Throughout the course, you will be studied a variety of Artificial Intelligence

Throughout the course, you will be studied a variety of Artificial Intelligence topics that are relevant in enterprise settings. Some of you are students exclusively while others of you work in corporate America. Regardless of your situation, the advances of Artificial Intelligence is disrupting the way people work, live, and learn. The goal of this research assignment is to conduct a deep-dive analysis on one of the following topic areas. When conducting your research, you need to identify how Artificial Intelligence in business is a disruptor to the specific topic area selected. Topic areas to consider include:Research Topics in Planning and Scheduling for AI
Research Topics in Commonsense Reasoning
Research Topics on Artificial Intelligence in Education
Research Topics on Artificial Intelligence in Finance
Research Topics on Artificial Intelligence in Business Management
Research Topics on Artificial Intelligence in Marketing
Research Topics on Artificial Intelligence in Healthcare
Research Topics on Artificial Intelligence in Internet of Things
Research Topics in Uncertainty Modeling for AI
Research Topics in Explainable Artificial Intelligence
Research Topics in Ethics of Artificial Intelligence
The final paper includes an exhaustive research study using the outline below to substantially support your findings. Using the following paper structure format:You are to write a 10-12 page research paper.
The paper should be, double-spaced following APA format using a Times New Roman 10 to 12-point font.
Page counts do NOT include cover pages, references, or abstract.
Treat this as if you had an opportunity to publish in a peer-reviewed business or technology journal.
The paper structure should be as follows:Abstract
Introduction
Problem Statement
Research Analysis
General Findings
Strength Identification relative to disruption
Weakness Identification relative to disruption
Why is this an opportunity?
Why is it a threat?
How does this disruption solve problem X?
Further areas of research to consider
Conclusion
References
The grading rubric is attached as part of the submission.
You are to create a 10-12 slide PowerPoint presentation based on the Final Research paper you’ve created. Treat this as an executive overview/synopsis. Use the same outline presented in the paper to guide your PowerPoint.
Keep your content focused! Simple, concise facts on the presentation.
The presentation must be attractive and business savvy.
Make sure you present your content without any spelling or grammatical errors. Also, cite where appropriate.

Your DO assignment for this module is to undertake a subnetting exercise. You mu

Your DO assignment for this module is to undertake a subnetting exercise. You must show your work, step by step, on this. You must do all of the exercises listed here. You must do this assignment on your own and your work must be your own. Any use of the work of others will result in a zero for this assignment and a referral to Judicial Affairs.
IMPORTANT NOTE: If you are familiar with variable subnetting (called VLSM … variable length subnet masks), we will NOT be using it here, as it is beyond the scope of our introductory look at subnetting. We’re keeping it simple, using FLSM (fixed length subnet masks), so don’t overcomplicate this assignment. Accordingly, each of the following scenarios should have a single subnet mask that applies to all of the networks. In other words, in each scenario there will be a single subnet mask that will work as a solution for the problem and apply to all of the departments listed. Do not create a different mask for each department.
We will not get into VLSM in this class, but will stick with straight subnetting. In VLSM, you can subnet subnets. For example, if I have 4 subnets of 64 addresses each, I can subnet one of those subnets into 4 additional subnets of 16 each, giving me 7 total subnets (3 with 64 hosts and 4 with 16 hosts). But there are complexities that are beyond the scope of this course, so we’re just using simple subnetting here. If you are interested in VLSM, you can get more details here.
1. You have a small business that is divided into 3 departments: Accounting, Sales, and Administration. These departments have the following number of devices (computers, printers, etc.): Accounting-31, Sales-28, and Administration-13. Using a class C private network, subnet the network so that each department will have their own subnet. You must show/explain how you arrived at your conclusion and also show the following: All available device addresses for each department, the broadcast address for each department, and the network address for each department. Also, determine how many “wasted” (not usable) addresses resulted from your subnetting (enumerate them).
2. After two years, business has boomed. Accounting now has 37 computers, Sales 35, and Administration 24. In addition, you have added a Shipping department and a Production department. Shipping has 13 computers and Production has 21. Using a class B private network, rework the subnetting for the business with the same information (deliverables) as in problem 1.
3. Finally, your company is purchased and merged with a larger company. The new company has the following needs: Main office-1211 computers, Muncie branch office-917 computers, Indianapolis plant-2014 computers, and the Mt. Vernon distribution center 945 computers. Using a Class A private network, subnet so that each site has its own network to handle its current computer requirements plus a 20% cushion for future growth and provide the same information (deliverables) as in problems 1 and 2.
NOTE: We will assume, for the purposes of this assignment, that you are using all Cisco equipment and that all equipment has been configured with the ip subnet zero Cisco IOS command. Accordingly, you may use subnet zero and also the all-ones subnet.
When you have completed this assignment, use the dropbox for this assignment to submit it. Note the deadline on the course calendar.

