You have been hired as an experienced network engineer to design a network that

You have been hired as an experienced network engineer to design a network that will integrate SNMP, Netflow, and syslog to monitor network health. The wired network consists of five departments in a two-story building using IPv4 currently. Research and create a list of requirements for deploying SNMP, Netflow, and syslog into the network with minimal impact to users and customers. Including all three services into the network may require new IP addresses to be allocated. Make sure new IP addresses are listed in the requirements.
Write a minimum 3-page paper (cover letter and reference page do not count) and draw a network diagram that will be inserted into your plan to present to your manager, who has a technical background, that details your plan and your timeline for implementation.
Make sure that:
1. Your plan includes equipment and configuration information.
2. Your plan is comprehensive and has one or more network diagrams that portray your plan.
3. Your plan includes your proposed network changes and a 2-sentence outage message that will be sent by a broadcast email to the affected users.
4. Your plan includes other concerns about this change and other departments that should potentially be contacted before the change.
5. Your plan contains an APA title page, running header, table of contents, abstract, and references page.
Parameters/Expectations:
In addition to the above criteria, please ensure the following:
1. The plan’s viewpoint and purpose should be clearly established and sustained.
2. The plan should follow the conventions of Standard English (correct grammar, punctuation, and spelling).
3. The plan’s writing should be well ordered, logical and unified, as well as original and insightful.
4. Current APA formatting and citation style should be followed.
Written Portion Requirements
The written portion contains sufficient information to adequately address the questions and is free from grammar and spelling errors. The paper will be provided in current APA format. Screenshots and any diagrams do not count towards the length requirement.
For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course.
Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs, and discussion posts. If you have any questions, please contact your professor.

Validation/Evaluation 1. Research best practices in handling and storing digital

Validation/Evaluation
1. Research best practices in handling and storing digital evidence:
• Using your preferred Internet browser, perform a search for best practices in handling and storing digital evidence in a forensic investigation. Focus specifically on removable media.
• Using at least three credible references, prepare a one-paragraph summary of your findings, document your sources.
Validation/Evaluation
2. • Using your preferred Internet browser, perform a search for removable media file recovery software
• Identify at least three tools, preferably free
• Prepare a one-paragraph review on each of the three tools. Indicate which one you would recommend for file recovery and why

Hide Assignment Information Turnitin™ Turnitin™ enabledThis assignment will be

Hide Assignment Information
Turnitin™
Turnitin™ enabledThis assignment will be submitted to Turnitin™.
Instructions
This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.
You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.
How Will My Work Be Evaluated?
For this assignment, you are asked to provide your supervisor, Judy, with a technical evaluation of a vulnerability scanner. By documenting your results in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.3.1: Identify potential sources of information that can be used to develop and support ideas.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
10.1.1: Identify the problem to be solved.
12.2.1: Identify systems for the risk assessment.
12.3.1: Select controls.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document.
Delete the instructional text from the template before you submit.
When you are finished, click “add a file” to upload your work, then click the Submit button.
Nessus Scan Link:
https://learn.umgc.edu/content/enforced/917000-027858-01-2238-OL3-7383/My_Basic_Network_Scan_qw3e2d%20(2).html

This is the Scenario: “Machine learning,” says Steve. “We need to leverage machi

This is the Scenario: “Machine learning,” says Steve. “We need to leverage machine learning if we want to stay ahead of advanced persistent threats. A human specialist just can’t keep track of every possible opening in a network. It’s impossible.”
“And we need to think about data analytics,” adds Bill. “We need to consider how people are using our network and track what people are trying to access. Our systems store all of that information—we just have to use it intelligently.”
This time, Steve and Bill both look to you. “We have about a week before we need to submit this white paper. Can you cover these two topics for the team?”
INSTRUCTIONS:
Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.
Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, APT32.
I have been asked to report on the following subjects:
Cybersecurity Tools, Tactics, and Procedures
– Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
– Consider the hardware and software solutions deployed today in the context of defense-in-depth.
– Elaborate on why these devices are not successful against the APTs.
Part 4: Machine Learning and Data Analytics
– Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
– Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?
Extra information:
– Use additional sources of information but also describe the concept in layman’s terms.
– Use visuals where appropriate.
About 2 pages a topic should be good here.

Read the directions of this Reflection carefully. There are two articles that yo

Read the directions of this Reflection carefully. There are two articles that you will read and reflect on within your submission this week.
1. Read “Own a Vizio Smart TV? It’s Watching You” by Julia Angwin
2. Then answer the following:
We learned in the article that the VIzio tracking which is called “Smart Interactivity is turned on by default for the more than 10 million Smart TVs that the company has sold. This practice allows Vizio to track customers’ viewing habits and share them with advertisers who can then find those customers on their phones and other devices.
From a customer’s perspective, in 100-150 words, discuss in detail at least three ethical dilemmas you see with this practice. Use examples to support your opinions.
3. Next, read the follow-up article titled, “Most smartTVs are tracking you —- Vizio just got caught” by Jacob Kastrenakes
4. Finally, answer the following:
This article states that Vizio had to pay 2.2 million in sanctions for its unethical behavior.
Discuss in approximately 100-150 words whether these sanctions are enough to prevent Vizio and other companies from utilizing similar practices in the future. Why or Why not? Use proper grammar and punctuation and explain fully.
Remember, all Unit Reflections require the following:
Write in proper MLA formatting (linked here). This includes proper fonts, spacing, and complete sentences.
Provide direct examples from the resources to prove your argument. Remember to provide quotes (where necessary) and properly cite them.
Create a list of references at the end of your paper (they do not need to be a separate page, but they should be written in the correct format).