Network Security Proposal (Parts 1-3)

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

I need support with this Computer Science question so I can learn better.

Overview

Your proposal will be submitted in three major parts:
Analysis and Planning (i.e., Part 1)
Securing Boundary Devices, Hosts, and Software (i.e., Part 2)
Use this template as a guide while creating your Network Security Proposal (Parts 1-3).
Include at least two scholarly references in each of the three submissions. Thus, a total of six scholarly references will be included in total. Students may find scholarly sources by visiting UMUC’s library and online sources. Students will also include other credible sources as appropriate.
Use IEEE-style citations. We do not use APA or MLA-style citations. Students should contact UMUC’s Effective Writing Center for assistance.
Use proper terminology and expand acronyms in each paragraph they are used. For example, the first time in a paragraph an acronym is used it should be expanded (e.g., University of Maryland Global Campus (UMGC). Thereafter, and as long as you are in the same paragraph, the acronym (e.g., UMGC) can be used. When starting a new paragraph, the rule begins anew.
The use of figures and diagrams is encouraged. Students will properly cite the figures and diagrams according to the IEEE-style citation.

Analysis and Planning

In this section, students will address each of the following:
Define the vulnerability assessment requirement, propose a solution, and justify the solution.
Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
Define the security policy requirement, propose a solution, and justify the solution.
Students should be specific when defining the overall security outlook for the organization.
Define the risk management requirement, propose a solution, and justify the solution.
Students should describe the process, its value to the organization, and use proper terminology.
Define the business continuity plan requirements, propose a solution, and justify the solution.
Student should describe the activity in detail, and include each of the plan types.
Define the access controls requirement, propose a solution, and justify the solution.
Students should be specific with the type of access control model they select.
Students will find the majority of information working through the TestOut LabSim labs. Students should seek additional information to include in each submission as described in the overview by searching scholarly journals and other credible sources as appropriate. Reputable technical websites can be considered a credible source, but make sure to include at least two scholarly sources for each part of the Network Security Proposal.

Securing Boundary Devices, Hosts, and Software

In this section, students will address each of the following.
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
Define the physical security requirements, propose a solution, and justify the solution.
At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
Define the mobile device security requirements, propose a solution, and justify the solution.
Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
Define the perimeter defense requirements, propose a solution, and justify the solution.
Students should consider the different types of attacks, security appliances, and the network configuration to implement.
Define the network defense requirements, propose a solution, and justify the solution.
Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
Define the host defense requirements, propose a solution, and justify the solution.
Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Securing Data at Rest and in Transit

In this section, students will address each of the following.
Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.
Students should be specific when discussing the implementation and configuration required for the PKI solution.
Define the secure protocol implementation requirements, propose a solution, and justify the solution.
Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.
Define the file encryption requirements, propose a solution, and justify the solution.
Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.
Define the file hashing implementation, propose a solution, and justify the solution.
Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.
Define the backup and restoration implementation, propose a solution, and justify the solution.
Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).Strategic Management analysis of Vipshop Holdings Limited: nursing assignment help services
I don’t know how to handle this Business question and need guidance.

Please analyze the Opportunities and Threats faced by Vipshop Holdings Limited in detail. And analyze the Corporate Governance of Vipshop Holdings Limited.

Notes:

1. My instructor asked us not to add any definitions related to the content of the analysis. In addition, we are asked to provide a lot of references to support the facts or opinions. With regard to references, the instructor emphasized that if using an internet source, we have to include paragraph number. Hopefully you can use references in multiple places.

2. Do not refer to Vipshop Holdings Limited‘s Mission, Vision and Corporate Culture.

3. Each section need at least 500 words and they should be presented in APA format.Nagar-operational excellence-Discussion2 replies
I’m trying to study for my Computer Science course and I need some help to understand this question.

Task 1: main question :Carefully review and research all components of an information system. Based on findings, apply this knowledge and discuss with your peers how each of these components are associated with you and your given work environment or a future work environment if not currently employed.

Note : No need to give replies to main post ,read below student posts and reply each of them in 150 words.

saikumar –The Components of Information Systems

Based on the procedures guide people on how to mitigate any potential risks that may occur during the use and management. On that are sent, retrieved, stored, posted, are processed through operating software and programs on sensitive equipment such as a computer or maybe even your phone. The different types of information technology revolve around the development and repair of both inside and outside of the computer. By including the behaviors and interference with analytical or quantitative numeric and qualitative nominal data sets (Gonzales, 2019).

1. Identification Chaining: With the Biometric Authentication on Smartphone’s is quite reliable now. So the next step is chaining the authentication or identification to the applications running on other devices. So in 2019, people should carry out their biometric-enabled Identity Cards, which are Smartphone’s, and use them to identify them for using applications and other facilities. Global Input App already provides this mechanism, so the next step is to apply to the applications and facilities (Han, 2018).

2. Data Protection: Data will be encrypted by default and the encryption keys will be protected by the key coming from smart phones in which is again the personal identity card. Global Input application provides this mechanism to allow users to identify themselves and provides keys to encrypt or decrypt data to assign personal responsibility for processing data.

3. Augmented Reality: In 2019 we should see more applications on augmented reality. In the argument, reality applications should help us to make decisions by analyzing the reality we are looking at. Even in the workplace, an employee should be able to navigate to accomplish a task. The tutorial about using an application can be done with augmented reality as DOI is the same in learning to assemble instruments should be much easier (Raschke, 2014).

saimani-

An information system is a combination of hardware, software and also telecommunication networks that are used to convert data into information to be used in various fields to produce a certain desired result. This system is very useful and very complex to use but with certain management and use can lead to better ways (Avison & Fitzgerald, 2003). The information system has five main components that make it a set and ach component depends on one another to make it work for better result.

