Author: admin

  • “Secure Network Design and Implementation Plan for the Merger of Company A and Company B” Title: “Securing and Optimizing a Merged Network: Recommendations for Implementation and Risk Management”

    INTRODUCTION
    You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
    Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
    For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
    •  “Company A Network Diagram”
    •  “Company A Risk Analysis”
    •  “Company B Network Diagram”
    •  “Company B Vulnerability Report and Cybersecurity Tools”
    SCENARIO
    Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.
    The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services.
    REQUIREMENTS
    A.  Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
    B.  Analyze the given network diagram and vulnerability scan for both companies by doing the following:
    1.  Describe two existing vulnerabilities for each company.
    2.  Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.
    C.  Create a network topology diagram with details of the proposed merged network requirements.
    D.  Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
    E.  Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
    F.  Explain two secure network design principles that are used in the proposed network topology diagram.
    G.  Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
    •   the name of the regulatory compliance requirement
    •   why the regulatory requirement is relevant to the newly merged company
    •   how the proposed merged network topology diagram meets the regulatory requirement
    H.  Describe two emerging threats that are applicable to the merged organization, including the following in the description:
    •   potential network security risks of implementing the topology
    •   potential performance impacts on the merged network after implementation of the proposed design
    •   how to manage the identified potential security risks
    I.  Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
    •   a cost-benefit analysis for on-premises and cloud infrastructure solutions
    •   a justification for your recommendations to implement the proposed secure merged network design
    J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
    K.  Demonstrate professional communication in the content and presentation of your submission.

  • “The Impact and Regulation of Online Reviews” The Impact and Regulation of Online Reviews Online reviews have become an integral part of our decision-making process when it comes to purchasing products or services. They provide us with valuable insights from other consumers who have already

    Discussion (Online Review)
    Due June 15, 2024, 11:59 pm
    You will research the topic presented in this forum, and post
    your answer with proper citations (credit will be zero if not properly cited in
    MLA format)
    Instruction:
    What are your opinions regarding online reviews?  Who regulates online reviews (if anyone)?
    What could be done to make them more valuable?
    (Remember
    to cite your resources)

  • Title: “Navigating Personal, Legal, and Ethical Considerations in the Surgical Experience of a Breast Cancer Patient”

     
    Mrs. Rebecca Anderson, a 48-year-old female, recently discovered she has invasive ductal carcinoma of the left breast during a routine mammogram. The mass is at stage 3 but genetic testing has revealed she carries the BRCA1 mutation, further increasing her risk of breast cancer. As a proactive measure, Mrs. Anderson has been recommended to undergo a double mastectomy. She has filled in a consent form for this procedure but when you admit her, she expresses to you that she is unsure if she really wants to “lose both breasts” during the surgery. Mrs. Anderson has a history of hypertension and mild anxiety. She is adopted, so lacks knowledge of any family medical history. She currently works as a teacher and resides with her husband and two teenage children. Mrs. Anderson identifies as Christian, and her spiritual beliefs are integral to her well-being.
    Please answer the following:
    How may Mrs. Anderson’s age, occupation, family situation, and Christian beliefs contribute to her surgical experience and influence her decision regarding the double mastectomy? 
    Mrs. Anderson has expressed that she is unsure about her upcoming operation. Provide a description of the legal and ethical considerations involved, emphasising principles such as informed consent, confidentiality, and privacy. How would this affect your care? 
    Describe the pathophysiology of common surgical complications following a double mastectomy. How do these complications influence Mrs. Anderson’s postoperative care? 
    Mrs. Anderson expresses concerns about pain management during and after the surgery. How would you educate her on both pharmacological and non-pharmacological options for pain relief? 

  • Preparing a Spreadsheet Title: “Data Analysis and Visualization: Creating a Spreadsheet with Two Unique Data Sets”

    Preparing a Spreadsheet
    Begin the planning of a new spreadsheet that contains two unique data sets that can be found online and are recent (i.e., the past six months). These two data sets should be on different topics. For example, sports scores and then the cost of fuel. Place each dataset onto its own worksheet and rename the sheets to represent the content of each sheet. Example datasets are:
    The temperature of your city for the past 5-10 days
    Scored points per game of your favorite sports team for their past 5-10 games
    The amount you paid for gas for the past few months
    Dow Jones or similar financial market
    Most anything else you can tabulate or can track. Be creative, but be sure to provide the link.
    Before starting, plan how the data is to be structured. Ask yourself these questions:
    What is the purpose of the spreadsheet? e.g., a budget, tracking sales, analyzing numbers, creating charts for presentations, etc.
    Determine the type of data you are working with. Is it currency, percentage, or larger number needing a comma or decimals?
    How many decimal places are needed? Be consistent.
    How is the information to be organized? By time? (day, month, or quarter?) By category? (income, expenses, etc.)
    What text labels are needed?
    What text and cell formatting should be used? (bold, indents, underline, font color, cell COLOR shading (a little is good, but not too much), etc.) 
    What data needs to be summarized?
    Will formulas or functions be used to derive this information? e.g., total (sum), average, maximum/minimum value, payment, etc.
    Is a chart needed to enable the visualization of trends?
    Requirements
    Create a workbook with two worksheets, each containing a recent data set.
    Name the two sheets.
    Label all values. Tip: the text labels cannot be entered into the same cell as the numbers.
    Apply formatting such as bold text, colors, etc., as appropriate. Avoid colors that make the text hard to read.
    Include the hyperlinks to the data set on the sheets.
    Save your workbook in .xlsx format.
    Upload your file here. While this is ungraded, it is a required activity that must be completed ahead of progressing to the next module.

