There are THREE TASK – EACH TASK IS A DIFFERENT SEPERATE ASSIGNMENT FROM THE OTH

There are THREE TASK – EACH TASK IS A DIFFERENT SEPERATE ASSIGNMENT FROM THE OTHER – USE ATTACHED DOCUMENTS FOR GUIDANCE WITH THE TASK.
TASK 1 – In this task, you will choose one case study from the attached “Case Studies” document. You will analyze the case study using the concepts covered in Section 1 of the course (the Iceberg Tool and the Behavior Over Time graph). You will apply the principles and foundational theory of systems thinking to the chosen case study by using the Iceberg Tool to identify the case’s key events, patterns, and underlying structure. Next, you will use the attached “Case Study 1 Graphs” or “Case Study 2 Graphs” for the case study you chose, and you will select the Behavior Over Time graph that best represents the patterns you identified. Finally, you will write an analysis that discusses what the Iceberg Tool and Behavior Over Time graph reveal about the problem in the case study as well as the interconnections among the key events, patterns, and underlying structure of the system.
Note: You must use one of the given case studies and both the Iceberg Tool and the Behavior Over Time graph.
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A.  Analyze one of the given case studies from the attached “Case Studies” document by doing the following:
1. Using the Iceberg Tool, write a summary of the analysis identifying key events, patterns, and the underlying structure that causes the identified events and patterns to occur.
2. Choose the Behavior Over Time graph that best represents the patterns you identified using the attached “Case Study 1 Graphs” or “Case Study 2 Graphs” for the case study you chose.
a. Discuss why the chosen Behavior Over Time graph best represents the patterns present in the chosen case study.
3. Write an analysis that discusses what the Iceberg Tool and Behavior Over Time graph reveal about the problem in the case study as well as the interconnections between the key events, patterns, and underlying structure of the system.

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission.
TASK 2- In this task, you will choose one case study from the attached “Case Studies” document. You will analyze the case study using the tool from Section 2 (systems archetypes tool) to draw conclusions about a system’s relationships, connections, properties, and subsystems. Choose one of the systems archetypes to help you understand the problems in the case study. You will submit a completed systems archetypes tool and a completed analysis that includes the problems in the case as understood through relationships, connections, properties, and subsystems. It will be important to address any changes that occur throughout the case, as shown by the selection of a particular systems archetype.
Note: You must use a systems archetypes tool.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Analyze one of the case studies from the attached “Case Studies” document by doing the following:
1. Analyze one of the given case studies using one of the systems archetypes tools.
2. Submit a completed systems archetype tool.
3. Summarize the problems in the case study as understood through its relationships, properties, and subsystems as a result of the changes that occur.

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission.
TASK 3 – Introduction
In this task, you will choose one of the given complex case studies from the attached “Case Studies” document. You will analyze the case study using the attached “Four Steps Tool.” You will submit the completed “Four Steps Tool,” which includes an analysis of the problems in the case study and your proposed best solution. Your analysis will include the solution’s strengths and challenges; its superiority over other rejected alternatives; and its anticipated impact on the overall system.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Analyze one of the given case studies from the attached “Case Studies” document  by doing the following: 
1. Evaluate the case study using the attached “Four Steps Tool.” 
2. Submit the completed “Four Steps Tool,” which includes the following:
a. your proposed best solution and the solution’s strengths and challenges
b. the solution’s superiority over other, rejected alternatives
c. the solution’s anticipated impact on the overall system

B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

C. Demonstrate professional communication in the content and presentation of your submission. 

I have to write a research paper with a statistical analysis of the data include

I have to write a research paper with a statistical analysis of the data included in the paper about Energy Optimization and Autonomy in IoT-Based Smart Parking Sensors. I already found 2 sources that you may use for the paper. I also uploaded the notes of my professor about the statistical analysis.

