Blog

Social Media and Privacy Issues

Assignment 1: Social Media and Privacy Issues

Due Week 2 and worth 120 points

Social networks afford individuals the venue and technology to connect with many “ friends”, both known and unknown. An individual’s activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee’s employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

  1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.
  2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.
  3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization’s privacy and security practice among social network sites.
  4. Suggest three (3) ways that your social network policy can protect your employer against:
  5. identity theft
  6. cybercrimes
  7. abusive marketing
  8. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast private with public clouds.
  • Summarize business applications that can migrate to the cloud.
  • Use technology and information resources to research issues in cloud computing environments.
  • Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.

How has Information Technology impacted governing bodies

The question you’ll address is: ” How has Information Technology impacted governing bodies’ ability to align public policy with stakeholder needs?

I want to see ORIGINAL WORK (ie. DO NOT PLAGIARIZE!) If you use another author’s work, you MUST properly quote AND cite it. (See APA format.) Review the literature – don’t just copy what someone else said.

Your  paper must be in correct APA format, use correct grammar, consist of a minimum of 750 words, and will need to include at least ten (10) resources, ALL of which must:

1) Be current. Published within the last few years. (i.e. since 2014)

2) Be peer-reviewed.

3) Relate directly to the question posed above.

Additionally, you MUST upload a pdf of EVERY paper that appears in your reference list.

Remember that a literature review is not the same as an abstract. Abstracts are descriptive. A literature review tells the reader what other researchers have written about a topic. You must find pertinent and relevant resources, group them into logical “collections”, and the organize your review into a logical presentation of other research.Your literature review should be descriptive and representative of the work other researchers have done in your area. 

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out. 

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Tips for better literature review grades 

Here are a few tips for submitting quality papers. Your grade depends on the quality of your work, which begins with reading and understanding the assignment requirements. 

1) Read the assignment instructions. Then re-read the assignment instructions.

2) Read EVERY paper (all of it) that you reference.

3) Use proper APA format for in-text citations and end references. (HINT: look at the links I provided in the assignment instructions, ESPECIALLY the third one.)

4) Make sure that your lit review is NOT an annotated bibliography. Do not simply list papers with summaries. Your resources should be logically grouped, and your lit review should tell a story about what other researchers have published about the assigned topic. Remember that a literature review is NOT instructive – it is analytical.

5) Provide PDFs of EVERY resource. (That isn’t a suggestion.) Peer reviewed resources have pdfs. 

Note that APA an initial in-text citation for a source is more than just a year in parentheses.

Identifying Technology Assets

Subject Name: Disaster Recovery(Need 275 to 285 words without reference
and need 3 to 4 references)

Topic-1

Identifying Technology Assets

1.you are part of a disaster recovery team charged with completing the asset

inventory at a Small business that primarily sells a small selection

of products to the public.

2. Establish a sample hardware asset list for this company and

classify those assets as tier 1,2, or 3 assets

3. Develop a list of the software needed to restore operations of

the small business.

Functions, Functions, So many Functions

1.Pick a public-Interacting unit of your institution, such as

registration, the bursar’s office, or the library 

impact IT has had on policy making.

Your paper will be a Literature Review, specifically focusing on the impact IT has had on policy making. The question you’ll address is: “How has Information Technology impacted governing bodies’ ability to align public policy with stakeholder needs?” I want to see your literature review include different models, how they are used in specific situations, and their impact on policy making.

The question you’ll address is: ” How has Information Technology impacted governing bodies’ ability to align public policy with stakeholder needs?

I want to see ORIGINAL WORK (ie. DO NOT PLAGIARIZE!) If you use another author’s work, you MUST properly quote AND cite it. (See APA format.) Review the literature – don’t just copy what someone else said.

Your  paper must be in correct APA format, use correct grammar, consist of a minimum of 750 words, and will need to include at least ten (10) resources, ALL of which must:

1) Be current. Published within the last few years. (i.e. since 2014)

2) Be peer-reviewed.

3) Relate directly to the question posed above.

Additionally, you MUST upload a pdf of EVERY paper that appears in your reference list.

Remember that a literature review is not the same as an abstract. Abstracts are descriptive. A literature review tells the reader what other researchers have written about a topic. You must find pertinent and relevant resources, group them into logical “collections”, and the organize your review into a logical presentation of other research.Your literature review should be descriptive and representative of the work other researchers have done in your area. 

training a CSIRT

APA Format,

3 References 

each question should be 150-250 words.

