In Part 1 of your Project, you identified the network requirements based on the

In Part 1 of your Project, you identified the network requirements based on the specific needs of your clients. Much of your network’s effectiveness will depend on how you incorporate those requirements and address those client needs in your network design.
In this Discussion, you post your design of the network that meets operational requirements for the business you selected. You then provide constructive feedback to your colleagues on their network designs. Peer review is a vital aspect of any technology project. Please ensure your feedback is constructive and delivered in a respectful, professional manner.
Note: A revised final draft of your network design is due for your Project submission at the end of this week, so in this Discussion you are helping each another to improve your work.
To prepare:
1. Review the article “Network Topology Icons” from this week’s resources.
2. Create a diagram depicting your network design for the 3. business you selected.
4. Your diagram must include all network hardware and media. These include:
Connected devices
Peripherals
Routers/switches/hubs
Firewalls and other security measures
Modems
The internet (which may just be shown as a single cloud entity)
5. Indicate all wired and wireless connections
6. Ensure that every icon is labeled
Note: You may develop your diagram in Visio, PowerPoint, or any other software that supports diagramming/making images. When complete, you need to export it to an image/picture file type such as jpg, gif, or png.
Post
Post the image of your network design.
Explain how your design meets the requirements you identified.
Hint: Click on “Insert/Edit Image” to add the picture to your post. If you do not see this option, click on the “Show More” arrows on the top right of the toolbar to see additional options.
I’ll upload the instructions for the project I completed and a copy of the completed project. Can you make it 1.5 pages instead, out of courtesy for the long-standing relationship?

Courses of action tables are intended to be living documents that change as atta

Courses of action tables are intended to be living documents that change as attackers evolve their attacks and incident responders mature their defensive capabilities. This activity provides you the opportunity to draft an action table from the ground up as a means of understanding the methodology. As you have learned, analyzing the purposes, tactics, and features of adversarial threats is a key step in reducing vulnerabilities and protecting assets, as well as preventing and mitigating security incidents. By recognizing adversarial effects, security professionals target their response to maximize effectiveness.
In Milestone Two, you will draft section II.B of the final project: the courses of action table. This courses of action table is informed by the final project scenario. The table will include attack methods and features, detection locations and detection methods, and response objectives and methods. In examining this table, the stakeholder audience should be able to see how security measures employed by the response team align with the features of the adversarial threat. Some elements of the table have been completed for you to provide context.
To prepare for the assignment, be sure to review the Final Project Guidelines and Rubric document to see how this milestone fits in the overall project. Also review the Final Project Scenario and Final Project Support documents. You will note the rubric in this milestone activity is somewhat different, in that it is designed for you to have the opportunity to submit a draft of your work and receive valuable feedback for improving it. The Final Project Rubric will require a higher level of performance
Prompt
Specifically, the following critical elements must be addressed:
Courses of Action Table: You were provided with a Courses of Action Table template to use as the basis of this part of your project. Your completed courses of action table must address the full flow of a potential attack specific to the one in your provided scenario.
Attack Methods and Features: Describe logical steps to model a potential attack from start to finish.
Detection Location and Detection Methods: Describe potential detection location and methods for different steps in an attack pattern.
Responsive Objective: Identify the effects you want to achieve in countering the attack and how you want to achieve it.
Response Method: Identifies response methods that are logical and feasible in addressing the nature of the attack.
What to Submit
Your submission should use the available template table (or a comparable version with all the same information) and 12-point Times New Roman font.

ASSIGNMENT: POINTS OF FAILURE PURPOSE OF ASSIGNMENT When security professionals

ASSIGNMENT: POINTS OF FAILURE
PURPOSE OF ASSIGNMENT
When security professionals talk to laypeople, it’s easy to get caught up in technical jargon and see glazed-over eyes from your listener. Thinking through effective metaphors and analogies can make it easier for you to communicate important information to non-professionals. Conversely, you may also find yourself talking to IT professionals who assume you know a lot more about networks than you do. You can also ask questions based on analogies to gain a deeper understanding of complicated technical concepts. Creative thinking will also serve you well when you strategize about possible solutions.
ASSIGNMENT INSTRICTIONS
Please use 2 papers to address these following bullets:
•Define Single Point of Failure (SPOF)
•Does a gasoline engine have a single point of failure (SPOF)?
•Does a motorized police cruiser? Does a police department? How does each of the latter two compensate for single points of failure in the previous one(s)?
•How does understanding resilience in these other systems help recommend countermeasures to network-based threats?
•What lessons can be learned from this analogy in designing a computer network to resist attack?
•Please create an additional analogy to another type of operating system which also illustrates the single point of failure issue.
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each bullet listed above.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

ASSIGNMENT: POINTS OF FAILURE PURPOSE OF ASSIGNMENT When security professionals

ASSIGNMENT: POINTS OF FAILURE
PURPOSE OF ASSIGNMENT
When security professionals talk to laypeople, it’s easy to get caught up in technical jargon and see glazed-over eyes from your listener. Thinking through effective metaphors and analogies can make it easier for you to communicate important information to non-professionals. Conversely, you may also find yourself talking to IT professionals who assume you know a lot more about networks than you do. You can also ask questions based on analogies to gain a deeper understanding of complicated technical concepts. Creative thinking will also serve you well when you strategize about possible solutions.
ASSIGNMENT INSTRICTIONS
Please use 2 papers to address these following bullets:
•Define Single Point of Failure (SPOF)
•Does a gasoline engine have a single point of failure (SPOF)?
•Does a motorized police cruiser? Does a police department? How does each of the latter two compensate for single points of failure in the previous one(s)?
•How does understanding resilience in these other systems help recommend countermeasures to network-based threats?
•What lessons can be learned from this analogy in designing a computer network to resist attack?
•Please create an additional analogy to another type of operating system which also illustrates the single point of failure issue.
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each bullet listed above.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

please see the uploaded instructions. thank you PLEASE, BE CAREFUL, IT IS A TECH

please see the uploaded instructions. thank you
PLEASE, BE CAREFUL, IT IS A TECHNICAL ORDER
This is where you start to turn things in. Make sure to put your name up top.
Construct SQL to answer each of the following questions. For each query, paste your SQL code below, and also paste a screenshot of the first 10 or so rows the query gives you.
Give an answer to the question based only on what you see in your SQLite database. (Do not use Excel or other tools to answer these questions; since we are trying to learn SQLite here, you should do these exercises in SQLite.)
You will eventually submit this document as part of your week’s assignment.
After you have completed your first draft of this document, you will use the SQL Check online quiz to verify your answers. The SQL Check online quiz uses the same numbering system given here, so you can quickly find the question you need.

I just placed an Order #LW92269 Therefore, I need a totally different writer for

I just placed an Order #LW92269
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
ASSIGNMENT: Case Study
This assignment will help you evaluate the threats posed by personnel and make a recommendation for hiring a potentially risky candidate.
The U.S. Government, in an effort to increase transparency, has created a new rule which requires a civilian to be appointed to assist in the hiring of virus writers whose job will be to write viruses and malicious code for the military to be used offensively against an enemy.
Assume you have been asked to sit on this board to assist in the selection of an Candidate for this position.
You are presented with the following two candidates;
Candidate 1: Harold Highspeed
Harold is a Captain in the Air Force with a top secret clearance. He has had no issues or problems on his record. He grew up in Rolla, Missouri, attended The University of Arkansas with a bachelor’s degree in computer science . He has no prior criminal record or traffic tickets, his polygraph confirms he does not drink or smoke, and is a devout Christian who never married. His psychological and professional profile shows he is inclined to follow orders without question and his skill level as a virus writer is medium.
Candidate 2: Wo Fat
Wo was born and raised in Taiwan and showed potential at a young age for computing skills. He was accepted and attended RPI for computer engineering and graduated with a median GPA of 3.0. Wo has a bit of a troubled past and was a confirmed attendee at six Defcon conferences in the past. He is also suspected of engineering a DDOS attack against the Chinese’s government who recently jailed five Taiwanese fishermen for allegedly fishing in Chinese waters without a permit. They were given lengthy jail sentences which did not fit the crime and there have been several protests of the incident. He has no declared religion, is not married and his psychological profile indicates a high preference for just actions but questions authority. His skill level is considered very high and admittedly has micro-dosed DMT several times over the past few years.
Assignment Instructions
First Acknowledge the different risks associated with hiring either person and the different mitigation strategies you would have to use to lower those risk.
Next, Using 3 Pages, Answer the following Questions in a professional narrative language’
• Explain which candidate you would recommend for the position and why.
• What are the personnel and IS risks to the government of hiring a hacker?
• What is the level of risk for each Candidate and why?
• What makes this Recommended Candidate an asset and why? How could you leverage those strengths?
• What makes the Candidate a liability and why? How would you mitigate those risks?
• List 2-3 emerging security threats and how your recommended candidate would help the government address them. Be sure to use credible source that addresses the credibility of the threat.
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each bullet listed above.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

To practice your literature search and academic report writing skills, you are t

To practice your literature search and academic report writing skills, you are tasked with investigating the impact of social determinants of health and relevant programs/projects/policies across a variety of information resources.
The intent is for you to practice your research skills and to practice using the Library Resources. Each student will contribute their individual research and the team will then integrate the findings into a more comprehensive review and report.
INDIVIDUALLY, conduct a search for information, articles, and materials relevant to the SDOH. Find at least 3 sources on the specific focus (determined by your group) in relation to the Social Determinants of Health.
POST summary of the information and resource in your Team Discussion Board Address both SDOH issues and the type of information provided by the source, e.g., when and for what type of information would you access this resource to obtain. The correct APA citation for the source. Team Plan will determine if this posting also requires a Word document.
This criterion is linked to a Learning Outcome Initial Posting:
1. Provides a summary/critique of information on SDOH for 3 sources by Sep 30
2. Discusses value of each source – when and for what type of information is it useful … how and who might use
3. Provides APA reference for each source in APA format
NOTES:
– Three (3) paragraphs minimum
– Include Three Credible Sources (References & Citations)
– I have included a few articles but I will need a few better sources. I have included attachments as well.
– Three Paragraphs & One source per paragraph (citation & reference)
– Make sure to disucss the following mainpoints and provide articles as part of Neighborhood & Built Environment: Quality of housing, Access to Transportation, Avaliability of healthy foods, air & water quality, and neighborhood crime & violence.

*If the wording and sources are exactly the same, I will submit a Revision Reque

*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1 CYBER VS TRADITIONAL ORGANIZED CRIME
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Answer the following questions:
• What is the first organization that pops into your head when you hear the phrase “digital organized crime.” Explain Why?
• How is this different from “organized crime”?
• How do the motivation, methods, and history of digital organized crime compare to “traditional” organized crime?
• How would these characteristics change your recommended countermeasures for each type of organization?
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: ESPIONAGE AS A SERVICE
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Answer the following questions:
What is Espionage as a Service (EaaS)?
How severe is this threat?
What are at least 3 effective and appropriate countermeasures or mitigation strategies?
How do they differentiate for public and private sector organizations as appropriate.
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

NO extensions! DISCUSSION PART 1 DEFINING HACKING ****PLEASE USE only 137 WORDS

NO extensions!
DISCUSSION PART 1 DEFINING HACKING
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
First, consider hacking over time:
• How has the definition of hacking changed over the last 40 years, and what does this mean for hackers today?
• How have the characteristics of hackers changed over time?
Second, consider current hackers:
• Broadly speaking, what are the social characteristics and motivations of modern hackers?
• Choose one subtype, and outline 2-3 significant, unique threats that they pose
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: HACKTIVISM AND FREE ELECTRICITY
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Many hackers believe that exposing secrets that could benefit humanity is fair game. Imagine that a scientist develops a device that runs on medium size magnets and is only 6 by 3 by 4 feet in diameter. This device can provide free, clean, constant and safe electricity to any large home (5000 square feet). The scientist posts these plans on the internet, but the plans are taken down within 3 hours by the government for national security reasons.
• If a hacktivist were to re-post these plans all around the world, would you consider this a crime if the end result would benefit humanity? Why or why not?
• What criteria did you use to make your decision and why?
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

NO extensions! I just placed an Order #LW92257 Therefore, I need a totally diffe

NO extensions!
I just placed an Order #LW92257
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1 DEFINING HACKING
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
First, consider hacking over time:
• How has the definition of hacking changed over the last 40 years, and what does this mean for hackers today?
• How have the characteristics of hackers changed over time?
Second, consider current hackers:
• Broadly speaking, what are the social characteristics and motivations of modern hackers?
• Choose one subtype, and outline 2-3 significant, unique threats that they pose
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: HACKTIVISM AND FREE ELECTRICITY
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Many hackers believe that exposing secrets that could benefit humanity is fair game. Imagine that a scientist develops a device that runs on medium size magnets and is only 6 by 3 by 4 feet in diameter. This device can provide free, clean, constant and safe electricity to any large home (5000 square feet). The scientist posts these plans on the internet, but the plans are taken down within 3 hours by the government for national security reasons.
• If a hacktivist were to re-post these plans all around the world, would you consider this a crime if the end result would benefit humanity? Why or why not?
• What criteria did you use to make your decision and why?
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***