Define and describe cloud-based collaboration.
Google Docs is a cloud-based tool used for document sharing.
Discuss pros and cons of using Google Docs for business-based documents.
Compare and contrast the use of Google Docs with Microsoft 365 Word Docs for business-based documents.
Research Paper Requirements:
Paper should be approximately four to six pages in length, not including the title page and reference page. .
Use Times New Roman, size 12 font throughout the paper.
Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References. See the Paper Elements and Format section of your APA manual for details.
A minimum of two scholarly journal articles (besides your textbook) are required. See UC Library Tutorials.
Writing should demonstrate a thorough understanding of the materials and address all required elements.
Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free.
Save as a Word document.
Category: Computer Science homework help
-
“Exploring the Benefits and Limitations of Cloud-Based Collaboration: A Comparison of Google Docs and Microsoft 365 Word Docs for Business Documents”
-
“Alternate Processing Site Proposal for R&D Media, LLC” “Securing the Office: Implementing a Comprehensive Security Policy for Multimedia and Network Devices”
Instructions:
Assignment Overview – Alternate Processing Site Proposal
R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:
Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the assignment).
Determine who the company’s stakeholders are. You can adopt the role of an internal or external consultant for your perspective.
Using the results of your research, develop a technical proposal that best addresses the stakeholder’s requirements and incorporates innovative technologies in the recommendation.
Within your proposal you must also consider cost and what R&D Media, LLC can afford.
Develop and document the requirements for R&D Media, LLC’s alternate processing site building upon the concepts addressed in class materials and discussion topics.
Assignment Checklist – Be sure that you capture the following eleven sections in your report:
The needs of R&D Media, LLC’s stakeholders are considered within the plan.
List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.
New technologies for Alternate Processing Sites are utilized.
A plan for updating alternate processing site software during normal operation.
Documentation showing a simple rack diagram and a network diagram.
A network configuration overview (IP, DNS, etc.).
Information security architecture (firewalls, VPNs).
Network bandwidth estimates.
Power consumption estimates.
Plan for cutting over to the alternate plan during a recovery scenario.
Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.
Scenario:
R&D Media, LLC
R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.
Local Area Network and Workstation Description
The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work. There are also servers to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon® servers running Red Hat® Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.
The desktop systems consist of Apple® Mac® Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange®, web server, and file and print service.
Remote Devices and External Network Connectivity
Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, business partners, and clients may visit R&D Media, LLC’s office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.
R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.
The network has the following additional specifications:
The network is all TCP/IP based using Cisco routers and switches.
All desktop computers include email, web, database access, and office productivity software.
All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.
The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.
A load-balancing dual firewall connects the network to the Internet.
Security Policy Details
All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.
All network resources and equipment must be password protected.
Company equipment may not be used for personal business and only limited personal use.
All Windows-based PCs must run approved anti-malware programs.
Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.
The mail server must be configured not to forward email that originated on the Internet.
Password aging must be enforced on all servers and desktops.
All server configurations must be readily available to rebuild a failed system.
Offsite backup is required, with 24/7 access to that location.
All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.
Requirements:
Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abstract, and reference pages. Be sure to document your content with proper APA in text citations that match your reference list.
Answers contain sufficient information to adequately answer the questions
No spelling errors
No grammar errors -
Title: “The Impact of Generative Adversarial Networks on Generative Modeling and Image Generation”
Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.
Why is generative adversarial network a key turning point in the history of generative modeling?
Why is the field of image generation important? -
“Managing Loan Default Risk in the Lending Industry: A Risk Management Plan Using Logistic Regression in R” “Reflecting on the Journey: A Personal Growth and Development Analysis”
Perhaps one of the business areas that faces the greatest risk each day is the lending industry. Banks, mortgage companies, and other types of lenders face one specific risk many times every day: Are they going to be paid back when they make a loan? Organizations that make their money by lending money must be able to anticipate risk and predict the likelihood that they will be paid back, with interest, or else their business model will fail and they will have to close their doors. In this Assignment, you will use R with two data sets to predict the risk of loan default for a lender, and then report and explain your results.
Assignment Instructions
Complete the following steps:
Using the university’s online Library and Internet resources, research the lending industry. In a Word document, prepare a risk management plan outline for loan default risk faced by lenders. Include all five parts of risk management planning: Identification, Understanding, Data Preparation, Modeling and Application. Cite all sources used to prepare your risk management plan.
Download the Loans.csv and Applicants.csv files. Import both of these as data frames into RStudio. Give each a descriptive name. Show this in your Word document.