1) Using a web browser, identify at least five success you would want to use when training a CSIRT

2) Using a web browser, visit www.mitre.org. what information is provided there, and how would it be useful

3) Using a web browser, visit www.securityfocus.com. What is bugtraq, and how would it be useful? What additional information is provided under the vulnerabilities tab?

4) Using a web browser, visit www.cert.org what information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

functions of each layer of OSI reference model

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Answers MUST be written in your own words. No marks will be awarded for any answer that contains more than 10% direct quote (referenced or unreferenced). One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1 [3 Marks]

Write functions of each layer of OSI reference model, also differentiate between hardware and software layers. Explain your view; why Network layer of OSI model is called Internet layer in TCP/IP networking model?

Question 2 [3 Marks]

Complete the following Hands-On Projects from the prescribed textbook (Pyles, Carel & Tittel 2017)

Hands-On Project 2-3

Hands-On Project 3.2

In order to complete this activity, students should insert screenshots in the assignment document along with a short description of each step taken to complete the project.

Question 3 [4 Marks]

For any data communication, MAC and IP addresses play very important role, explain why these two types of address are important and what critical role ARP protocol plays in this scenario?

Question 4 Case study task [5 Marks]

In your role as a Solutions Architect at Foreshore IT Solutions, you are leading a team of several system administrators. Foreshore IT Solutions is a large organisation and is currently expanding its operations. The company was using six sites across Brisbane to accommodate its various departments. These departments are interconnected by three routers.

Company’s current network is shown as above, which include following departments at various sites:

Site

Department

No of Hosts

HQ

Sales

16000

Marketing

8000

BR1

Advertising

2000

Online Sales

4000

BR2

Product Support

1000

Technical Support

500

Recently, company has experienced huge growth in their business, and need to employ more employees who will need more devices (hosts). Company is expecting 40% growth.

You are required to recalculate IP addressing scheme for this network to accommodate 40% growth, for example; Sales department will grow by 6400 hosts. Also provide subnets for inter router connections which should have subnet mask 255.255.255.252

Use network ID 180.XY.0.0/16 (where XY are last digits of your student ID).

TASK Write a 800 words (+/- 10%) (Max) report explaining:

  • The detailed design of a simple addressing solution      (with diagram(s) and step by step workout of the calculations) that      accommodate for growth, is easy to administer and has the minimum wastage      of available IP address space. [3 Marks]
  • Provide IP addresses and Subnet Masks for all LAN and      WAN interfaces. [1 Mark]
  • Suppose in further future, this company experience more      growth, which leaves company with no option except upgrading this network      from IPv4 to IPv6, investigate/explore the technical changes you may need      to implement for such upgrade

Computerized Operating Systems (OS)

QUESTION 2

USING A WEBBROWSER, IDENTIFY AT LEASTT FIVE SOURCES YOU WOULD WANT TO USE WHEN TRAINING A CSIRT

QUESTION 3

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone or tablet. Find articles that describes the different types of operating systems (Linux, Unix, Android, ROS, z/OS, z/VM, z/VSE, etc). Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember, this assignment is to be scholarly;

  • Posted: 3 Days Ago
  • Due: 08/04/2019
  • Budget: $10

Tags: CSE

DTGOV

Read the DTGOV Case Study before you attempt this assignment 

DTGOV want to migrate some of their webservers to an IaaS instance in AWS to test their strategy. They understand that they need to do a full migration plan first, but they want to determine what sort of architecture would be required to support their web services.

The web services are considered essential by both DTGOV and their users, so any web services must be:

  • Readily available and accessible at all times
  • Capable of handling heavy loads in times of peak demand
  • Capable of serving downloads to users as required
  • Secure from attacks
  • Capable of providing reports on usage

Your task is to prepare an initial PowerPoint briefing for the DTGOV board. Your briefing should discuss:

