Please read the instruction carefully and do it my last three digit of my studen

Please read the instruction carefully and do it my last three digit of my student number is 163.
Comments from Customer
Please can you see my course work if i need to pay extra or theres is a question to ask me and the second thing please the course work is programming python language

Two Part question Part 1 Residual Risk Even when extensive security measures hav

Two Part question
Part 1 Residual Risk
Even when extensive security measures have been taken, there is always going to be a certain amount of residual risk. While most security managers tend to concentrate on inherent risk, it is crucial to monitor and understand residual risk to ensure you can correctly identify likely threats. Discuss the difference between inherent and residual risk. Can risk ever be completely eliminated? Why or why not? Word count 150
Part 2 Big Data Repositories
Discuss the differences between data warehouses, data vaults, and data lakes. Identify a case study that references these architectures and discuss how the relationship works. Would count 125

PART 1: BALANCING PRIVACY VS. ACCOUNTABILITY ****PLEASE USE 137 WORDS TO COMPLET

PART 1:
BALANCING PRIVACY VS. ACCOUNTABILITY
****PLEASE USE 137 WORDS TO COMPLETE THIS PART****
What factors are important in the privacy vs. accountability debate? How should they be weighted? Is privacy an inherent right? Should government oversight be trusted? Should we have an oversight board?
**** Be sure to Lead your answer with some Expert’s Treatise or Legal Authority in the form of case law or some form of statute or law (federal or state or even a journal article) and then conclude with you opinion*****
PART 2:
ICANN: RUN BY US OR MULTINATIONAL?
****PLEASE USE 137 WORDS TO COMPLETE THIS PART****
Should the Internet Corporation for Assigned Names and Numbers (ICANN) be run by the US or a multinational organization? Why?
What type of organization should run ICANN? Where should it be located? What oversight should they have? And by whom? Why?
***Please make sure to only use website sources***
***DO NOT USE BOOKS as sources for this assignment***
ASSIGNMENT INSTRUCTIONS
————————————-
***Please make sure to only use website sources***
***DO NOT USE BOOKS as sources for this assignment***
****This assignment should be writing from Scratch****
****Please do not use examples found on different websites such as Coursehero or any other websites****

Our project is to build a smart and renewable energy caravan. In this research p

Our project is to build a smart and renewable energy caravan. In this research paper we will be talking about the smart part which we will be using the home assistant platform and the controller will be the raspberry pie (rpi4). So through the platform we can open and close the lights and take control over the curtains, doorbells and locks etc.

You have been hired as an IT expert by a small software development firm to deve

You have been hired as an IT expert by a small software development firm to develop a technology project proposal that outlines a technology plan to develop a Server infrastructure that will provide enterprise level centralized management of user identity, resources, and information that the firm relies on for its day-to-day business operations.
The firm has a single location with 20 employees and is currently running a small Windows Server 2012 network that includes a single domain controller. The firm is interested in upgrading to Windows Server 2016. The firm is also concerned about high availability. For example, there is currently only one domain controller. This means that when they perform updates or must reboot the server, Active Directory services are interrupted.
To avoid this, the firm is interested in adding a second domain controller to the current environment as soon as possible. Once the second domain controller is added, all other Servers must be upgraded to Windows Server 2016. This includes a DHCP, DNS, and file resource server. Redundancy, high availability, and disaster recovery have become a top concern for the firm.
They are looking to you to provide solutions to these concerns in your proposal. The firm is also in the process of opening a second office location. This office will include approximately 15 to 20 additional employees. This location must also be included in the plan.
Address each of the following topics in your plan:
Deployment and Server Editions:
-How many total servers are needed? Which roles will be
combined?
-What edition of Windows will be used for each server (e.g.,
Standard, Datacenter)?
-Will Server Core be used on any servers?
-Where are each of the servers located (which of the two sites)?
Active Directory:
-Number of AD domains? Include domain name design.
-Will there be any Read-Only Domain Controllers?
-How will the second office factor into domain controller
placement? How will AD sites be configured?
-How will AD organizational units be organized (considering how
group policy will be used and users will be organized)?
-Discuss requirements for deploying Active Directory.
Containers:
-Discuss the role that containers play and how they can benefit the
firm.
High Availability:
-How will clustering be utilized?
-What role with load balancing play?
Hyper-V:
-Discuss the role of Hyper-V and benefits.
-How will Hyper-V high availability be achieved?
Disaster Recovery:
-What role will Windows Backup Server play?
-Discuss backup strategies.
-Is a third-party backup and recovery solution required?
Maintenance:
-How will Windows Server Update Services be utilized?
-Discuss a plan to keep Servers updated and patched with minimal
interruption to servers and services. Keep in mind, Microsoft
issues patch and updates to its operating systems and software
the second Tuesday (Links to an external site.) of each month. The
plan should take this into account.
Monitoring:
-Discuss the purpose of system monitoring.
-Describe tools available for monitoring Windows Servers.
-Include one Windows Server 2016 tool.
Include at least one diagram illustrating your chosen Active Director design with DNS namespace hierarchy.

