For this discussion, you are asked to consider whether ethical behavior can b

 
For this discussion, you are asked to consider whether ethical behavior can b

 
For this discussion, you are asked to consider whether ethical behavior can be assured using the Personnel Security (PS) family of controls (as specified in NIST SP 800-53). Or is a Code of Ethics a better tool for promoting ethical behavior with respect to the use of information and information systems within a specific organization?
Write your response in the form of an opening statement for a debate. Pick one of the two positions below and construct a 3 to 5 paragraph argument for your position. Your argument will be strengthened by the use of authoritative sources and examples — this means you need to cite your sources and provide a list of references at the end of your posting.
Position #1 — a Code of Ethics is the stronger method for ensuring ethical behavior.
Position #2 — Implementation of Personnel Security Controls is the stronger method for ensuring employees act ethically.

Selecting a Topic Choose a topic of interest below, or select one relevant to

Selecting a Topic
Choose a topic of interest below, or select one relevant to

Selecting a Topic
Choose a topic of interest below, or select one relevant to Cyber and Digital Forensics. Submit your topic as the Week 1 research paper submission. Your instructor may make recommendations on the appropriateness/breadth of your submission. The idea for a research topic may come from your curiosity, coursework, interactions with colleagues, faculty members, and general observation. All topics must be related to the contents of this course.
Explore the idea; examine its significance and feasibility. Conduct preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address.
Prepare a rough outline of the research proposal you would like to submit. Discuss the topic, draft a proposal with your instructor, exchange ideas, and incorporate suggestions.
Conduct further research on the topic.
Make a detailed proposal.
In the project proposal, you should:
Introduce the topic
Explain your rationale for selecting the project
Describe the significance of the project
State the objective of the project and project outline
Describe the methodology to be adopted
State the timeline for the project completion
Alternative Topics (but not limited to):
Analyze different phases of forensic investigation and recommend a strategy to use digital forensics for assessing the vulnerability of various components of an information system.
Compare and contrast different forensics techniques and analyze the legal implications of those techniques.
Compare and contrast various techniques of recovering data on different operations systems.
Include references in APA format.

https://www.volersystems.com/design-tips/122-data-acquisition-basics/%22
https://www.youtube.com/watch?v=PxrlD3MEJQE
 https://www.youtube.com/watch?v=PxrlD3MEJQE 

  You may use outside sources to complete these documents. If you source someth

 
You may use outside sources to complete these documents. If you source someth

 
You may use outside sources to complete these documents. If you source something elsewhere, follow the integrity of the language, but make the document your own. Do not copy/paste from other established documentation.
There are examples in the templates, but there are many deviations and styles that can be used.

Define Simple Smart Decision-Making (SSD) lifecycle and identify a project you

Define Simple Smart Decision-Making (SSD) lifecycle and identify a project you

Define Simple Smart Decision-Making (SSD) lifecycle and identify a project you worked on or are familiar with. Did the project go through a life cycle? Share your views.
Requirement:
Note that the requirement is to post your initial response by Thursday, and you must respond to two classmate’s posts by Sunday. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words.

SIEM systems take data from different log files, such as those for firewalls, r

SIEM systems take data from different log files, such as those for firewalls, r

SIEM systems take data from different log files, such as those for firewalls, routers, web servers, and intrusion detection systems, and then normalize the data so it can be compared. SIEM systems are highly valuable in helping to spot attacks by sifting through raw log file data and coming up with relevant information.
The normalization process involves processing the logs into a readable and structured format, extracting important data from them, and mapping the information to standard fields in a database.
Answer the following question(s):
1.     Would a SIEM system be valuable if it did not normalize data? Why or why not?
2.     Does an organization that uses a SIEM system still need a human analyst? Why or why not?
Requirement: Note that the requirement is to post your initial response by 11:59 PM on Thursday and you must post two additional posts during the week by 11:59 PM on Sunday. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students should range between 100-to-150 words. Please cite per APA rules/guidelines.
Make sure your responses do not duplicate the reactions of other students. Scan the answers provided by other students and post your comments or questions about their items in the discussion area. 
Use the following checklist to support your work on the assignment:
I have engaged in a discussion of the assigned topics with at least two of my peers.
I have raised questions and solicited peer and instructor input on the topics discussed.
I have articulated my position clearly and logically.
I have supported my argument with data and factual information.
I have provided relevant citations and references to support my position on the issue discussed.
I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
I have solicited peer and instructor feedback on my arguments and propositions.
I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine and supported my critical review with data and information.
I have followed the submission requirements.

After reading Chapter 8, please provide a detailed overview about the knowledge

After reading Chapter 8, please provide a detailed overview about the knowledge

After reading Chapter 8, please provide a detailed overview about the knowledge areas identified in the PMBOK® guide.
Project integration management
Project scope management
Project time management
Project cost management
Project quality management
Project human resource management
Project communications management

Project risk management
Instructions:
Please write a 500-to-650-words paper in APA Style and include at least 3 reputable sources.
12-pt. Times New Roman font, Double-spaced and 1” margins on all pages.
Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.