  • “Colonisation and Its Impact on Indigenous Populations in [Your Local Area]: A Graphic Representation”

    2 different documents needed 
    1. Poster
    2. 1500+- 10%
    Based on your local area, examine the impact of colonisation on Indigenous populations by showing the information below (1. and 2.), using graphic representations (graphs, flow charts, pictographs).  
    RESEARCH
    Name the First Nations groups in your area before colonisation, and
    Using the Newcastle University Massacre Map note facts about the frontier killings nearest your town.   
    Compare the current status of Indigenous groups in your state to the non-Indigenous population using all four indicators below. 
    Health or mortality (eg. heart disease, mental health, AoD abuse)
    Education or Employment (eg. educational attainment, employment status)
    Victimisation (eg. family violence, homicide) 
    Incarceration rates (eg. children in detention, men, women)
    REPRESENTATION
    Choose key data from each research area above to represent on your poster.
    Create a 1500-word document to hold your detailed research notes needed to support your graphics including your reference list. 
    This report requires a minimum of 8 credible sources. Sources and their links must be compiled and provided in your research notes. References must be correctly formatted using APA 7 style. 
    Use this link to visit the Australian Institute of Aboriginal and Torres Strait Islander Studies (AIATSIS) Map of Indigenous Australia. Scroll over it to discover whose land you are living on. Use this information on your poster. https://aiatsis.gov.au/explore/map-indigenous-australia
    Now use this link to visit the Newcastle University Colonial Frontier Massacres Map. The map is interactive so you can move the time slider to watch the frontier battles move across the continent. You can also click on the coloured dots to learn more about what occurred in each situation. Add this information to your poster. https://c21ch.newcastle.edu.au/colonialmassacres/map.php
    Use any of the sites below that are relevant to your research. Make notes and add them to your research notes for submission. Remember to reference websites or reports you use.
    https://www.abs.gov.au
    https://www.aihw.gov.au
    https://www.aic.gov.au/
    https://www.sentencingcouncil.vic.gov.au/sentencing-statistics/victorias-indigenous-imprisonment-rates#:~:text=The%20imprisonment%20rate%20is%20significantly,2023%2C%20from%20965.2%20to%201%2C898.2.
    https://www.bocsar.nsw.gov.au/Pages/bocsar_pages/Aboriginal-over-representation.aspx
    https://www.sentencingcouncil.qld.gov.au/__data/assets/pdf_file/0009/675783/sentencing-profile-series-connecting-the-dots.pdf

  • Title: Understanding the Difference between Blockchain and Cryptocurrencies: A Glossary of Key Terms Blockchain and cryptocurrencies have become buzzwords in the world of finance and technology. While these terms are often used interchangeably, they are not the same.

    Develop an essay in an APA formatted Word document and address the following:
    Are blockchain and cryptocurrencies the same?
    Create a glossary of at least 10 cryptocurrency terms. The definitions must be paraphrased and not quoted.
    Submit your assignment in an APA formatted Word document.

  • Title: “The Changing Definitions of Nationhood: Impact on Historical Interpretations”

    When and why have these definitions changed and varied?  What impact do these definitions have on how historians have approached and written about the nation’s past?  

  • “Optimizing Resource Utilization and Availability in Production Planning: Strategies for Managers”

    The purpose of this assignment is to learn how managers
    can plan and forecast the utilization and availability of resources for the
    production process.

  • Title: “Water Provision Challenges in Hammanskraal Township: Causes, Impacts, and Remediation Measures”

    Examing the water provision challenges in Hammanskraal township: Causes, impacts and remediation measures. 
    provide background information on water challenges, problem statement, aims , objectives and research questions. literature riiew. Methodology

  • “Building a Strong Business Proposal: Understanding the Purpose and Components”

    Purpose
    The purpose of this module is to equip students with the knowledge to use the ACE Model (Analyzing, Composing, and Evaluating) to prepare a persuasive business proposal
    At the end of this module, students should be able to:
    Use the ACE module to develop persuasive content
    Discuss steps involved in writing a grant ( and other funding) proposal
    Explain the difference between formal and informal proposal
    List the components or the structure of a formal proposal document
    Assignment 9
    Discuss the various components of a business proposal following the logical sequence of the components and the purpose of each component of the proposal.
    Content
    Assignment 9
    Discuss the various components of a business proposal following the logical sequence of the components and the purpose of each component of the proposal.