ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 12 Weeks Ago, 1 Day Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 03 May 2017 My Price 9.00

hardware and software solutions and remote access systems

 In a 3–5-paragraph posting, discuss the following information: 

  • Key factors to consider when choosing a location for a network operation center (NOC)
  • 5 areas of physical security to consider when constructing a NOC
  • Consideration of natural and man-made disasters 

 

(b) 

You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont, Maryland. The President has requested that a WEP wireless network be installed to support the computing needs of visiting dignitaries.

Your commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless endpoints. You have recently completed your ISC2 CISSP certification and the commanding officer would like you to draw upon your knowledge of secure architecture design and prepare a slide presentation on wireless networking and what can be done to secure a wireless network.

Include the following:

  • Your answers to the 6 secure architecture data collection questions of:
    • Why are we building this system?
    • Who is going to use it and why?
    • How is it going to be used?
    • What environment will it work within?
    • What type of security and protection is required?
    • What does it need to be able to communicate with?
  • A sample assessment of how you would gather the information necessary to design secure architecture
  • Consider and recommend hardware and software solutions and remote access systems.
  • Conclude your presentation with your strategy for conducting a penetration test and vulnerability assessment to assure external nation state hackers cannot breach the Camp David secure network.
  • Include substantial research material in the speaker notes

Prepare an 8–20-slide presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else could actually give the presentation.  

Be sure to document your references using APA format.

Criteria for part 2 is below.

 

 