One page for each. Link to source(s) at bottom of pages Case Project 13-2: Diamo

One page for each. Link to source(s) at bottom of pages
Case Project 13-2: Diamond Model of Intrusion Analysis
The Diamond Model of Intrusion Analysis is a framework for examining network intrusion events. Use the Internet to research this model. Identify how it is used, its strengths and weaknesses, and how widely implemented it is. What is your conclusion about this framework? How useful does it appear to be to you? Write a one-page analysis of your research.
Case Project 13-4: Sources of Forensics Data
IP software monitors can provide insight into an incident for a forensics evaluation. Use the Internet to research NetFlow, sFlow, and IPFIX. How are they used? What are their differences? What are their similarities? Create a table that lists the strengths and weaknesses of each.

One page for each. Link to source(s) at bottom of pages Case Project 6-3: Lightw

One page for each. Link to source(s) at bottom of pages
Case Project 6-3: Lightweight Cryptography
Due to the importance of incorporating cryptography in low-power devices, a new “subfield” of cryptography called lightweight cryptography is being developed. This has the goal of providing cryptographic solutions that are uniquely tailored for low-power devices that need to manage resource vs. security constraints. Research lightweight cryptography. What are its goals? How will it work? What are its limitations? What are its advantages? Write a one-page paper on your findings.
Case Project 6-4: Twofish and Blowfish
Twofish and Blowfish are considered strong symmetric cryptographic algorithms. For example, Blowfish can accommodate key lengths of up to 448 bits (56 bytes). Use the Internet to research both Twofish and Blowfish. How secure are they? What are their features? What are their strengths and weaknesses? How are they currently being used? How would you compare them? Write a one-page paper on your findings.

One page for each. Link to source(s) at bottom of pages Case Project 7-1: Transp

One page for each. Link to source(s) at bottom of pages
Case Project 7-1: Transport Layer Security (TLS)
Use the Internet to research TLS. Who was responsible for developing it? When was the first version released? What was the relationship between TLS and SSL? What are its strengths? What are its weaknesses? When will the next version be released? What improvements are projected? Write a one-page paper on your research.
Case Project 7-3: Certificate Authorities (CAs)
OSs come packaged with many digital certificates from certificate authorities (CAs). Use the Internet to determine how to view the CAs for the type and version of OS that you are using and view the list. How many have you heard of? How many are unknown? Select three of the publishers and research their organizations on the Internet. Write a one-paragraph summary of each CA.

One page for each. Link to source(s) at bottom of pages Case Project 10-2: Secre

One page for each. Link to source(s) at bottom of pages
Case Project 10-2: Secrets Management Systems
Cloud computing providers typically offer their own proprietary secrets management systems, and there are several third-party systems available. Identify two proprietary secrets management systems from cloud providers and two third-party systems. Research each and then create a document outlining how they are used, their strengths, and their weaknesses.
Case Project 10-5: IPv6
Use the Internet to research the security enhancements of IPv6. Write a one-page paper on how IPv6 is more secure than IPv4.

One page for each. Link to source(s) at bottom of pages Case Project 11-3: EAP U

One page for each. Link to source(s) at bottom of pages
Case Project 11-3: EAP
Use the Internet to research information on the EAP protocols that are supported in WPA2 Enterprise (see Table 11-5). Write a brief description of each, and indicate the relative strength of its security. Write a one-page paper on your research.
Case Project 11-4: WPA3 Features
Use the Internet to research WPA3 features, particularly SAE and OWE. What are the primary advantages and disadvantages of each of these features? How do they enhance Wi-Fi security? Write a one-page paper on your research.