you are going to explore how digital computing has changed the world of sports.

you are going to explore how digital computing has changed the world of sports. Create and share a timeline of milestones and how these milestones have changed the world. Include at least 6 milestones. Note that everything on your timeline MUST be a digital technology!!!
I suggest that you use Microsoft PowerPoint to create your timeline.
For each milestone include:
an image
a date (might be just a year or might be a specific day)
a brief description of the milestone
a brief description of the impact it had on society
write a paragraph describing your topic and why you chose it. You must have at least one MLA citation for a reference you used to create the timeline.
Example of main post:
Boston Dynamics
Boston Dynamics Robots:
I chose to research the robotics company, Boston Dynamics. I had seen some of the videos they posted online showing some of their robots in action. They are really amazing! Robots are incredibly useful and interesting. The company was started in 1992 by two professors who worked with the government to create robots. The company was sold to Google X in 2013, then to Softbank, a Japanese company, in 2017. It has been owned by Hyundai Motor Group since 2020. Boston Dynamics became well known for videos they made and posted online showing the incredible things their robots can do. In 2022 the company signed a pledge that it would not support weaponizing any of their robots. Boston Dynamic has created bipedal and quadrupedal robots. Most of their robots are created for safety, to explore areas that are unsafe for humans for activities such as search, and rescue or bomb disposal, or to spot fire hazards. These robots are saving lives and paving the way for future technologies that will benefit humanity. Take a look at their videos!
Bora, Chandramita. “The Boston Dynamics Story”, Techstory, 2018, https://techstory.in/the-boston-dynamics-story/ . Accessed 27 January 2023.
Boston Dynamics. Boston Dynamics, 2023, www.bostondynamics.com/ Accessed 27 January 2023.
“Boston Dynamics”. Wikipedia, The Free Encyclopedia, Wikimedia Foundation, 2023, https://en.wikipedia.org/wiki/Boston_Dynamics. Accessed 27 January 2023.
Wolfel, Emily. “Boston Dynamics: The Company Making Earth’s Most Terrifying Robots”, History Computer, 2022, https://history-computer.com/boston-dynamics-guide/ . Accessed 27 January 2023.
(that is just an example the professor gave us, let me know if you can not access to the picture, In the link below is attached the rubric that she will use to grade)
Discussion 1 (How Digital Computing is Changing the World) Rubric

What are some of the key challenges and best practices for managing additional d

What are some of the key challenges and best practices for managing additional devices in virtual machines, such as storage and networking devices, when copying or cloning a VM?
How can organizations ensure that all devices are properly configured and mapped to the correct drivers and settings, and how can they manage the impact of adding or removing devices on their storage and networking resources?
What are some of the licensing and compliance issues that organizations need to consider when copying virtual machines, and how can they ensure that each copy of the VM has the appropriate software licenses and security settings?
Please be sure to validate your opinions and ideas with citations and references in APA format.