  1. Initial Webserver trial:                                                                                                                            (30 marks)
    1. Explain how the selected DTGOV webservers will work in       an IaaS instance in the AWS Cloud environment and how will this move       affect users of these web services. You should also explain if you think       the users will benefit from this move, and why they will benefit, or not;
    2. Explain the types of Cloud Architectures that you       think would be useful for DTGOV to use as part of their webserver       infrastructure in the Cloud.  This explanation should also briefly       discuss how the current DTGOV infrastructure could be replicated or       replaced in a Cloud deployment.
    3. You do not need to talk to security of the       infrastructure or webservers in this briefing.
  2. Office 365:                                                                                                                                                        (30 marks)
    1. Many of DTGOV’s customers want to provide all their       staff with the ability to access office automation, such as email, word       processing and spreadsheet capabilities, as well as online storage for       their files, whether they are in the office,   at home, or working       at a remote site in the field.  The DTGOV board is very concerned to       learn about the critical issues, other than cost, that may affect the       supply of Cloud based office automation to their customers’ staff.        You will need to prepare a briefing on the best way to provide       office automation for DTGOV customers.  Your presentation should:
      • Discuss the benefits and issues that DTGOV customers,        and their users, would achieve from moving to Office 365 as their office        automation suite.
      • Describe how a cloud-based approach will differ from        providing this suite from an on-premise data centre.
  3. SharePoint:                                                                                                                                                       (40 marks)
    1. DTGOV is also considering whether to use PaaS or SaaS       to provide some services to specific customers. DTGOV has deployed       Microsoft SharePoint 2010 from its data centre as a collaboration and       document management tool. The SharePoint 2010 instance has been       extensively customised to suit DTGOV requirements and deploys Project       Central, their Project Management tool as a separate application from       within SharePoint. DTGOV would like to move its SharePoint 2010 instance       to the cloud to make it more available to more customers, particularly       those at remote sites. DTGOV wants you to report on:
      • What are the major differences between the models        IaaS, PaaS and SaaS? (10 marks)
      • Recommend the model that you consider most        appropriate for this service and discuss why this model is the most        appropriate for the SharePoint service. (15 marks)
      • What are the most likely problems that DTGOV will        encounter with the model that you recommend? How would you advise DTGOV        to deal with these issues? (15 marks)

Each slide in the briefing must also include speaking notes in the notes section to explain the slide, and all images used in the briefing should be referenced.

Network layer of OSI model

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Answers MUST be written in your own words. No marks will be awarded for any answer that contains more than 10% direct quote (referenced or unreferenced). One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1 [3 Marks]

Write , also differentiate between hardware and software layers. Explain your view; why Network layer of OSI model is called Internet layer in TCP/IP networking model?

Question 2 [3 Marks]

Complete the following Hands-On Projects from the prescribed textbook (Pyles, Carel & Tittel 2017)

Hands-On Project 2-3

Hands-On Project 3.2

In order to complete this activity, students should insert screenshots in the assignment document along with a short description of each step taken to complete the project.

Question 3 [4 Marks]

For any data communication, MAC and IP addresses play very important role, explain why these two types of address are important and what critical role ARP protocol plays in this scenario?

Question 4 Case study task [5 Marks]

In your role as a Solutions Architect at Foreshore IT Solutions, you are leading a team of several system administrators. Foreshore IT Solutions is a large organisation and is currently expanding its operations. The company was using six sites across Brisbane to accommodate its various departments. These departments are interconnected by three routers.

Company’s current network is shown as above, which include following departments at various sites:

Site

Department

No of Hosts

HQ

Sales

16000

Marketing

8000

BR1

Advertising

2000

Online Sales

4000

BR2

Product Support

1000

Technical Support

500

Recently, company has experienced huge growth in their business, and need to employ more employees who will need more devices (hosts). Company is expecting 40% growth.

You are required to recalculate IP addressing scheme for this network to accommodate 40% growth, for example; Sales department will grow by 6400 hosts. Also provide subnets for inter router connections which should have subnet mask 255.255.255.252

Use network ID 180.XY.0.0/16 (where XY are last digits of your student ID).

TASK Write a 800 words (+/- 10%) (Max) report explaining:

  • The detailed design of a simple addressing solution      (with diagram(s) and step by step workout of the calculations) that      accommodate for growth, is easy to administer and has the minimum wastage      of available IP address space. [3 Marks]
  • Provide IP addresses and Subnet Masks for all LAN and      WAN interfaces. [1 Mark]
  • Suppose in further future, this company experience more      growth, which leaves company with no option except upgrading this network      from IPv4 to IPv6, investigate/explore the technical changes you may need      to implement for such upgrade