DDN1 — DDN1 TASK 1: CAPSTONE TOPIC APPROVAL AND RELEASE FORMS CYBERSECURITY GRAD

DDN1 — DDN1 TASK 1: CAPSTONE TOPIC APPROVAL AND RELEASE FORMS
CYBERSECURITY GRADUATE CAPSTONE — D490
PRFA — DDN1
TASK OVERVIEWSUBMISSIONSEVALUATION REPORT
COMPETENCIES
981.4.1 : Capstone
The learner integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional field.
INTRODUCTION
For your capstone, you will identify a current cybersecurity problem and propose a project to address it. In later tasks, you will be asked to gather, analyze, and present data related to your research question. Your capstone proposal serves the purpose of organizing your ideas for a project so you can complete the project as efficiently as possible. To start this capstone project, you must first discuss your project ideas and potential research question with an instructor. After you reach an agreement on your research topic, you must fill out the top portion of the attached “Cybersecurity Graduate Capstone Topic Approval Form” and send it to the instructor. The instructor will digitally sign your form and then lock it to prevent further changes to the document.
It is the policy of Western Governors University (WGU) that capstone projects should not be based on or include any proprietary or classified information or material belonging to your employer or any other organization unless you obtain the owner’s permission to use it. Such material belongs to this third party and is referred to as “restricted information.” You must declare with a digital signature whether your capstone project is based on or includes restricted information by submitting the attached “Cybersecurity Capstone Release Form.” This completed attachment also documents that you have permission from the third party to use the restricted information.
Projects involving human subjects or the use of protected data will require Institutional Review Board (IRB) approval. Work directly with your instructor if your project includes research that involves human subjects in order to determine whether it requires review by WGU’s IRB.
Note: Any information that could be considered confidential, proprietary, or personal in nature should not be included in the actual task submission to WGU. Do not include the actual names of people, suppliers, or companies, or other identifiable information. Fictional names should be used where necessary. Company-specific data, including financial information, should not be included but should be addressed in a general fashion as appropriate.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Complete the attached “Cybersecurity Graduate Capstone Topic Approval Form.” Include a signature and date from your instructor to indicate that this form has been approved.
B. Complete the attached “Cybersecurity Capstone Release Form” and digitally sign it, where applicable, after choosing the option that applies to your capstone project.
Note: If the capstone project is based on or includes restricted information, please provide a third-party letter of authorization.
C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
D. Demonstrate professional communication in the content and presentation of your submission.
DDN1 — DDN1 TASK 2: PROJECT PROPOSAL
CYBERSECURITY GRADUATE CAPSTONE — D490
PRFA — DDN1
TASK OVERVIEWSUBMISSIONSEVALUATION REPORT
COMPETENCIES
981.4.1 : Capstone
The learner integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional field.
INTRODUCTION
In this task, you will design the capstone project approved by your instructor. You will write a report about the security problem you identified in Task 1 and compile the information for your solution to that security problem into a report.
Your work for this task will not be evaluated until the appropriate forms from Task 1 have been submitted and evaluated.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
Write a report of the security problem under investigation by doing the following:
A. Describe the security problem under investigation.
1. Explain the importance of the security problem, including background information and the environment in which the problem exists.
2. Provide documentation related to the security problem demonstrating the need for a solution, referencing applicable white papers or articles.
3. Summarize each root cause of the problem in the identified environment where the security problem is situated, including supporting evidence, if applicable.
B. Summarize each internal and external project stakeholder role by including each of the following:
• individual stakeholder implementation involvement and associated individual needs
• how the security problem affects the stakeholder
• stakeholder influence on the projects’ objectives and outcomes
C. Describe the historical data used to support decision-making throughout the project (e.g., vulnerability scans, penetration testing, testing or validation scenarios, audit results, etc.).
D. Provide a detailed explanation of the project requirements to implement the solution.
1. Describe the industry-standard methodologies guiding the solution’s design and development.
2. Describe the project launch, including all phases of the rollout, the criteria used to determine the conclusion of implementation, and the project management methodology for implementation.
3. Describe the likelihood of all implementation risks and their impact on the project.
E. Describe the training approach, including the audience, delivery, content, and duration.
F. Describe the required resources necessary to execute each project phase, and provide sources for all costs.
G. Describe all final project deliverables associated with the design and development of the technology solution.
1. Estimate the projected timeline, including each of the following:
• each milestone and its duration
• start and end dates
• resources assigned to each task
H. Detail the project evaluation approach that will be used to assess the project, addressing the following:
1. Describe the formative and summative test plans for the solution, including all required procedures and tools.
2. Describe the minimal acceptance criteria and key performance indicators for project acceptance as they align with your formative and summative test plans.
3. Justify the test cases and scenarios in the environment of the security problem being addressed.
4. Explain how you will analyze your results.
I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
J. Demonstrate professional communication in the content and presentation of your submission.
DDN1 — DDN1 TASK 3: TECHNOLOGY-SUPPORTED SECURITY SOLUTION
CYBERSECURITY GRADUATE CAPSTONE — D490
PRFA — DDN1
TASK OVERVIEWSUBMISSIONSEVALUATION REPORT
COMPETENCIES
981.4.1 : Capstone
The learner integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional field.
INTRODUCTION
In this task, you will develop and implement the capstone project approved by your instructor. You will compile the information for your solution to your cybersecurity problem into a report.
Your work for this task will not be evaluated until Task 2 has been submitted and evaluated.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Describe the policies adopted as a result of your implemented project.
1. Summarize how the solution improves cybersecurity decision-making.
B. Describe how your solution meets the following cybersecurity assurance criteria:
• promotes automation in cybersecurity
• improves and modernizes security
• implements industry-standard security tools and infrastructure or environment
C. Explain how your solution addresses the following data collection and implementation elements:
• collects digital evidence, including data for analysis or forensics
• implements confidentiality, integrity, and availability
D. Explain how your solution investigates and mitigates cybersecurity incidents or crimes within the environment where the solution was implemented.
E. Describe the cybersecurity plans, standards, or procedures that were developed for the solution.
1. Explain how the solution is aligned with cybersecurity initiatives or regulatory compliance in the environment where the solution was implemented.
2. Summarize the applications, tools, installation guides, or user guides you developed in conjunction with the solution.
F. Discuss the post-implementation environment, including the new systems implemented, new processes developed, or network diagrams created demonstrating the new infrastructure.
1. Describe how the solution improved the security posture and efficiency of the organization.
2. Analyze the new data (e.g., new reports, logs, processes in place) collected, including how the solution will affect business processes.
3. Describe the summative evaluation plan from Task 2, including the test results and a plan of action to correct any weaknesses or deficiencies.
4. Discuss post-implementation risks, including their likelihood, organizational impact, and mitigation.
5. Explain how the security solution meets each of the project stakeholders′ needs, including a desсrіption of the stakeholder needs as identified in Task 2.
G. Describe the post-implementation maintenance plan for the solution.
H. Provide one original artifact (e.g., security policy, procedure, network diagram) of the completed project.
I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
J. Demonstrate professional communication in the content and presentation of your submission.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Title is EXECUTIVE INFORMATION SYSTEM Information can be presented in varying fo

