Please have the writer consults with me to determine the exact research proposal. I am open to suggestions, and I am not 100% concrete on the topic, but I do know a general idea. I am submitting the assignment details as well. If this goes well, I will probably request the same writer for products at different stages of the same topic.
Write a paper that includes responses to the following questions:
-What is NMAP? How is it used?
-What is the primary process by which NMAP functions in
footprinting and network discovery?
-Describe how NMAP is used by hackers and by security
Case Study Assignment Guidelines
Format (10 points): Elements of case format include:
At least one and one-half pages in length (single spaced), not to exceed 3 pages in length
Proper English, grammar, and syntax must be used
One inch margins
Issue (10 points): One or two paragraphs that summarizes the key issue of the case study.
Discussion (20 points): Three to six paragraphs that give a more detailed summary of the case study, including your analysis and insight.
Findings (6 points each for a total of 30 points): The elements of your submission must include — the Letter of the finding you are addressing (A,B,C, etc), one or two paragraphs documenting your findings, and analysis or insight to validate your position. Each of the following items must be addressed:
What was the business goal?
What was the business strategy?
What leadership strategies were employed?
What were the Information Systems functions?
What tools or techniques were used?
Conclusion (10 points): Two to four paragraphs that summarize your insight into this particular case study, and what conclusions you can draw from it — parallels, textbook insights, personal insights, etc.
Ideas for Further Concern (10 points): Ask three to six questions about the case that should be addressed to develop a better understanding of this situation. You only have to formulate the questions, not answer them.
References – at least 3 references from the periodicals, textbooks (our textbook is not allowed as a reference for this purpose), speeches, Internet searches. These server the same purpose as in a term paper — to provide independent validation of the position you have taken in the paper.
Imagine that you are working in the role of a senior level network administrator for the IT Guru corporation. The IT Guru corporation is a mid-sized Information Technology consultancy with locations in North America, Europe and Asia with 5000 employees and 36 offices founded in 1999.
Your organization is expanding its technology foot print, exploring emerging technologies and consulting clients on information technology strategies and solutions. In your role you provide recommendations on technology selection and implementation to support the needs of your organization and you are also an advisor to the consulting teams that assess and recommend technology strategies for their clients.
You have been invited to a meeting with your Chief Information Officer and Vice President of Global Sales to discuss the concepts of cloud computing and explain the different cloud services that are available. You will be provided with 30 minutes to present your ideas and this will require 10 slides.
To complete this assignment, complete the following:
Create a 10 slide PowerPoint presentation that includes the following:
Discuss the concept of cloud computing and the types of cloud services available to include SAAS, PAAS and IAAS. (3 slides)
Provide an explanation of the components of cloud infrastructure that will need to be adopted to create a cloud platform. (3 slides)
Explain cloud computing strategies to include IOT devices, security, performance, and management. (2 slides)
Conducting research and preparing a report on the supporting information for your project serves two important purposes:
The researched report helps explain your choice of technologies in terms of business benefits and risks. This supported rationale is critical for executive approval.
A report reinforces or improves your plan—but only if you apply the results of your research to your plan. In the industry, project managers develop their plans iteratively, revising them as they conduct more research and identify better or cheaper alternatives. This iterative approach is especially relevant to IT projects because new technologies are developed and retired quickly.
This week, you are conducting research that provides additional information to support your project and writing a second publish of your project plan.
Conduct further research related to your project concerning:
Industry trends and history
Top technology vendors
Project management approaches
Development and deployment approaches
Analyses of impact and risks.
You may want to include Forbes and Harvard Business Review in your list of organizations to research.
Record your research findings in the Supporting Research Report template.
Write a second publish of your project plan. Include the following in your second publish:
Identify 3 improvements you would recommend for the project based on your research in your updated publish.
Highlight the recommended improvements in yellow and explain why you made the changes. You can include your explanation in parenthesis next to the change you made.
Submit both your Supporting Research Report and the second publish of your Project Plan.
Write a paper discussing the hardware and software that will be a part of topic. Include the following in the paper:
-Include a summary of the types of hardware you will need.
-Include a summary of the types of software you will need.
-Discuss potential vulnerabilities and areas that will require
additional security and attention.
Attached to this are two papers that should help guide you into the correct direction for the paper.
A VPN appliance is a piece of hardware that allows individuals to connect remotely and simulate being inside your network. Write a paper summarizing the specifics of this technology. Within the paper, describe the vulnerabilities of a VPN. Discuss where the security is its weakest as well as where it is at its strongest in a VPN network.
Your individual project consists of an 11-14 slide presentation on web security mitigation strategies and tools. For this assignment you will detail the WASP framework and common security tools to include a web application security scanner, anti-virus software, and firewall technology. Please ensure your presentation conforms to the following technical subject area and format:
Title Slide (1 slide)
Topics of Discussion Slide (1 slide)
Discuss the purpose and functionality of Web Application Vulnerability Scanners within the OWASP framework (1-2 slides)
Provide research speaking to at least 3 of the following vulnerabilities below facing vulnerabilities scanners today (3-4 slides):
Insecure server configurations
Discuss the differences in functionality between the OWASP Web Application Firewall and traditional Network Firewalls. (3-4 slides)
Conclusion slide (1 slide)
Reference slide in APA format (1 slide)
A project plan outlines recommended approaches to the use of the network, database management system, software, and cloud service technologies. Because industry best practices dictate transparency in terms of selection criteria and their importance to a specific project, a project plan should also include the criteria by which the recommended approaches were selected, along with the benefits to the project that each is expected to deliver.
This week you publish a project plan for the project outlined in your business proposal in Week 1. Complete all sections of the Project Plan publish template, including, recommendations on network technology, database management system, software applications, and cloud services.
What are cookies?
What are the functions of cookies?
How can cookies be a privacy risk?
What is a supercookie and how is it different than a regular cookie?
How does a cookie work?
You need to answer all five questions.
Include the question in your paper before each written answer to help structure your paper.
Your paper should be a minimum of one page (double-spaced) in length.