Common Assessment – Bachelor of Information Technology, Version 3.0 Common Rubric Criteria for ITAS 362
Expectations: Student work at the undergraduate level is expected to focus on a broad overview of an academic discipline, along with—where appropriate—
basic theoretical frameworks of professional practices and familiarity with discipline‐specific tools and their application. Blooms taxonomy levels only apply for IT content criteria. Blue color refers the basic expectation on the criterion for the assignment. IT Content Criteria IT Content Criteria Blooms Taxonomy Level Information Security Policy and Operational Issues Exemplary (A)
Analysis Demonstrates full understanding of how technical and administrative controls can be used to secure information systems. If given a design scenario, describes the security controls that can be used to protect and organization and compare various tools that can be used for logical and physical controls. Accomplished (B)
Application
Demonstrates sound understanding of how technical and administrative controls can be used to secure information systems as well as the ability to recommends various documents that can be used for administrative control of physical and data security. Proficient (C) Comprehension Partially Proficient (D)
Knowledge Unacceptable (F)
Knowledge Demonstrates the ability to explain logical and physical security as well as security management processes such as information security policies, standards, baselines, guidelines, and procedures as well as the purpose of technical and administrative controls. Demonstrates ability to list and define logical and physical security mechanisms as well as security management processes such as information security policies, standards, baselines, guidelines, and procedures. Demonstrates a lack of understanding of logical and physical security as well as security management processes such as information security policies, standards, baselines, guidelines, and procedures. Common Assessment – Bachelor of Information Technology, Version 3.0 IT Content Criteria Blooms Taxonomy Level Information Security Services and Threat Analysis Exemplary (A)
Analysis Accomplished (B)
Application Proficient (C) Comprehension Partially Proficient (D)
Knowledge Unacceptable (F)
Knowledge Demonstrate full understanding of security requirements analysis, risk analysis, analysis, cost‐benefits, analysis, risk identification, and risk mitigation. Demonstrates full understanding of the various methodologies used to conduct risk analysis and perform systems certification and accreditation in organizations. Demonstrate sound understanding of security risk identification and risk mitigation processes. Demonstrates sound understanding security certification and accreditation process as well as various documents that are produced when conducting system certification and accreditation tasks. Demonstrate the ability to explain IT risk assessment and audit processes as well as an understanding of security risk identification and risk mitigation processes. Explains information security certification and accreditation process. Demonstrates the ability to describe the processes that are used to conduct IT risk assessment and security audits as well as the issues that are involved in information security management in organizations. Demonstrate a lack understanding of risk assessment and IT security audits basics as well as failure to demonstrate basic steps used to manage information security in organizations. Common Assessment – Bachelor of Information Technology, Version 3.0 General Education Criteria
General Education Criteria EFFECTIVE COMMUNICATION Approach and Purpose, Organization, Style, Grammar, Mechanics, Format, Presentation and Delivery (where applicable) Exemplary (A) Accomplished (B) Proficient (C) Partially Proficient (D) Demonstrates outstanding or exemplary application of written, visual, or oral skills. Demonstrates sound or accomplished application of written, visual, or oral skills. Demonstrates adequate or proficient application of written, visual, or oral skills. Demonstrates sound or accomplished expression of topic, main idea, and purpose. Demonstrates adequate expression of topic, main idea, and purpose. Demonstrates inadequate or partially proficient application of written, visual, or oral skills. Demonstrates outstanding expression of topic, main idea, and purpose. Audience is addressed appropriately. Language clearly and effectively communicates ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are minimal. Audience is usually addressed appropriately.
Language does not interfere with the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present, but do not distract. Organization is clear. Organization is apparent and mostly clear. Format is consistently appropriate to assignment. Format is appropriate to assignment, but not entirely consistent. Presentation and Presentation and delivery are confident delivery are mostly and persuasive (where confident and Audience is generally addressed appropriately. Language is adequate, generally communicating ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are present and sometimes distract from meaning or presentation. Organization is adequate, though confusing or unclear at times. Demonstrates inadequate or partial expression of topic, main idea, and purpose.
Audience is often not addressed appropriately. Language often impedes the communication of ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are frequent and often distract from meaning or presentation. Format is adequate, but inconsistent. Organization is inadequate, confusing, and distracting. Presentation and Format is inadequate Unacceptable (F)
Demonstrates unacceptable application of written, visual, or oral skills. Demonstrates unacceptable, unclear expression of topic, main idea, and purpose. Audience is not addressed appropriately. Language does not clearly and effectively communicate ideas and content relevant to the assignment. Errors in grammar, spelling, and sentence structure are pervasive and consistently distracting. Format is absent or consistently appropriate to assignment. Organization is not apparent and completely inadequate. Common Assessment – Bachelor of Information Technology, Version 3.0 General Education Criteria Exemplary (A)
applicable). PRACTICAL REASONING Critical and Creative Thinking, Problem‐
Solving Demonstrates outstanding or exemplary ability to analyze assumptions and evaluate evidence, complexities of issues, and alternatives. Where required, demonstrates outstanding or exemplary ability to use creativity and originality in problem‐
solving. Accomplished (B) Proficient (C) Partially Proficient (D) Unacceptable (F) persuasive (where applicable). delivery are adequate, with evident lack of confidence and persuasive power (where applicable). and obscures meaning. Presentation and delivery are unacceptable, with little or no confidence and persuasive power (where applicable). Demonstrates sound or accomplished ability to analyze assumptions and evaluate evidence, complexities of issues, and alternatives. Where required, demonstrates sound or accomplished ability to use creativity and originality in problem‐solving. Demonstrates adequate or proficient ability to analyze assumptions and evaluate evidence, complexities of issues, and alternatives. Where required, demonstrates adequate or proficient ability to use creativity and originality in problem‐solving. Demonstrates inadequate or partially proficient ability to analyze assumptions and evaluate evidence, complexities of issues, and alternatives. Where required, demonstrates inadequate or partially proficient ability to use creativity and originality in problem‐solving. Presentation and delivery are inadequate, lacking confidence and persuasive power (where applicable). Demonstrates unacceptable ability to analyze assumptions and evaluate evidence, complexities of issues, and alternatives. Where required, demonstrates unacceptable ability to use creativity and originality in problem‐
solving. Common Assessment – Bachelor of Information Technology, Version 3.0 General Education Criteria PRACTICAL REASONING Research and Information Literacy Exemplary (A) Accomplished (B) Proficient (C) Demonstrates outstanding selection and use of high quality, credible, and relevant sources to develop ideas that are appropriate to the assignment. Demonstrates sound selection and use of credible, relevant sources to support ideas that are appropriate to the assignment. Demonstrates adequate selection and use of credible and/or relevant sources to support ideas that are appropriate to the assignment. Sources are generally cited according to required documentation (e.g., APA), with few errors. Sources are cited according to required documentation (e.g., APA), with some errors. Sources are consistently cited according to required documentation (e.g., APA), with almost no errors. Partially Proficient (D) Unacceptable (F) Demonstrates inadequate selection and use of sources to support ideas in the assignment. Demonstrates unacceptable selection and use of sources to support ideas in the assignment. Sources are inconsistently cited according to required documentation (e.g., APA), with frequent errors. Sources are not cited according to required documentation (e.g., APA).

Attachments:

Answers

(11)
Status NEW Posted 03 May 2017 06:05 AM My Price 9.00

-----------

Attachments

file 1493793181-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)