Rocky Mountain Corporation (RMC) has relocated to a new building that was previo

Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based Wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.
You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.
RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.
Instructions:
In an eight- to ten-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:
Section 1: Topology (type of network) and network devices
RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN).
The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
Provide a cryptography method that will ensure vital data is encrypted.
Provide an explanation of what network protocols will be used on the LAN and why. Ensure that the network has the capacity to:
connect all users to company resources (e.g. printers, scanners, and other items). provide file sharing options.
manage these resources in a central location.
allow for internal users to access the internet; and
allow external users vendors to access the LAN remotely.
Your proposal should include budgetary cost estimates for the chosen topology.
Section 2: IP Infrastructure
RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP Class assignment), which is mindful of the company’s expectation of continued growth.
Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
Section 3: Security
Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
Provide a thorough plan to protect the network from malware and various types of malicious attacks.
Submission:
Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.
Length: Your paper must be eight to ten pages in length, not including the required cover and references pages.
Sources: Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the uCertify.)

Rocky Mountain Corporation (RMC) has relocated to a new building that was previo

Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based Wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.
You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.
RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.
Instructions:
In an eight- to ten-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:
Section 1: Topology (type of network) and network devices
RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN).
The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
Provide a cryptography method that will ensure vital data is encrypted.
Provide an explanation of what network protocols will be used on the LAN and why. Ensure that the network has the capacity to:
connect all users to company resources (e.g. printers, scanners, and other items). provide file sharing options.
manage these resources in a central location.
allow for internal users to access the internet; and
allow external users vendors to access the LAN remotely.
Your proposal should include budgetary cost estimates for the chosen topology.
Section 2: IP Infrastructure
RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP Class assignment), which is mindful of the company’s expectation of continued growth.
Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
Section 3: Security
Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
Provide a thorough plan to protect the network from malware and various types of malicious attacks.
Submission:
Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.
Length: Your paper must be eight to ten pages in length, not including the required cover and references pages.
Sources: Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the uCertify.)

Step 8: Submit Networking in the Cloud Technical Report As your final submission

Step 8: Submit Networking in the Cloud Technical Report
As your final submission, you will write a technical report about networking in the cloud. It will be addressed to BallotOnline technical managers to help them understand how these networking technologies will be implemented as BallotOnline migrates to the cloud.
It will include technical review of the topics covered in the project. Follow the Networking in the Cloud Technical Report Template to cover all the topics required. Make sure you provide headings to clearly identify sections of your report. The technical review part of the report should be eight to 12 pages. You should also include both Project 1 lab reports
Follow the instructions in the project and review the grading rubric, which will be used to grade your work.
3.1.1: Extract relevant information needed to solve the problem or situation.
ASSESSMENT METHOD: SCORE ON CRITERIA – 3.1: IDENTIFY NUMERICAL OR MATHEMATICAL INFORMATION THAT IS RELEVANT IN A PROBLEM OR SITUATION.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
3.2.1: Perform accurate calculations which are sufficiently comprehensive to solve the problem.
ASSESSMENT METHOD: SCORE ON CRITERIA – 3.2: EMPLOY MATHEMATICAL OR STATISTICAL OPERATIONS AND DATA ANALYSIS TECHNIQUES TO ARRIVE AT A CORRECT OR OPTIMAL SOLUTION.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
3.2.2: Use appropriate and complete quantitative analysis techniques to arrive at a correct or optimal analysis.
ASSESSMENT METHOD: SCORE ON CRITERIA – 3.2: EMPLOY MATHEMATICAL OR STATISTICAL OPERATIONS AND DATA ANALYSIS TECHNIQUES TO ARRIVE AT A CORRECT OR OPTIMAL SOLUTION.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.2.1: Describe virtual networking concepts.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.2: DEMONSTRATE THE ROLE OF NETWORKING IN CLOUD.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.2.2: Analyze real-world case studies on various virtual cloud networking implementations.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.2: DEMONSTRATE THE ROLE OF NETWORKING IN CLOUD.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.2.3: Explain how virtual networking can be used in the cloud.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.2: DEMONSTRATE THE ROLE OF NETWORKING IN CLOUD.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.5.1: Describe virtualization technology and how it is the foundation of cloud infrastructure.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.8: REVIEW, EVALUATE, AND UTILIZE EMERGING TECHNOLOGIES RELATED TO CLOUD TO SUPPORT BUSINESS NEEDS.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.5.2: Design virtual machines for deployment in the cloud.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.8: REVIEW, EVALUATE, AND UTILIZE EMERGING TECHNOLOGIES RELATED TO CLOUD TO SUPPORT BUSINESS NEEDS.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.5.3: Identify differences and implications between having an on-site data center versus having a data center as a service or software-defined data center.
ASSESSMENT METHOD: SCORE ON CRITERIA – 6.8: REVIEW, EVALUATE, AND UTILIZE EMERGING TECHNOLOGIES RELATED TO CLOUD TO SUPPORT BUSINESS NEEDS.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.8.1: Identify the future trend of cloud computing.
ASSESSMENT METHOD: SCORE ON CRITERIA – 8.2: ASSESS NETWORK SECURITY AND PRIVACY RISKS ASSOCIATED WITH CLOUD INFRASTRUCTURE.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.8.2: Assess how current cloud computing technologies will evolve.
ASSESSMENT METHOD: SCORE ON CRITERIA – 8.2: ASSESS NETWORK SECURITY AND PRIVACY RISKS ASSOCIATED WITH CLOUD INFRASTRUCTURE.
REQUIRED PERFORMANCE: MEETS PERFORMANCE REQUIREMENTS
6.8.3: Propose steps that businesses need to take to prepare for the next generation of cloud computing.
ASSESSMENT METHOD: SCORE ON CRITERIA – 8.2: ASSESS NETWORK SECURITY AND PRIVACY RISKS ASSOCIATED WITH CLOUD INFRASTRUCTURE.

