Computer Science Homework Help

Strayer University Network Infrastructure and Security Essay

 

This assignment consists of two sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

Instructions

Section 1: Infrastructure Document

Write a 5–10 page infrastructure document in which you:

  1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
  2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  4. Create and describe a comprehensive security policy for the company that will:
    1. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.
    2. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with 3–5 new project tasks each consisting of 5–10 subtasks

Computer Science Homework Help

Westcliff University Class Diagram Data Project

 

Create a Class Diagram that shows all the classes in your design and how each class interacts. You will have to design your system like your were implementing it to make the class diagram. Envision what classes you will need and what methods will go in each class.

Computer Science Homework Help

Westcliff University Online Payment System Project

 

select a subset of user stories and create a sprint backlog document. Each user story should be broken down into multiple tasks and allocate time spent for each of these tasks over the duration of the sprint (typically for each day in the sprint). Typically, the user stories chosen for this sprint would be the functionality implemented of the system but we are not implementing the system so you will take half of your user stories and break them down into tasks and assign how much time spent on each task.

  1. Create the sprint backlog that lists a subset of user stories that will be broken down into tasks and allocated time spent on this task each day of the sprint (because we only have 2 sprints left choose half the user stories for this sprint).
  2. In addition to the backlog you should create a burndown chart to show the rate of progress either via story points completed or hours burned
  3. PFA attachment sprint 1 backlog example document for reference
  4. PFA attachment online payment system document which contains user and user stories on which we need to work and prepare sprint backlog and burndown chart

Computer Science Homework Help

Computer Science Cyber Security Discussion Questions

 

I’m working on a cyber security question and need guidance to help me learn.

1. Assume that Schnorr digital signature uses prime number p = 4637. Answer the following questions:

(a) Find q which is the greatest prime factor of p − 1.

(b) Find some positive integer a so that 1 < a < p and a q ≡p 1.

(c) Assuming that s = 53 is a random private key, find the public key v corresponding to s.

(d) Assuming that we use hash function H(µ) = µ mod 43 to digest messages for signing, find the signature of message M = “hi” = 3334 (you must pick a random number between zero and q before finding the signature).

(e) Illustrate how receiver will verify the obtained signature of part 1.d using global public key, the hash function H and the sender’s public key v.

2. Assume that ElGamal digital signature uses prime number q = 7919 and its primitive root α = 1239. Answer the following questions:

(a) Given the random private key XA = 4321, find its corresponding public key YA.

(b) Assuming that ElGamal digital signature uses the hash function H(µ) = µ mod q, find the signature of message M = “hello”.

(c) Illustrate how receiver will verify the obtained signature of part 2.b using sender’s public key.

3. List and compare the security of four classes of techniques for public key distribution.

Computer Science Homework Help

SU Implementation Strategies Attributes of The Information System Essay

 

Your proposed information system is still a contender. The executives, however, are asking whether it is too limited to prevent the shadow IT projects that continue to take place throughout the organization.

They believe that you have considered what the organization does now, but how will your system adapt to new products and processes? The following video is an example of two companies – Apple and Google – adapting new products and processes in spite of multiple challenges.

You’ll have to quell their fears, so it’s time for another memo. Please focus on these points:

  1. Identify any significant changes that your organization might reasonably make in its product offerings in the next three years. Explain the competitive benefits of this change.
  2. Explain how your information system addresses or can adapt to the introduction of these new product offerings.
  3. Give one reason why capabilities for the new product offerings should or should not be incorporated in the initial information system design. Justify your reason.

This memo should be 3–5 pages long.

Part two: on a separate word document 

Please respond to the following:

Read the article, “Business Value Dashboard.” Then, find an organization that has adopted a real-time dashboard for its internal use within the last three years. Do not repeat examples from the textbook or that have been posted by other students.

Please respond to the following:

  • What are the most important parts of this dashboard?
  • How do these parts help the business managers? How do they help the individual contributors?
  • Have real-time dashboards replaced the traditional business report? Justify your answer.
  • Be sure to respond to at least two of your classmates’ posts.
  • Valera Mixon wrote Sac State ScholarsDashboardThe Sac State Scholar dashboard connects the Sac state community with other scholars and collaborators. It is a place where thesis and dissertations. It also “auto-populate faculty profiles with little invention.” (Sac State)The dashboard shows how many downloads have occurred by Country.  It also shows how many research outputs are available, how many have been viewed, and how many research outputs were downloaded.PurposeThe ability for the dashboard to populate the faculty profiles allows for an easy way for the faculty to maintain their profiles and not add additional work to their schedule.  It also serves as a “research networking tool where Sac State research, scholarship, creative activities, as well as teaching and service activities will be highlighted.”  The dashboard will allow for individuals to find faculty that they can partner with for “research projects, grants, scholarships or instructions.” (Sac State) It also will allow government agencies or entrepreneurs to gain access to experts in specific fields.ReplacementThis dashboard did not replace a report; it is replacing a database, not a report. The database held only thesis and dissertations. It did not house the faculty information and did not lend itself to a portal that allowed those outside the campus to connect for further scholarly pursuits.References:https://csu-csus.esploro.exlibrisgroup.com/esploro/https://csus.libguides.com/sacstatescholarshttps://csus-dspace.calstate.edu/
  • Kelly Rutheuff  wrote Why Every Government Needs a Covid Dashboard – Bloomberg
    UK Summary | Coronavirus (COVID-19) in the UK (data.gov.uk)

    • What are the most important parts of this dashboard?
      • The data is updated daily to report on COVID-19 with cases, vaccinations, and deaths. The dashboard view is easy for viewing the data without having to look at spreadsheets. The dashboard is very visual on the eyes while still providing the data that is needed.  The use of maps and multiple charts makes finding the data easy to read and analyze. 
    • How do these parts help the business managers? How do they help the individual contributors?
      • The business managers in this case would be the government officials in England along with the World Health Organization who were monitoring trends and data from all around the world. As governments, all were tasked with standing up dashboards and collecting the data for their country.   The data collection made it possible for officials to be able to know when to put policies in place to help stop the spread of the virus.  
      • For individuals, it becomes a place to see the trends and numbers for Covid. The maps offer a way to see the visual representation of the Covid outbreaks in the area. The maps also offer vaccination rates by area which for many people helped with planning for personal travel as well as business.  The dashboard also offered links on where to locate vaccination locations.  
    • Have real-time dashboards replaced the traditional business report? Justify your answer.
      • The fast-paced and ever-changing dynamic of the pandemic would have never been afforded the time for a traditional business report. In the article, they reference how quickly many of the sites had to stand up dashboards for reporting and used out-of-the-box software which they later realized did not offer everything they needed. The Public Health of England did have a designed and coded site and was able to expand the team supporting it from 3 to 17 during the pandemic. Real-time dashboards are easier for individuals and executive teams to view and absorb data quickly on a daily basis without having to read through an entire business report.    

Computer Science Homework Help

Grossmont College One Gate of Circuit Verse Project

 

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

Instructions

Please capture at least two screen images of what you are constructing in the simulator.

Besides that, I would like about a half-page of text describing what you have done and the results.

Computer Science Homework Help

NEC Criminal Case Digital Forensics Essay

 

I need help with a Cyber Security question. All explanations and answers will be used to help me learn.

Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation.