Discussion 3 Physical Vulnerability assessment of security perimeters of TechWor

Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx.
Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx. 
Chapters 3.6 (Gupta and Goyal)
Chapter 4 (Fennelly)
Minimum Requirements:
Inside the Techworx building:

1st-floor reception and access to stairs, elevators, loading dock, and restrooms
2d floor offices and conference rooms
3rd floor: Executive offices
4th floor: IT Offices and data center

Define the three Perimeters (Outer, Inner, and Interior) for TechWorx and what are the key vulnerabilities of each of the perimeters. Note: In figure 2 below, there is no indication of an outer perimeter. You will need to create one for the organization. 
What are the most critical areas/limited access areas that we should secure in the building?
Include at least one supporting figure, image, or diagram. (you may have more than one)
Ensure you address all three security perimeters.
What type of access control systems do you recommend for TechWorx and why?  Note: I am not asking for a specific model and brand. At this point, we are just brainstorming what types of systems we will need.  
Mr. Scott was very happy to hear about the NIST Cybersecurity Framework.  He is anxious to get started on protecting TechWorx equipment and personnel.   For this assignment only consider physical perimeters.  We will cover computer/network (logical) perimeters in future assignments.
Figure 2TechWorx Corporate Office
Grading Rubric for Discussion Board (attached) Download Grading Rubric for Discussion Board (attached) 

It is time to show off all of your incredible talent and all that you have learn

It is time to show off all of your incredible talent and all that you have learned by programming a simple card game, we will use the concept of poker, but without actual cards.  You will have three separate, or internal classes that will:
Instantiate a Card
Instantiate a Deck of those Cards, and shuffle and deal them.
Play the game.
In this project you will simulate the playing of a simple card game. You are given a Card and Deck class to use. The Card class should not be changed or renamed, I will use my own Card class when testing your files. 
This assignment should be submitted in two classes; Main+lastName, Deck+lastName, or using internal declared classes, but will not be referenced in this manner henceforth. The first class, Deck, will be a modification of the class I have provided. You will need to implement the shuffleDeck method in order for this class to be usable, which has already been written for you in a method.
The second class, Main, will use the Card class and your modified Deck class to create a shuffled Deck object and deal the two hands. The hands should be dealt in alternating order, starting with the first hand. As the cards are dealt into each hand they should be removed from the deck.
For example, each hand is shown for the following Deck.
seven of spades    <-- Index 0, top card queen of spades   <-- Index 1, etc. ten of spades eight of spades three of spades king of hearts queen of hearts jack of clubs four of clubs eight of clubs king of diamonds seven of hearts Hand 1:  Hand 2:seven of spades queen of spadesten of spades  eight of spadesthree of spades king of heartsqueen of hearts jack of clubsfour of clubs eight of clubs Each of these cards should be removed from the deck. After dealing the hand, Main should use the point value attribute of each card to calculate the total point value of each hand. The hand with the highest point value wins. In the case of a draw, the second hand wins. In this game ace = 1, jack = 11, queen = 12, and king = 13. In the deck the card in the first position (index 0) is the top of the deck. Lastly, Main will declare the winning hand. See the following sample run for the exact format that will be expected. Sample Run of Main: Hand 1: Total points 22 three of clubs (point value = 3) two of clubs (point value = 2) six of hearts (point value = 6) ten of hearts (point value = 10) ace of spades (point value = 1) Hand 2: Total points 27 four of spades (point value = 4) ten of clubs (point value = 10) three of diamonds (point value = 3) eight of diamonds (point value = 8) two of hearts (point value = 2) Hand 2 wins Play again (y/n)? To plan for the program, you should review the given classes. Knowing which methods are available to you will be very helpful in designing your game. Then, you should plan the algorithms that you will design. Use the following table to plan your program. Card/Deck Methods & VariablesMain Card - Methods & Variables String suit, String rank, int pointValue public Card(String cardRank, String cardSuit, int cardPointValue) public String suit() public String rank() public int getPointValue() public boolean matches(Card otherCard) public String toString(); use to print each card with a for each Deck - Methods & Variables private ArrayList deck;
constructor method; instantiate deck ArrayList object, populate elements with cards by calling initialization method, and shuffle it by calling shuffleDeck() (written for you).
method to initialize the deck with 52 cards and set their point values; Ace of Clubs through King of Spades. 
method to return the top card from the deck and remove it from the stack; return type should match what you are returning.
Main.main
instantiate a new Deck object based on Card element types
establish two arrays, one for each hand to be dealt
deal 5 cards to each hand calling the getTopCard() method from Deck{}
total up the values for each hand using getPointValue() from Card{}
display the cards and their point values for each hand
determine the winning hand and display
You do NOT need to hand in Card, nor customize the class or the instantiation usage of Card in Deck or Main! But you still need to change Deck and Main to include your last name.
PLAGIARISM will earn a ZERO!  Copying someone else’s code online, or another student is also considered plagiarism. 