IDS Analysis Paper Overview The implementation of intrusion detection system (ID

IDS Analysis Paper
Overview
The implementation of intrusion detection system (IDS) technologies comes in many different forms. Staying current with industry literature that discusses strategies on mitigation and remediation of different malware will increase your knowledge of what steps to take to help prevent succumbing to an attack. As cybersecurity is a field that can change on a daily basis, you will not stop learning and growing even after you complete your degree program. Evolving with the field and staying current is a critical aspect of being successful and excelling in this field.
It is important to recognize that IDS is not a one-size-fits-all tool. An IDS can be configured in three different ways: it can test for anomalies, be heuristic-based, or be a hybrid of the two. Configuring the IDS to meet specific business needs will reduce the amount of time an analyst needs to explore log files and other information generated by the IDS. The individual should be left to handle the alerts generated by the properly configured system.
When putting any controls in place to protect a system, you must always keep confidentiality, integrity, and availability in mind, using your proactive mindset, to develop the best protection for the system. It is important to examine possible indicators of an attack and how other aspects of a system can be affected. Malware is a great example of an attack that affects all tenets of the CIA triad.
For this project, you will be creating an IDS Analysis Paper that examines the interaction of the security objectives of the CIA triad and the configuration of an IDS, and contains practical application of IDSes in a scenario-based application of your choosing.
The project incorporates one stepping stone, which will be submitted in Module Four. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following competency:
Implement an intrusion detection system (IDS)
Prompt
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.
IDS and Security Objectives—Critical Thinking QuestionsWhat component of an IDS is best prepared to help with the loss of confidentiality?
What are the indicators of malware that could be detected by an IDS that may result in the loss of integrity?
How can an IDS be used to detect the loss of availability?
Configuring an IDS—Scenario Based QuestionsCreate a brief fictitious scenario of a company that resides within two buildings. Include a short profile of its data assets, its industry, and its size. For example, Southern New Hampshire High School has an administration building and an academic building. The data assets it protects are student records and employee records. The industry is education, and there are 500 students and employees.
Identify two components that you would implement to provide the best IDS protection for your fictitious company. Justify your response.
What to Submit
Your submission should be 2–4 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Critical Thinking Questions: ConfidentialityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains what component of an IDS is best prepared to help with the loss of confidentialityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Critical Thinking Questions: IntegrityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes indicators of malware that could be detected by an IDS that may result in the loss of integrityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Critical Thinking Questions: AvailabilityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how an IDS can be used to detect the loss of availabilityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Scenario Based Questions: Fictitious ScenarioMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerCreates a brief, fictitious scenario of a company that resides in two buildings, including a short profile of its data assets, its industry, and its sizeAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Scenario Based Questions: Two ComponentsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerIdentifies two components to configure to provide the best IDS protection for the fictitious company and justifies responseAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas10
Total:100%