information technology multi-part question
PLZ see the papers below its very important to read the info carefully and take a look at all the papers below thank you
Requirements: paper
Milestone 1
Virtual Private Network
VPN is a secure private network that is an encryption connection over the internet from a given device to the web. Typically, the encrypted link ensures that all sensitive data have been safely transmitted and that none lands in unauthorized hands. It also permits the user to conduct their work remotely. An insecure communication medium such as the public internet is used to create a secure network in a VPN. This is the topic I did for Milestone 1 SO TO ANSWER MILESTONE 2 AND 3 YOU NEED TO GO BESIDE MILESTONE 1 PLZ THANK YOU
Also, this is the feedback I received from the teacher when I submitted milestone 1 (Interesting topic.? You may want to narrow your research down a bit from researching anything to areas that align with your topic.)
?Milestone 2
?Milestone 2 ? References
This list of 6-10 sources will become your reference page.
You may change your references before the final paper is due, but these preliminary references page should present a complete view of your topic. Also, your textbook and Wikipedia are valid sources, but do NOT count in the total count of references.
The reference page should follow a standard APA reference page format. This milestone is worth?20 points?toward the total grade for the paper.
The reference page is a list of your sources with enough information about each source so that readers can locate them if needed. You don’t have to make your final decisions about sources yet, but it is important to locate good sources before proceeding with your paper.
When your paper is complete, you should have 6-10 resources. For right now, with this milestone, you should have 3-6 beginning resources that give you information on your approved topic.
Milestone 3
?Assignment:
The third milestone of your Research Paper is due. The Guidelines and Milestones for your paper are outlined in the?Research Paper?tab on the left.
Create a Word document with your abstract. An abstract is not a mini version of your paper. It is a paragraph or two that states what the paper is going to cover. Please check other abstracts online?if you need help.
For the abstract, keep in mind that the abstract is a written presentation of the paper. This means it should be written in 3rd person speech. Leave out I will discuss? and format it as The paper will discuss??etc.
This is a one-paragraph statement that states the contents of your paper so that potential readers can decide whether or not they want to continue reading. This milestone is worth?20 points?toward the total grade for the paper.?
THIS IS NOT A MINI VERSION OF YOUR PAPER!
An abstract is a no-nonsense, one-paragraph statement of the purpose of your paper. Abstracts are usually 100 words or less. Readers like to know the purpose of a paper before deciding whether or not to read it. So, tell the readers right upfront about your paper (an abstract appears first).
Use third person speech – “This paper will discuss….” instead of “I will show…” or “We will look at….”
PLZ MAKE SURE YOU READ THE INFORMATION CORRECTLY ALL YOU HAVE TO DO IS MILESTONE 2 AND 3 BUT IT HAS TO BESIDE MILESTONE 1 WHICH IS I ALREADY PROVIDED TO YOU ON THE TOP MILESTONE 1
THANK YOU
USE APA FORMAT
Week 4 Article Review
Assignment:
Find an article related to the topics of this week’s assigned reading and develop a minimum one-page paper about what the article is saying, how you agree or disagree with the tone and facts presented in the article (it is okay to not agree) and your personal thoughts on the subject, including some predictions, if valid, to what this means for network security in the future.
For Week 4, find articles that deal with application development or cloud benefits to systems architecture. Are there benefits that are not discussed often? Find the article that hits those minor or limited knowledge areas.
Grading and Expectations
Use apa.
This assignment should be a?minimum of one page in length.
Week 4 Presentation
?
Assignment:
Scenario:?Your company is bought out by another company and there were massive layoffs. Your manager was one of the casualties. In the reorganization, your department was moved to the new parent company which means new coworkers and more importantly, a new boss as part of a new import/export company with 300 employees over eight sites in three different states.
Your new manager visited your desk as you were unpacking your pictures of your family and pets and announced that you were the person with the most experience, so they needed you to give a presentation to the other new (and some older) department managers on the how? and why? for using cloud services. Where are the architectural advantages?
Since you don’t know their aptitude for the topic going in, it will help to explain all parts of cloud structure, what it is, and how it works.
Make sure you circle back to the topic of security and how cloud services are secured or aid in securing the system.
Grading and Expectations
This assignment is?due by the end of the academic week.
This assignment should be a?minimum of ten slides in length?and a good presentation will receive full credit.
