Read the brief article 11 Reasons Why You Need a Contact Form on Your WebsiteLi

Read the brief article 11 Reasons Why You Need a Contact Form on Your WebsiteLinks to an external site..
After reading the article, share one of the listed reasons you were unaware of before reading the article, or if you were already aware, share the one you feel is most significant. Can you think of any other reasons not in the article?
200-250 words

Perimeter defense techniques Evaluate the types of assessments, select one that

Perimeter defense techniques
Evaluate the types of assessments, select one that you might use, and explain why it is important.
Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.
Active Assessment
Passive Assessment
External Assessment
Internal Assessment
Host-based assessment
Application
Wireless network assessment
Vulnerability Assessment

  The Windows Virtual Desktop provides a way to access your computer-based reso

 
The Windows Virtual Desktop provides a way to access your computer-based resources on multiple computers without having to have them stored on the computer you are sitting at.
Explain why this method could be a good choice for some businesses or may not be ideal for others.

Consider things like availability, troubleshooting, licensing costs, et cetera.

200-250 words

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the la

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the last 5 years.  
Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed). 
Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Description
Create the following section for Week 3: 
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.
Complete the following section for Week 3:

Week 3: Access Controls and Security Mechanisms

For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control.
Describe SSO and VPN technology, and discuss whether they can be used in the company.

Name the document “CS651_FirstnameLastname_IP3.doc.”
The template document should follow this format:
Security Management Document shell

Use Word
Title page

Course number and name
Project name
Your name
Date

Table of Contents (TOC)

Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

Section headings (create each heading on a new page with “TBD” as content, except for Week 1)

Week 1: Introduction to Information Security

This section will describe the organization and establish the security model that it will use.

Week 2: Security Assessment

This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.

Week 3: Access Controls and Security Mechanisms

This section examines how to control access and implement sound security controls to ensure restricted access to data.

Week 4: Security Policies, Procedures, and Regulatory Compliance

This section will focus on the protection of data and regulatory requirements that the company needs to implement.

Week 5: Network Security

This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

In this module, you learned about how an OS can exist on a virtual machine. For

In this module, you learned about how an OS can exist on a virtual machine. For example, you might use a MacBook and have macOS Catalina as the operating system installed on it. Then you might use Windows 10 as a virtual desktop on a virtual machine. This capability allows you to utilize both OSes on one computer. As you complete this module’s discussion, you and your peers will reflect on the value of virtualization, specifically in relation to operating systems.
In your initial post, address the following:
Provide an example of when an organization or an IT professional might choose to implement an operating system via virtualization, and explain how that example meets organizational needs.
In response to two of your peers, address the following:
If you agree, build upon the original poster’s claims and further the discussion. If you disagree, state your own argument in a constructive way.
Then answer the following questions:

Why is virtualization important, especially in relation to OSes? What makes virtualization important?
How is virtualization being used in the workplace today?

FOR OTHER FRIENDS REPLIES
1. There are many instances, within organizations, that call for using virtualization. One example would be two organizations collaborating, however, one organization (we’ll call them organization B) still uses legacy software that is specific to their older OS. Organization A could revert all their systems back to that version but the expense and practicality of it would be a nightmare to execute. Instead, organization A can simply use a virtualization machine that is based in a main computer or server and has instances set up across the organization where it is needed. The reason for having a VM set up on main server or computer is so that you only need one firewall to regulate all the packets to and from the VM. Then you set up a internal VM network on all company computers and run those instances through the firewall VM which is external (allows for internet connection). 
This solution will allow organization A to use organization B’s legacy software without great expense or technical headaches. Ultimately leading to a successful, and ideally profitable, collaboration. 
2. Imagine a situation where a company needs to run multiple operating systems on the same physical server for different purposes. By using virtualization, they can create multiple virtual machines (VMs) on a single physical server, each running its operating system.
This fulfills organizational needs in several ways:
1. **Resource Efficiency**: Virtualization allows better use of hardware resources by consolidating resources and reducing hardware costs and energy consumption.
2. **Isolation**: Each VM operates independently, enhancing system reliability and stability.
3. **Flexibility**: Virtualization offers the flexibility to quickly deploy and scale environments as needed.
4. **Security**: Virtualization can enhance security by isolating sensitive applications or environments.
Overall, implementing operating systems via virtualization allows organizations to optimize resource usage, increase flexibility, improve security, and streamline IT management processes, effectively meeting various organizational needs.

1.  A medical device dealer in the local area wants to make an accurate forecas

1.  A medical device dealer in the local area wants to make an accurate forecast of demand for Super Sonic II Wheelchairs during the next month.  Because the manufacturer is in Japan, it is difficult to send wheelchairs back or reorder if the proper number is not ordered a month in advance.  From past sales records, the dealer has accumulated the following data on the Super Sonic II Wheelchairs over the past year:
MonthWheelchair SalesJanuary9February7March10April8May7June12July10August11September12October10November14December16
Compute a 3-month moving average forecast of demand for April through January (of the next year).
Compute a 5-month moving average forecast of demand for June through January.
Compare the two forecasts of the 3-month and 5-month using MAD.  Which forecast method should the dealer use?
2.  The Big City Hospital has experienced the following occupancy rates during the past 9 months:
MonthOccupancy Rate (%)183278375481586685789890986
Compute the exponential smoothing forecast with alpha=.2
Compute the exponential smoothing forecast with alpha=.2 and beta=.3 (you can use the results of first part and just add beta calculation)
Computer linear trend line forecast
Compare three forecasts using MAD and indicate which appears more accurate

Read the brief article 11 Reasons Why You Need a Contact Form on Your WebsiteLi

Read the brief article 11 Reasons Why You Need a Contact Form on Your WebsiteLinks to an external site..
After reading the article, share one of the listed reasons you were unaware of before reading the article, or if you were already aware, share the one you feel is most significant. Can you think of any other reasons not in the article?
200-250 words

Perimeter defense techniques Evaluate the types of assessments, select one that

Perimeter defense techniques
Evaluate the types of assessments, select one that you might use, and explain why it is important.
Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.
Active Assessment
Passive Assessment
External Assessment
Internal Assessment
Host-based assessment
Application
Wireless network assessment
Vulnerability Assessment

  The Windows Virtual Desktop provides a way to access your computer-based reso

 
The Windows Virtual Desktop provides a way to access your computer-based resources on multiple computers without having to have them stored on the computer you are sitting at.
Explain why this method could be a good choice for some businesses or may not be ideal for others.

Consider things like availability, troubleshooting, licensing costs, et cetera.

200-250 words

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the la

 Length 3-4 pgs –  Use APA 7 style, and cite references published within the last 5 years.  
Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed). 
Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Description
Create the following section for Week 3: 
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.
Complete the following section for Week 3:

Week 3: Access Controls and Security Mechanisms

For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control.
Describe SSO and VPN technology, and discuss whether they can be used in the company.

Name the document “CS651_FirstnameLastname_IP3.doc.”
The template document should follow this format:
Security Management Document shell

Use Word
Title page

Course number and name
Project name
Your name
Date

Table of Contents (TOC)

Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

Section headings (create each heading on a new page with “TBD” as content, except for Week 1)

Week 1: Introduction to Information Security

This section will describe the organization and establish the security model that it will use.

Week 2: Security Assessment

This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.

Week 3: Access Controls and Security Mechanisms

This section examines how to control access and implement sound security controls to ensure restricted access to data.

Week 4: Security Policies, Procedures, and Regulatory Compliance

This section will focus on the protection of data and regulatory requirements that the company needs to implement.

Week 5: Network Security

This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.