Using the Loans.csv file, build a logistic regression model to predict the “Good Risk” dependent variable (use family=binomial() in the glm function in R). In this column, ‘1’ indicates that making the loan is a good risk for the lender; ‘0’ indicates that making the loan is a bad risk. Make sure that you do not use the Applicant ID as an independent variable! You will need to load the MASS package in R by issuing library(MASS), before using the glm function to build your model. Show the creation of the model in your Word document.
In your Word document, document your logistic model’s output, and specifically explain which independent variables have the most predictive power and which have the least. Make sure you identify how you know, and explain why it matters.
Apply your logistic regression model to the data in Applicants.csv to generate predictions of “Good Risk” for each loan applicant. If your glm model is stored in an R object called ‘LoanModel’, for example, and your Applicants.csv data is in a frame called ‘Appl’, then you would issue a command that looks like this: LoanPredictions <- predict(LoanModel, Appl, type=“response”). Document the application of your model to the Applications data in your Word document. In your Word document, interpret your predictions for the Applicants.csv data. Specifically address the following: How many loans do you predict to be a good risk for the lender? How many are predicted to be a bad risk? What are your highest and lowest post-probability percentages for predictions? How many loans have at least a 75% post-probability percentage and what does that mean for the lender? How many loans have less than a 25% post-probability percentage and what does that mean for the lender? Suppose that the lender is willing to accept a little higher risk and has decided they will make loans to applicants who have post-probability percentages between 40% and 65%. List two things the lender could do to mitigate risk when lending to this group, and explain how these will help. Make sure that you cite at least five supporting sources beyond the textbook in support of your writing and explanations. Cite correctly in APA format. Assignment Requirements Prepare your Assignment submission in Microsoft Word following standard APA formatting guidelines: Double spaced, Times New Roman 12-point font, one inch margins on all sides. Include a title page, table of contents and references page. You do not need to write an abstract. Label all tables and figures. Cite sources appropriately both in the text of your writing (parenthetical citations) and on your references page (full APA citation format). For more information on APA style formatting, refer to the resources in the Academic Tools section of this course. -
Title: Understanding and Evaluating the Zero Trust Model: A Deep Dive into Regulations, Standards, and Frameworks for Cybersecurity
Purpose
Regulations, standards, and frameworks are complex. Doing a deep dive into one of those standards, Zero Trust will allow you to learn how to read a standard thoroughly and what elements of the standard are essential, as well as how to locate those elements within the written standard. You will also evaluate the effectiveness of a standard, providing supporting examples.
Assignment Instructions
Use the materials from your reading, particularly the material specific to CISA’s Zero Trust Model and NIST 80-207 Zero Trust Architecture. In addition, research the Internet to provide the required responses.
Provide an in-depth explanation of the following about the Zero Trust model and framework:
Explain the events that led to the development of the Zero Trust Model.
Explain the goals that the model seeks to achieve.
Provide an overview of the IT and Cybersecurity departments’ role in achieving Zero Trust.
Explain how audits and assessments help achieve or measure compliance.
What is required to comply with NIST 800-207?
What challenges exist when moving to the Zero Trust Model?
Assess the value of the Zero Trust Model as organizations move to cloud-based assets, remote workers, and Bring Your Own Device (BYOD) environments.
Conclusion
Assignment Requirements
4–5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
At least 1 credible source cited and referenced
No more than 1 table or figure
No spelling errors
No grammar errors
No APA errors -
“Analyzing the Impact of GDPR on an Organization: A Guide for Compliance and Policy Changes”
Purpose
In this assignment, you will analyze recent legislation related to privacy and evaluate the impact of that legislation on an organization.
Assignment Instructions
Assume you are an IT security specialist for a large U.S. online retail organization that does business internationally. Your CIO has asked you to thoroughly review the General Data Protection Regulation (GDPR) in the European Union. He wants to understand exactly what the organization must do to comply with this regulation when doing business with EU customers.
Provide a detailed discussion about the rules for businesses and the rights of EU citizens.
Include a discussion of the following:
What does the GDPR govern?
What rights do EU citizens have with regard to their data?
What is considered personal data under this regulation?
What is considered data processing under this regulation?
Describe the role of the data protection authorities (DPAs).
Discuss, in detail, how the GDPR will change business and security operations for your organization. Provide the CIO with a recommended checklist for GDPR compliance, and discuss processes and policies that may need to be changed in order to comply with GDPR.
In your conclusion, address what you think will be the financial impact to the organization, both in terms of compliance and any lack of compliance.
Assignment Requirements
The paper should be 3–4 pages.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references. -
Access Controls and Security Mechanisms for XYZ Consulting Firm
Length 3-4 pgs – Use APA 7 style, and cite references published within the last 5 years.
Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed).
Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Description
Create the following section for Week 3:
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.
Complete the following section for Week 3:
Week 3: Access Controls and Security Mechanisms
For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control.