Remember: Title, References, images only, and “any questions” slides DO NOT count for the minimum!
Use the rule of 7 when building your slides (more than 7 points on any one slide and it gets too wordy or overloaded with information).
Complete a spelling and grammar check on your work
Week 5 Discussion -?Discuss?ONE?of the Following Topics:
Discuss the use of retinal or fingerprint scanners and how they are used for authentication. How reasonable is incorporating these types of authentications in your company? What are the possibilities that there is the expertise within your company already?
Describe an access token and why are they important? How is it different from a hardware token? Explain what types of authentications are used for either type of token.
In old spy movies, there are times when they trick fingerprint scanners by using tape on someones finger. Explain how that works, and if that is actually possible.
Discuss some of the various backup tools available in the market. What are the differences among the computer forensic tools discussed within the reading?
What are air gaps in network architectures and why are they important?
Define a directory service and what it is used for. Discuss the current needs for this type of service
?Week 5 Article Review
Assignment:
Find an article related to the topics of this week’s assigned reading and develop a minimum one-page paper about what the article is saying, how you agree or disagree with the tone and facts presented in the article (it is okay to not agree) and your personal thoughts on the subject, including some predictions, if valid, to what this means for network security in the future.
For Week 5, you should try to find articles that deal with security issues related to authentication issues or specialized systems that worked or didnt work the right way causing issues.
Grading and Expectations
Use apa format.
This assignment should be a?minimum of one page in length.
Week 5 Written Assignment
?
Assignment:
Scenario: Your boss in your department at Data Resources Corporation would like some more information about running a secure baseline. She doesn’t know much about it, as she was moved from another department and does not have years of experience on the IT side of things.
You have been tasked to come up with a quick “one-pager”, a one-page document that outlines what she is requesting. Understand that she doesn’t know anything about secure baselines, so you’ll have to put it in words she’ll understand and give her enough information so she can manage the department well.
Grading and Expectations
USE APA
This assignment should be a?minimum of one page in length.
Week 6
Discussion -?Discuss?ONE?of the Following Topics:
Explain how an anomaly detection system makes use of profiles to identify normal traffic and organize users into known behavioral patterns.
Discuss the different advantages and disadvantages of an anomaly-based detection system in comparison to a signature-based detection system.
Why should we be concerned about HVAC systems when discussing security?
CCTV systems are easier to purchase and install now as you can easily purchase them online. You do so and then post a sign telling employees that a CCTV system is running. Is that all the notification you have to give? What does that sign cover you for? Do you have restrictions on what you can tape and where?
What are tailgate sensors and how do they work? Are they foolproof? What can users do to circumvent this security measure?
Provide a brief explanation of Elliptic Curve Cryptography, including advantages and disadvantages to its implementation.
Week 6 Article Review
?
Assignment:
Find an article related to the topics of this week’s assigned reading and develop a minimum one-page paper about what the article is saying, how you agree or disagree with the tone and facts presented in the article (it is okay to not agree) and your personal thoughts on the subject, including some predictions, if valid, to what this means for network security in the future.
For Week 6, you should try to find articles that deal with cryptography methods and what is on the horizon for securing systems using them. Is this technology adapting and moving with the times? Or is it an older, more and more useless technology?
Grading and Expectations
USE APA FORMAT
This assignment should be a?minimum of one page in length.
Week 6 Written Assignment
?
Assignment:
Consider one of the following scenarios:
You are at work and realize you forgot the electronic files at home for your meeting today.
You just returned from a fabulous vacation and want to share vacation pictures.
Your computers hard disk is almost full, and you cannot afford to purchase additional storage.
One solution is to use one of the cloud storage services. Ease of use, number of features, and amount of storage space varies, based on the specific service, but you can store information and access it from any Internet-enabled computer in the world.
Would you store your information in the cloud, instead of on your hard disk? If so, what types of information would you store online?
Do you trust the security of these cloud storage services?
What are the positives and negatives you might encounter with this type of service?
For this assignment, outline the use of Cloud services as a solution answering all of the questions above.
You may include a diagram, but it will not count toward the length of the content in the document.
Grading and Expectations
This assignment is?use apa format.
This assignment should be a?minimum of two pages in length.
Complete a spelling and grammar check on your work.
smartcustomessays.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we\’ll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire smartcustomessays.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more