Research topics of Cyber Terrorism and Information Warfare. We have read about resources that has pointed to countries attacking the United States and its businesses for information gathering, stealing trade secrets, and for monetary profit.
Research sources from the internet and write a 500-word essay on whether or not a cyber-attack from another country should or should not be considered an act of war. Think about what declaring a war over a cyber-attack would mean for our country and the military fighting men and women that defend our country. There is no right or wrong answer to this assignment, but you are required to support or defend your opinion with referenced works.
References should be included for internal and external resources. Standard use of APA format is required with website URL included.
1) Body of paper must be 3 – 5 pages | 12 pitch | Times Roman | Double Spaced
Cover Page (not included in body)
Reference Page (not included in body) .
Above is the instructions for the paper. So, I ordered 4 pages, make one the cover page and the other 3 the body. and then add the reference page.
In Milestone One, you will:
Given the provided scenario, explain the key considerations (must-haves) and constraints of the networking project at the firm’s new location.
Then make a well-reasoned recommendation of local area network (LAN) topology.
You work for an advertising firm with offices in Albany, NY, and Springfield, MA. The offices in Albany serve as the headquarters.
The Albany headquarters is home to the executive team and 150 employees. The headquarters also stores the corporate data and is the corporate internet backbone. It hosts the IT department that centrally manages all LAN services, including the wireless LAN. The IT department also manages the wide area network (WAN) that connects all of the offices via site-to-site virtual private network (VPN) tunnels. The Springfield office hosts about 50 employees. Approximately 50% of these employees are mobile, defined as traveling more than 80% of the time.
To hire and retain the best talent, the firm allows employees to work from home. This removes the constraint that employees have to live within commuting distance from the firm’s offices. Remote and mobile employees are provided access to the corporate network via a VPN client. The VPN client requires employees to have access to reliable internet services to allow for effective collaboration across teams and for access to media content. The company provides all employees with a laptop with full disk encryption, data loss prevention (DLP), and antivirus software. The IT department manages all corporate laptops and has the ability to log into all systems for support. This means that all laptops are centrally managed by the one IT department.
Due to an increase in opportunities for expansion to new markets, the firm has embarked on an initiative to hire and train new college graduates for the company’s Future Vision program. Future Vision focuses on global expansion. The initiative is to hire graduates into the marketing, finance, and IT departments. You were hired as part of the Future Vision program and have been working at this for some time now. You have spent a considerable portion of your time troubleshooting and analyzing the organization’s computer network to keep it running smoothly. Your direct supervisor and lead network administrator have been very impressed with your skills and fast learning abilities.
To determine whether you are ready to take on more responsibility, you have been asked for your input regarding the new Fayetteville, NC, office setup project. Your task is to conduct research on this area and deliver a report to the team with key considerations and recommendations for the setup of the network infrastructure. The Fayetteville office will be home to 50 employees, including the new executive vice president of sales and marketing. All the possible sites have offices located in an office building with access to fiber, cable, and T1 internet service providers. In addition to the standard network, the site must support live video teleconferencing calls with employees based at the other sites. It must also reliably send print jobs to billboard printers located in the company headquarters in Albany.
Your primary task is to respond to these questions:
How would you approach designing the network at the new location in Fayetteville, NC?
What considerations are key in informing the systems and resources necessary to meet the organization’s needs and support the business goals and objectives?
Keep in mind that this milestone contributes to the final project for this course. It is designed to help you succeed in finalizing the project. You will complete two milestones that provide the opportunity to draft key sections of the project, receive valuable feedback from your instructor, and submit a finalized report for the final project in Module Seven.
Specifically, your report should include the following:
Key Considerations: Summarize the key considerations of the project, being sure to identify your chosen location. For example, what are the must-haves? What are the constraints? In this section, you will:
Determine the appropriate communications media and mode of data transport for the new network.
This could be an opportunity to explain the OSI stack in relation to a modern communications network.
Identify the common network hardware components for this new location.
Describe the important IP range considerations for a company of your size.
Describe possible LAN topologies that could be used at the new location that support the desired architecture.
Compare the identified LAN topology possibilities based on their relative strengths and weaknesses in regard to support practices.
Based on your comparison, determine the appropriate LAN topology for this location to allow for optimal support practices. Be sure to explain your reasoning.
What to Submit
Your work must be submitted as a 1- to 2-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style.
Select one content item/objective from your line of work for training: corporate, education-PreK-12, government, or military organizations.
Prepare an online module of content using the Desire2Learn® (Brightspace / D2L) environment.
The following inclusions are a minimum of what is required in developing the online module of content:
* text file (objectives, resources, reading content),
* image file (diagrams, drawings, graphics illustrations, photos, charts),
* audio file (lecture, descriptions, explanations),
* video file (demonstrations, modeling), test questions (t/f, mc, one-word answer), one discussion question.
The content is designed, developed, and implemented using the D2L—eLearn tools and will be uploaded into your eLearn Sandbox course.
Your neighbor decides to add the Internet to their home network and there are a lot of options for them. In a document, list their options using your own real options for an example and describe each one in detail.
There are a lot of issues they may have to deal with. Make sure you are thorough in your descriptions.
Grading and Expectations
This assignment is due by the end of the academic week.
This assignment should be a minimum of two pages in length and a good discussion on the topic will receive full credit.
We visit websites everyday; however, we rarely question how websites work at a fundamental level or what “http” and “https” at the beginning of a website address stand for. Hypertext Transfer Protocol (HTTP) is an application protocol which is used for providing services to users (browser and web server). Hypertext Transfer Protocol Secured (HTTPS) is not opposite of HTTP but can be considered as an extension of HTTP. The main purpose of HTTP is to receive requests and deliver contents on the worldwide web; HTTPS works the same, in addition, the transmitted data is encrypted. Being able to understand HTTP and HTTPS will help us to protect ourselves from internet attackers.
Using these sources to explain with diagrams how the HTTP and HTTPS applications are used to communicate between the processes. What other layers are used in the transport? What services does the application layer protocol provide?
Resources cited need to be no older than 5 years. You can find extra sources if you need.
At least 3 pictures or diagrams need to be included. If copying pictures, be sure to cite where the picture/diagram source.
Page 270 the case study for these questions in 282
Check out the pdk book its in chapter 7 and the other document.
Answer A1 in points as I am listed and then write it in a short essay for me please.
However, Can you come up with critical question. There is already 3 on the paper I need to add one question,
Question 1 – Using RFID implants to speed up medical assistance may be a good thing, but what if crackers manage to access a person’s medical condition?
Context of Question →
Answer (include evidence in here) →
Answer Conclusion →
Critical question 4
Can you come up with 4th question for me please
he rapid development face-off was a competition between rapid application development (RAD) teams from the leading consulting firms in the United States. The goal was to see which team could develop a specific system in the least amount of time. Most teams used a very short program design step and quickly began programming. The Ernst & Young (E&Y) team members used a different approach. They spent much more time in the program design step to ensure that the system was well designed before they moved into programming. At first, the E&Y team fell behind while its competitors jumped ahead. But E&Y ended up winning because the team spent much less time programming by following its well-designed blueprint.
QUESTION: What are several reasons why planning ahead may have helped E&Y win?
was involved in the development of several decision support systems (DSS) while working as a consultant. On one project, a future user was frustrated because he could not imagine what a DSS looked like and how one would be used. He was a key user, but the project team had a difficult time involving him in the proj ect because of his frustration. The team used SQL Windows (one of the most popular development tools at the time) to create a language prototype that demonstrated the future systems appearance, proposed menu system, and screens (with fields, but no processing). The team was amazed at the user’s response to the prototype. He appreciated being given a context with which to visualize the DSS, and he soon began to recommend improvements to the design and flow of the system, and to identify some important information that was overlooked during the analysis phase. Ultimately, the user became one of the strongest supporters of the system, and the project team felt sure that the prototype led to a much better product in the end. Barbara Wixom
1. Why do you think the team chose to use a language prototype rather than a storyboard or HTML prototype?
2. What trade-offs were involved in the decision?
Identifying where an organization needs to focus their attention and investments is an important step to pursuing AI solutions. In this exercise you are asked to evaluate your own organization in terms of the underlying AI technologies.
You’ve explored the three main technologies supporting AI: Big Data, Computing Power, and Algorithms.
1) Identify what your organization should be doing to improve in each of these three technology areas. Clearly state what the organization should be doing and why.
2) Next, identify which of these three areas your organization needs to focus the most attention and why? Clearly state the area and your reason for why the area needs to most attention?