Describe SSO and VPN technology, and discuss whether they can be used in the company.
Name the document “CS651_FirstnameLastname_IP3.doc.”
The template document should follow this format:
Security Management Document shell
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
Section headings (create each heading on a new page with “TBD” as content, except for Week 1)
Week 1: Introduction to Information Security
This section will describe the organization and establish the security model that it will use.
Week 2: Security Assessment
This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
Week 3: Access Controls and Security Mechanisms
This section examines how to control access and implement sound security controls to ensure restricted access to data.
Week 4: Security Policies, Procedures, and Regulatory Compliance
This section will focus on the protection of data and regulatory requirements that the company needs to implement.
Week 5: Network Security
This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level. -
Forecasting Demand for Super Sonic II Wheelchairs and Occupancy Rates at Big City Hospital
1. A medical device dealer in the local area wants to make an accurate forecast of demand for Super Sonic II Wheelchairs during the next month. Because the manufacturer is in Japan, it is difficult to send wheelchairs back or reorder if the proper number is not ordered a month in advance. From past sales records, the dealer has accumulated the following data on the Super Sonic II Wheelchairs over the past year:
MonthWheelchair SalesJanuary9February7March10April8May7June12July10August11September12October10November14December16
Compute a 3-month moving average forecast of demand for April through January (of the next year).
Compute a 5-month moving average forecast of demand for June through January.
Compare the two forecasts of the 3-month and 5-month using MAD. Which forecast method should the dealer use?
2. The Big City Hospital has experienced the following occupancy rates during the past 9 months:
MonthOccupancy Rate (%)183278375481586685789890986
Compute the exponential smoothing forecast with alpha=.2
Compute the exponential smoothing forecast with alpha=.2 and beta=.3 (you can use the results of first part and just add beta calculation)
Computer linear trend line forecast
Compare three forecasts using MAD and indicate which appears more accurate -
Title: “Enhancing Perimeter Defense: Evaluating and Implementing Effective Assessment Techniques”
Perimeter defense techniques
Evaluate the types of assessments, select one that you might use, and explain why it is important.
Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.
Active Assessment
Passive Assessment
External Assessment
Internal Assessment
Host-based assessment
Application
Wireless network assessment
Vulnerability Assessment -
Maximizing Resources and Flexibility: The Value of Virtualization in Operating Systems
In this module, you learned about how an OS can exist on a virtual machine. For example, you might use a MacBook and have macOS Catalina as the operating system installed on it. Then you might use Windows 10 as a virtual desktop on a virtual machine. This capability allows you to utilize both OSes on one computer. As you complete this module’s discussion, you and your peers will reflect on the value of virtualization, specifically in relation to operating systems.
In your initial post, address the following:
Provide an example of when an organization or an IT professional might choose to implement an operating system via virtualization, and explain how that example meets organizational needs.
In response to two of your peers, address the following:
If you agree, build upon the original poster’s claims and further the discussion. If you disagree, state your own argument in a constructive way.
Then answer the following questions:
Why is virtualization important, especially in relation to OSes? What makes virtualization important?
How is virtualization being used in the workplace today?
FOR OTHER FRIENDS REPLIES
1. There are many instances, within organizations, that call for using virtualization. One example would be two organizations collaborating, however, one organization (we’ll call them organization B) still uses legacy software that is specific to their older OS. Organization A could revert all their systems back to that version but the expense and practicality of it would be a nightmare to execute. Instead, organization A can simply use a virtualization machine that is based in a main computer or server and has instances set up across the organization where it is needed. The reason for having a VM set up on main server or computer is so that you only need one firewall to regulate all the packets to and from the VM. Then you set up a internal VM network on all company computers and run those instances through the firewall VM which is external (allows for internet connection).
This solution will allow organization A to use organization B’s legacy software without great expense or technical headaches. Ultimately leading to a successful, and ideally profitable, collaboration.
2. Imagine a situation where a company needs to run multiple operating systems on the same physical server for different purposes. By using virtualization, they can create multiple virtual machines (VMs) on a single physical server, each running its operating system.
This fulfills organizational needs in several ways:
1. **Resource Efficiency**: Virtualization allows better use of hardware resources by consolidating resources and reducing hardware costs and energy consumption.
2. **Isolation**: Each VM operates independently, enhancing system reliability and stability.
3. **Flexibility**: Virtualization offers the flexibility to quickly deploy and scale environments as needed.
4. **Security**: Virtualization can enhance security by isolating sensitive applications or environments.
Overall, implementing operating systems via virtualization allows organizations to optimize resource usage, increase flexibility, improve security, and streamline IT management processes, effectively meeting various organizational needs.