Create a visual analysis using draw.io or your choice of visual analysis to disp

Create a visual analysis using draw.io or your choice of visual analysis to display relationships in a visual (Microsoft Excel, whatever). JPG is attached of visual analysis example. Ensure the analysis has a legend and make it similar to the attached example. Utilize information from the below AND excel data sheet to make the Visual analysis chart.
Relatives
Vivian Jenna Wilson – Daughter
Justine Musk – Ex Wife
Tau Techno Mechanicus Musk – Son
Business Associates 
Larry Ellison – Cofounder and CTO of Oracle
Kimbal Musk – Elon Musk’s brother, a board member of Tesla
James Murdoch – Media executive and former Tesla boardmember.
Max Hodak – Cofounder and former President of Neuralink.
Larry Page and Sergey Brin – Cofounders of Google.
Companies
Tesla Inc. – Automotive and Energy
Space X – Aerospace and Defense
Neuralink – Neurotechnology
The Boring Company

1. Use NORD VPN or other IP obfuscation. 2. Using the following government publi

1. Use NORD VPN or other IP obfuscation.
2. Using the following government public records search sites, search for:
•Elon Reeves Musk or any of the following:
companies:
•Tesla.com
•boringcompany.com
•spacex.com
•muskfoundation.org
people:
•Elon Musk
•relatives (think ex-wives, friends, etc.)
•officers in his companies
•investors
•business associates
3.Tools:
•www.blackbookonline.info
motor vehicles
business filings
court cases
property filings
assets
publicly traded disclosures
motor vehicle carriers
open corporates
companies
officers
•aviation registration
•voter records
•campaign finance
open secrets
4. Roll up EVERYTHING you find, add it to your spreadsheet to keep track of info on Elon, and submit it as a PDF AND updated attached excel.
5. Create a visual analysis using draw.io or your choice of visual analysis to display relationships in a visual (Microsoft Excel, whatever). JPG is attached of visual analysis example.
6. When submitting your visual analysis, provide a three paragraph summary of what you believe is the most impactful piece of new information from the searches and WHY. Avoid making it about anything political.
The attached excel is actually a little sparse. Be careful with new articles, they aren’t at all reliable. there’s no standard for fact checking anymore.
They’re great for leads, but we want to find info ourselves that confirms or denies what’s in people magazine or whatever.
Try focusing on his businesses…lots of bulk data to be had there. Bulk up the attached excel with the above information and organize it.

Current Role Senior Technician Technical Support @ Dell Technologies Looking fo

Current Role Senior Technician Technical Support @ Dell Technologies
Looking for a entry level job in Cybersecurity – Please try and tailor it to this role
If you need any information, please let me know
I have included my current resume + My degree and my Security+ certification
Please let me know if you will be using a diffrent resume format and show me the structure prior

Overview Security analysts play an important role working alongside the computer

Overview
Security analysts play an important role working alongside the computer incident response team (CIRT). The analyst will be the individual who either fixes the issues or allocates resources to fix the issues identified by the CIRT. Using resources to facilitate the work becomes essential to sustain the health of an organization. Applying the Center for Internet Security (CIS) critical controls to company infrastructure is normal practice for an analyst. The controls are meant to guide the organization toward compliance. They are not meant to be used in isolation. Comparing an organization’s technical concerns to the CIS critical controls provides a means of developing solutions to remediate issues. Once the issues are identified and remediated, the next step is to determine how to properly report those issues to different stakeholders.
Prompt
After reviewing Breach Analysis Simulation Scenario Two, address the critical elements below:
Reporting: Select an audience for reporting (sales team, senior management, or other stakeholders).
Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature; managers need information presented to them in a format they can easily understand and use.
Subcontrols: Refer to the CIS Controls worksheet used in Breach Analysis Simulation Scenario Two and recommend two additional subcontrols that could be modified by policy, implementation, automation, or reporting to enhance security for the organization.
Subcontrol One: Describe the modification of the subcontrol and justify your recommendation.
Subcontrol Two: Describe the modification of the subcontrol and justify your recommendation.
Two-Factor Authentication: A proposed solution for the breach issue is to use RSA key fobs as a means of two-factor authentication.
Discuss the merits of using RSA encryption and the implementation of two-factor authentication.
Discuss how different forms of encryption may be used in VPN software.
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example,

I have to write a research paper with a statistical analysis of the data include

I have to write a research paper with a statistical analysis of the data included in the paper about Energy Optimization and Autonomy in IoT-Based Smart Parking Sensors. I already found 2 sources that you may use for the paper. I also uploaded the notes of my professor about the statistical analysis.