Title is EXECUTIVE INFORMATION SYSTEM
Information can be presented in varying formats, some more useful than others. In building an Executive Information System (EIS), you need to consider the stakeholders who will use the system, as well as how the system will be used and the data it will present.
Review the Learning Resources for this week.
Consider how you will design an Executive Information System, including potential system connections to positive social change.
300–400 words in which you:
Describe the approach, design, and implementation of an Executive Information System that will address the following:
What are the five most important questions your department needs to be able to answer on a regular basis?
How current does information for your department need to be (real time, up to the minute, hourly, daily, or only when changes occur)? Explain.
How accurate must the information used for analysis be (99%, 95%, 92%, 85%,…)?
Explain what this level of accuracy means operationally for your department.
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

I need to implement cloud based workflow orchestration for an e commerce applica

I need to implement cloud based workflow orchestration for an e commerce application
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

Business as Mission (BAM) has a number of core elements, the first of which is t

Business as Mission (BAM) has a number of core elements, the first of which is to develop businesses that are primarily driven by the Great Commission found within the Bible in Matthew chapter 28.
1) Using respected Christian sources, briefly research the history and current position of BAM today.
2) The research problem you are attempting to personally solve has implications on organizations. Whether this is IT agility, flexibility, management efficiency, marketing effectiveness, improved performance, and/or other aspects that influence the bottom line. Using the Bible, and several relevant journal articles, explain how the outcomes of your solution could influence BAM.
3) Explain a strategy for a theoretical implementation of BAM with the solution of your thesis

Create a slide to spread awareness of scam emails to an organization. Main topic

Create a slide to spread awareness of scam emails to an organization. Main topics to cover are the different types of scam emails, how to identify them and how to respond when receiving such an email
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)

1 ) What is Ansible & why is it so useful in configuration management? 2 ) What

1 ) What is Ansible & why is it so useful in configuration management?
2 ) What are the main components of Ansible?
3 ) Explain how Ansible Playbooks work?
Notes:
-I don′t need APA but I do need at least 1 link per question and it has to be from a source that doesn′t need to be logged in, open to everyone.

For this assignment, you will create a plan for installing a muzzle brake on a n

For this assignment, you will create a plan for installing a muzzle brake on a new barrel. Review pages 100 – 105 and 131 – 146 in your course textbook, and conduct additional research as needed.
Your customer has brought you a Remington M700 with a stainless-steel barrel chambered in .308. He has requested you install a muzzle brake.
Summarize the following procedures for threading the barrel:
– Locating the threads
– Centering the lathe
– Cutting the threads
Comments from Customer
Discipline: FTT 231 Machining and Manufacturing of Firearms

For this assignment, you will continue your plan to accurize a customer’s firear

For this assignment, you will continue your plan to accurize a customer’s firearm. In this week, you will address the bedding of the barreled action to the stock. Read the following prompt and create a submission that answers all of the questions below.
For review:
Your customer brought you a used Remington 700 with a wooden stock and a Vortex® Optics Viper HS LR scope. She says she wants to take the rifle on her first antelope hunt and expects to take shots at 500 yards or further.
After bench-testing the rifle and adjusting the optics, you find that it still does not group well, even at short ranges. You have inspected and repaired the crown and breech lock-up; now you will investigate the bedding of the barreled action to the stock.
Please answer the following prompts:
Explain to the customer the purpose of mock-bedding the rifle and what you will do if you discover that your grouping is oddly shaped or very wide.
What is the next assembly you will check after you feel you have a secure mock-bedding? You do not have to explain this inspection, as you have already done so in a previous week.
Your submission must be a minimum of 250 words and must be submitted as a Word document.
Comments from Customer
Discipline: FTT 221 Sights, Optics, and Accuracy