Virtualization plays a major role in disaster recovery and business continuity planning. Find a scholarly article related to DR/BCP and discuss virtualization’s impact on possible solutions. Discuss the advantages and disadvantages of a virtual solution for DR/BCP.
Identify a major breach of a virtualized environment that has occurred in the recent past (within the last five years). For your Portfolio Project Assignment, you will write a critical evaluation of your chosen breach, and review and analyze the breach along the following dimensions:
What went wrong?
Why did it occur?
Who was responsible?
How could it have been prevented?
What advice would you offer to prevent such a breach from occurring in the future?
If you were a politician who is running for local office, how can you maximize positive use of ICT in your political campaigns in order to convince people to vote for you?
Cruise Ship management database system The following data model is designed to hold information relating to Cruise Ship database system. For this scenario we need to define the following facts: These facts define the requirements which the Database must meet and should be agreed between the Database User and the Database Designer prior to physical creation. Assuming that the Cruise Ships may depart from various different departing Ports and stop at multiple different ports before returning to the departing Ports. the Entities required should include: • Travelers • Cruise Ships • Departing Ports of the Cruise Ships • Ports visited by the Cruise Ships (country, city, etc.) • Traveler’s feedback to the Cruise Ships
The Entities are related as follows: • A Traveler may have information such as address, phone, DOB, etc. • There are many cruises ships a traveler can board at various departing ports • A Traveler can travel multiple times on Cruises • A Traveler may write reviews on certain Cruise Ships When asking questions of the database we may need to know: 1. Who took which ship departing from which port? 2. Who wrote feedback for which Cruise Ship?
Create an UML diagram capturing the objects and relationships described above. Describe all your design choices and constraints. Please use the notation for UML diagrams introduced in the course. Rubrics used will be similar to the homework Rubrics for grading. Required entity sets Appropriate attributes for all entity sets Correct Relationships (showing multiplicity) Correct keys and foreign keys Correct UML format
What methods can be used to evaluate information systems and communication processes?
Do internet research on any malware, virus or DOS attack. Summarize your findings in 3-4 paragraphs and be sure to include a link to your reference source. Explain this occurrence in your own words (do not just copy and paste what you find on the Internet).
Include the following information:
- Name of the Malware or Virus
- When this incident occurred (date)
- Impact it had or explanation of the damage it caused
- How it was detected
For this assignment, you will create a paper on your proposed changes to the database you have been working with and how it will improve patient care and quality outcomes.
Paper must include must include the following:
• Name of person presenting and credentials;
• Brief summary of the proposed system;
• Explanation of how the proposed health information technology system will improve patient care and quality outcomes;
• Word document with any tables, graphs, and references used for the assignment.
WAN is the core component to your network, as it encompasses all your local area networks (LANs) and all needed network infrastructures such as routers, switches, and servers.
For this assessment, prepare a project document that includes the following:
Create a diagram that will:
Display the basic topology for your selected organization. Be sure you include routers, switches, and all of the basic network connection hardware.
Diagram your IP addresses. Calculate and add your IP ranges and subnets into your diagram.
Explain the switching and routing choices, topology choice, and overall wired infrastructure decisions.
Explain the strategy you used for assigning IP addresses for the organization. Why did you choose the IP addresses that you did?
Describe IP addressing strategies for maintaining privacy on a network. How do your strategies maintain privacy on your network?
Describe at least three networks addressing or topology standards that influenced your network design.
encouraging security architecture developments
The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures.
The SANS Institute hosted three “What Works in Security Architecture” Summits.
The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet.
Adam Shostack published Threat Modeling: Designing for Security, and renowned threat modeler, John Steven, has told me that he’s working on his threat modeling book.
Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”
Choose 2 or 3 three items from the list above and provide an update to their development status. Make sure you provide some background on your selection and then provide the update of the development.
Based on research, make the argument that hacking is an ethical response to cyber attacks. Consider both state and non-state actors and different situations.