given square in the grid. The types and numbers of ships allowed are the same for each player.

 

Ship Type

Number of Grid Squares

 

Carrier

5

 

Battleship

4

 

Cruiser

3

 

Submarine

3

 

Detroyer

2

The game is played in rounds. In each round, each player takes a turn to fire a torpedo at a target square in the opponent’s grid. The opponent then indicates whether the shot was a hit (a ship occupied the square) or a miss (there was not ship in the square). If the shot is a “miss”, the player marks their primary grid with a white peg (X in our game); if a “hit” they mark this on their own primary grid with a red peg (O in our game). The attacking player then indicates the hit or miss on their own “tracking” grid with the appropriate color peg (red (0) for “hit”, white (X) for “miss”) so that they can understand where the opponent’s ship might be.

In the board game, once all of the coordinates of a ship have been hit, the ship is sunk, and the ship’s owner announces “You sunk my battleship! (Or whatever the particular ship that was destroyed). For our purposes, we will consider a battleship sunk if the opponent has a single hit. When all of one player’s ships are sunk, the other player wins the game.

For your game, you will create a one-person version of the game where ‘the computer’ will play for the second player.

At the beginning of the game, you will read a file called ship_placement.csv which contains the type of ship, the first grid square for the ship placement, and whether the ship is placed vertically or horizontally (V or H in the field). The file will be in csv format (comma separated values). This is a common format and is comma separated (instead of being on separate lines). There will be commas between the values. Blank values will just have a comma noting to go to the next field (the game input should not have blank fields so you should handle the case where a field is blank).   If you want to view the file, often this will be opened by a spreadsheet unless you specifically open it with a text editor. Do not open it with Microsoft Word, as this may change the format. The first line of a CSV file notes the data descriptions as follows:

TypeOfShip,Location,HorizOrVert

I have provided several sample files which contain good scenarios and scenarios with placement issues that you will need to handle using exception handling. Your game should run with any of these files, but should also be able to run with any valid file in the correct format. You will need to check whether all ships were included in the input file (and appropriate action to take if not), whether all ships have been placed, whether they fit on the board in the configuration given, and whether more than one ship occupies a space (which is not allowed) when you read the input file from the user and how to recover if an error occurs.

You will then need to randomly position the computer’s ships on the grid taking into consideration the same factors as you did for the player’s input.

You will need to prompt for and allow for the user to input their next guess in the form of a letter (A through J) and a number (1 – 10) indicating where they are targeting for their torpedo and you should error check the input. In our simplified game, you will determine if the torpedo shot was a hit or a miss. If the shot was a hit, consider the ship to be sunk. You should display a hit or miss, whether the ship was sunk and which one, and display their tracking grid so they know what they have guessed and where they have made hits. The entire ship which was hit will display as sunk.

After the user takes their turn, you must have the computer randomly select a shot that they have not previously taken. Then you must display to the user what the computer guessed, whether it hit any of the player’s ships, whether a ship was sunk, and then display the player’s placement grid showing where ships are located and what has been hit.

You should continue this until someone wins or quits the game – meaning you should allow the player to gracefully quit at any turn.

At the end of the game, you should indicate the game is over and who the winner was. You should also allow the user to quit the game by entering a Q when prompted for their next guess. If a player decides to quit the game, the grid with all of their guesses and the locations of the computer’s ships should be displayed.

Overall System Design

You must have two different classes in your design.

You must use inheritance in one of the classes.

When reading from a data file, your program should test the input file to ensure that data is of valid format (basic error detection) using Exception Handling.

You should consider using the Grids from Assignment 2 to make this easier. You do not need to have 4 grids for this but if you decide to use only two grids, you need to make sure you do not show the player the computer’s ship location when you display the grid after each turn.

Each component of the overall program should be modular.

Program should be fairly fault tolerant of user input and the appropriate user prompts and on-screen directions should be displayed

Split the program into multiple files based on the roughly categorized functionality or classes.

USE c++ only need the answer quickly thank you!!

Network Cabling

The Sunshine Health Corporation has requested you evaluate their Scottsdale, Arizona facility. The original structure was built in 1965. The facility has undergone several remodels aesthetically, with no real infrastructure changes. The facility is wired with coaxial cable and RJ11 for telephone. In 1995 each office and the production facility were wired with Cat 3 cable. Much of this cabling still exists. In 2001, the executive offices were wired with Cat 5 cable.

Upon inspection, none of the old cabling has been removed. The main communications room where telephone and networking equipment is housed has access to all the old cabling which is unlabeled. The client would like you to assess a modification plan for bringing this facility up to speed. Their previous contractor purchased several networking devices and was never able to get the equipment to operate at capacity. In your preliminary report, it was stated that wiring would need to be brought up to current networking needs in order to make best use of existing equipment. It appears there will be some need for upgrading equipment also as the wrong equipment was purchased.

For this assignment develop a plan of action for cleaning up the wiring structure, laying new fiber cable where necessary, and present the idea of developing wireless LANs, and Wi-Fi capability throughout the facility. Please discuss also potential cost savings upon completion of a plan.

The building is two stories of offices in the front of the building covering approximately 20,000 square feet between both floors. The remainder of the building is just over 200,000 square feet of two story warehouse that is used for storage in the very back, and manufacturing production in the front part a warehouse. All sections of the warehouse must have Internet capability as well as Intranet connectivity.

The assignment is rather broad and speaking in general terms. Have fun with this though please address the key areas. You also submit a proposed budget for the wiring, equipment, installation and testing. The assignment should be 2-3 pages of content not counting title page, reference page or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format and use credible supporting materials to make your case.

Network Infrastructure And Security

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.  Section 1: Infrastructure DocumentWrite a five to ten (5-10) page infrastructure document in which you:

  1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
  2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  4. Create and describe a comprehensive security policy for the company that will:
  • Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Project PlanUse Microsoft Project to:

  1. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

Discuss In 500 Words

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

https://www.youtube.com/watch?v=wTF9OLN8o1Q

https://www.youtube.com/watch?v=4DxHKG-B0ys

https://www.youtube.com/watch?v=uT8WWdYDOyw

https://www.youtube.com/watch?v=FBDDa5pbwCs

https://www.youtube.com/watch?v=KVydGQGR1Lo

Case Study On Telecommunications

Telecommunications

Case Assignment (part A – 80 points)

Identify a network in which you are familiar. What topology is used? What, if any, penetration testing is done? What is considered best practice? In this paper, you should compare best practice of testing and topologies to the network you have identified and contrast the two. Your paper should be two pages in length with at least one reference in APA format (and accompanying citation) to back up your opinion. Remember do not just submit opinion – reference academic peer reviewed work.

Executive Program Practical Connection Assignment

Part B – 20 points

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.