The first component is the computer hardware. This includes input, output and processing of the data. What hardware is used depends on the organization and its demands. They include of input, an output device, an operating system processor and media devices. The second component is computer software. The programs or applications used to make use of the hardware to run them into better ends. They are used for analyzing and processing data with a set of instructions.

The third component is the databases. These are the raw data to be worked on to produce information. All other components must be directly equipped with this to make them efficient. The fourth component is network. This enables direct uninterrupted flow of data and information in the whole system to certain phases to make it be used. The fifth one is the human resources. This includes the manpower to be used to run the system. The end result of the system is to benefit the end user and it depends on the information output for the end user.

This at last gives us the rundown of the system and it helps us understand the system and every effort in order to give focus in this system to impact many information system and make use of the almost wasted raw data flowing aimlessly everywhere(Wiederhold,1992).

Task 2: provide reply to below student post each in 150 words

shasank -Deception means deliberately misleading someone by creating certain system components that look like authentic elements (Rouse, 2016). Deception is performed to trap individuals and steal their confidential data. However, deception can also be used to protect IT assets from adversaries (malicious users) in terms of cybersecurity. Adversaries use four stages of attack namely scanning, discovery, exploitation and exposing. Both offline and online scanning can be performed to recognize exploitation points. Therefore, database and network designers use strong design interfaces which include authorized services, bogus vulnerabilities and real vulnerabilities to misdirect attackers. Some deliberate and inadvertent open ports are designed to lead the adversaries to a honey pot. However, the honey pot contains fake assets. Besides, valid ports included in deception technology are closely monitored and embedded with high security measures. Further, authentic frontend interface is designed so that adversaries believe the bogus assets are authentic. Thus, hackers accept various security baits during the discovery stage and could not exploit confidential data (Almeshekah & Spafford, 2016). Moreover, few deceptive documents stating security protocols and vulnerabilities are also placed in the system so that adversaries can become convinced about the security design.

Besides, deception technology is also used to prevent disclosure of authentic information in the exploitation stage. If bogus assets are breached, incident response team and intrusion detection system can be fooled by believing false alarms generated after the attack. Such issues can be avoided by isolating traps, process coordination, and backend monitoring. Besides, certain procurement tricks are also developed by realizing adversary behaviour in diverse scenarios (Aggarwal, Gonzalez & Dutt, 2016). Forensic analysis is performed to comprehend adversary behaviour in exposing stage, which helps to detect various security challenges in interface design. Thus, a better depiction infrastructure can be designed. National deception method focuses on using selective technologies, tools and methods to prevent an attack. However, deception is not efficient to deal with botnet attacks.

nagi -Denial of Service by Nagi

Cyber-attacks are now becoming a global concern that appears inevitable. The recent cyber-attack in Travelex company showcases a vivid demonstration that cyber-attack is everywhere. The attack has halted all Travelex operations. Many businesses, such as Travelex have experienced similar attacks. Some have lost billions of dollars while others have close down due to cybercrimes. Sadly, the attacks seem not ending. Today, hackers have introduced deceptions strategies that make individuals and organizations’ data vulnerable to numerous attacks. Although there are several deceptions techniques, hackers use denial of service attack frequently.

Denial of Service is a type of attack that focuses on networks and machine. The attack generally shut down a particular network connection or stop the functionality of organization machine preventing users from getting regular services. Hackers through denial of service targets servers in high profile industries such as media, banking and commerce companies (Dolk, Tesi, De Persis & Heemels, 2016). Other organization include trade and government entities.

To deny users routine services, denial of services sends big data that crashes the system or floods the targeted web servers with traffic. The two technique deprives the legitimate users the accessibility of services that web server offers. The flooding method succeeds when a system obtains excessive traffic making the server slow that eventually shut down. Flooding attacks include ICMP flood, SYN and buffer overflow. The other method exploits vulnerabilities that result in a crash.

To prevent Denial of services organization controlling the servers should implement various countermeasures. The first step to take is to develop a response plan. It is crucial to establish a prevention plan. High profile organizations should develop a complex infrastructure controlled by multiples groups when planning denial of services countermeasure (Razak, 2016). A plan facilitates a quick response when a denial of service occurs.

Correspondingly, it is vital to secure network infrastructure. Preventing network crash can only succeed when there is advanced level protection framework. The framework necessitates establishing threat detection systems and prevention of intrusions such as the use of anti-spam, load balancing, VPN as well as counter filtering (Zare, Azadi & Olsen, 2018). Additional countermeasures include maintaining complex network architecture and leveraging cloud.Apply: Org Chart
I’m studying for my Management class and don’t understand how to answer this. Can you help me study?

Use your selected company from Weeks 1 – 3 for this week’s assessment.

As a recent hire, you’d like to become familiar with the current organizational structure in your organization. This org chart has not yet been created, so you decide to make your own.

Create an organizational chart (org chart) of your company. This high-level information is typically found on the company’s website or other websites about the organization. The org chart should include key leadership and level of responsibility. If the information is not public, base your decisions on a similar organization and research. You may use any Microsoft® program or web-based program.

Cite all sources.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services