The purpose of conducting a systematic review of literature is to comprehensivel

The purpose of conducting a systematic review of literature is to comprehensively and rigorously summarize existing research on a specific topic, providing an evidence-based foundation for decision-making and identifying gaps for future studies. Unlike a traditional literature review, a systematic review follows a predefined protocol, employs a systematic search strategy, and critically appraises studies for inclusion based on predefined criteria. The key steps involve formulating a research question, searching multiple databases, screening and selecting relevant studies, extracting data, assessing study quality, and synthesizing the findings. Writing a systematic review requires adherence to a structured format, ensuring transparency and replicability of the process. For guidance on systematic review writing, you can refer to https://literaturereviewwritingservice.com/help-with-writing-a-systematic-review/

Reference Mini Case 1 and Mini Case 2 found in your module resources. Students w

Reference Mini Case 1 and Mini Case 2 found in your module resources. Students will submit a context diagram for the order system, and create a decision table, to be submitted as a Word document. Your document should also include a narrative explaining each. 
Reference the following Mini Case 1 and Mini Case 2 (Also found in Module Resources). Students will submit a context diagram for the order system, and create a decision table, to be submitted within a Word document. Your document should also include a narrative explaining each.
Complete the following tasks:
Mini Case 1: Kitchen Gadgets task
Mini Case 2: Big State University task
Mini Case 1: Kitchen Gadgets
Kitchen Gadgets sells a line of high-quality kitchen utensils and gadgets. When customers place orders on the company’s website or through electronic data interchange (EDI), the system checks to see if the items are in stock, issues a status message to the customer, and generates a shipping order to the warehouse, which fills the order. When the order is shipped, the customer is billed. The system also produces various reports.
Task:
Draw a context diagram for the order system.
Mini Case 2: Big State University
The Big State University course catalog reads as follows: “To enroll in MIS 260, which is an advanced course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes either one of these prerequisites and obtains the instructor’s permission, however, will be allowed to take MIS 260.”
Task:
Create a decision table that describes the Big State University course catalog regarding eligibility for MIS 260. Show all possible rules.
What to Submit
Homework Activity Module Four should follow these formatting guidelines: 1–2 pages, double-spacing, 12-point Times New Roman font, one-inch margins, and citations in APA.
See attached mini cases.

Submit your project plan. The project plan is a Word document that is a combinat

Submit your project plan. The project plan is a Word document that is a combination of a written explanation of the project plan and the explanation of the control plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation.
Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented. 
You will submit your Project Plan. The project plan is a Word document that is a combination of a written explanation of the Project Plan and the explanation of the Control Plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation.
Specifically the following critical elements must be addressed:
Project Plan: Illustrate your recommended implementation and management strategies. Be sure to include screenshots of all relevant diagrams, charts, and tables.

Work Breakdown Structure: Describe all of the essential roles and functions required for implementing the solution. Who will be doing the work and what, specifically, will they need to do?
Project Monitoring and Control Plan: How are you going to ensure that the project is going smoothly? What is your plan of attack to ensure that all controls are adhered to? What is the defined critical path? Be sure that you frame your response for communicating effectively to your target audiences.
Timeline: What is the estimated amount of time for implementation? Create a visual representation that captures your timeline (e.g., Gantt chart) based on the systems development life cycle.

What to Submit
Milestone Two should follow these formatting guidelines: 2–3 pages, double-spacing, 12-point Times New Roman font, one-inch margins, and citations in APA.

You will submit your roles and responsibilities portion of the final project. Wh

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information. 
Employing information assurance best practices will ensure a firm is able to eliminate hierarchical structures, become more flat, and have greater customer touch points by leveraging the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that is implemented and reviewed on a weekly basis.
The ability to properly assign roles is crucial to the design of an effective information assurance plan. Without clearly identified roles and responsibilities, the key members of an organization would not have a clear understanding of what was expected of them. The establishment of roles and responsibilities assists each member to communicate clearly and effectively throughout the organization.
Prompt
In Module Four, you will submit your roles and responsibilities portion of the final project. Your submission should answer the following questions: Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.
Specifically, the following critical elements must be addressed:
Information Security Roles and Responsibilities

Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization’s information. What is the relationship between these roles?
Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?
What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

What to Submit
Your paper must be submitted as a two- to three-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

Why does the use of passwords put the overall security of the network in jeopard

Why does the use of passwords put the overall security of the network in jeopardy? First, explain the techniques and tactics that hackers commonly utilize in order to compromise passwords. Next, navigate to the following site: How Big Is Your Haystack? Once in the site, experiment with passwords of varying lengths and character types. Then, discuss your findings in the discussion topic. Be sure to discuss the impact that changing the structure of the password had on overall password security. 

  Based on this week’s lectures take an inventory of door and window locks in yo

 
Based on this week’s lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security. 
Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to this dropbox.