After reading Chapter 8, please provide a detailed overview about the knowledge

After reading Chapter 8, please provide a detailed overview about the knowledge

After reading Chapter 8, please provide a detailed overview about the knowledge areas identified in the PMBOK® guide.
Project integration management
Project scope management
Project time management
Project cost management
Project quality management
Project human resource management
Project communications management

Project risk management
Instructions:
Please write a 500-to-650-words paper in APA Style and include at least 3 reputable sources.
12-pt. Times New Roman font, Double-spaced and 1” margins on all pages.
Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.

Assignment: Internet/Web Access Management Learning Objectives and Outcomes D

Assignment: Internet/Web Access Management
Learning Objectives and Outcomes
D

Assignment: Internet/Web Access Management
Learning Objectives and Outcomes
Design a remote access solution.
 Assignment Requirements
Read the following case scenario:
The 9-Iron Country Club, commonly referred to as 9, is located in the suburbs of St. George City (a fictional city). It offers the amenities of a 9-hole golf course, a swimming pool, the clubhouse, and other recreational facilities to more than 1,200 members. 9 employs around 75 staff who cater to private functions such as weddings, meetings, and banquets.
 9 is a seasonal club that closes its outdoor operations between November and February. These four months are critical to plan new venues and coordinate member activities for the upcoming season. The management operations and the catering tasks of 9 are normally executed through the local network. Therefore, the management and staff face many problems, especially during the winter. An incident occurred when Rob Domore, 9’s food and beverage director and head chef, had to drive to the club in bad weather conditions. Rob stated, “We put in a lot of effort to provide impeccable services to members and maintain a competitive position. I think about how much more efficient we could be if we could work from home in the off-season. If we had remote access, all senior management and executive staff could be reaching out to members, helping them plan upcoming events and preparing for next season without coming into the office.”
 Mr. Domore also wanted to provide more flexibility in his daily schedule. He stated, “In the season, I can’t get all my office work done when we are in full swing because much of my time is spent in the kitchen and with the members. So, I desperately wanted the freedom to catch up at home, rather than stay additional hours on premises.”
 Using the information provided in the case scenario, you are to design a potential remote access solution for 9. You also must prepare a report describing the remote access solution. The report should include the following considerations:
Needs and desires of customers and club members—available services, time availability, and network design
Risk management or assessment—protection of confidential and personally identifiable information (PII)
Data classification and security requirements—what measures will be implemented to protect the three states of data
Required Resources
N/A
Submission Requirements
Format: Microsoft Word
Font: Times New Romans, 12-Point, Double-Space
Citation Style: APA
Length: 3-4 pages (not including cover and reference pages)
Self-Assessment Checklist
Use the following checklist to support your work on the assignment:
I have identified potential solutions that could address the time management issues.
I have addressed the considerations listed for designing the remote access solution.
I have used a defined approach to identify the risks.
I have followed the submission requirements.

Assignment: Internet/Web Access Management Learning Objectives and Outcomes D

Assignment: Internet/Web Access Management
Learning Objectives and Outcomes
D

Assignment: Internet/Web Access Management
Learning Objectives and Outcomes
Design a remote access solution.
 Assignment Requirements
Read the following case scenario:
The 9-Iron Country Club, commonly referred to as 9, is located in the suburbs of St. George City (a fictional city). It offers the amenities of a 9-hole golf course, a swimming pool, the clubhouse, and other recreational facilities to more than 1,200 members. 9 employs around 75 staff who cater to private functions such as weddings, meetings, and banquets.
 9 is a seasonal club that closes its outdoor operations between November and February. These four months are critical to plan new venues and coordinate member activities for the upcoming season. The management operations and the catering tasks of 9 are normally executed through the local network. Therefore, the management and staff face many problems, especially during the winter. An incident occurred when Rob Domore, 9’s food and beverage director and head chef, had to drive to the club in bad weather conditions. Rob stated, “We put in a lot of effort to provide impeccable services to members and maintain a competitive position. I think about how much more efficient we could be if we could work from home in the off-season. If we had remote access, all senior management and executive staff could be reaching out to members, helping them plan upcoming events and preparing for next season without coming into the office.”
 Mr. Domore also wanted to provide more flexibility in his daily schedule. He stated, “In the season, I can’t get all my office work done when we are in full swing because much of my time is spent in the kitchen and with the members. So, I desperately wanted the freedom to catch up at home, rather than stay additional hours on premises.”
 Using the information provided in the case scenario, you are to design a potential remote access solution for 9. You also must prepare a report describing the remote access solution. The report should include the following considerations:
Needs and desires of customers and club members—available services, time availability, and network design
Risk management or assessment—protection of confidential and personally identifiable information (PII)
Data classification and security requirements—what measures will be implemented to protect the three states of data
Required Resources
N/A
Submission Requirements
Format: Microsoft Word
Font: Times New Romans, 12-Point, Double-Space
Citation Style: APA
Length: 3-4 pages (not including cover and reference pages)
Self-Assessment Checklist
Use the following checklist to support your work on the assignment:
I have identified potential solutions that could address the time management issues.
I have addressed the considerations listed for designing the remote access solution.
I have used a defined approach to identify the risks.
I have followed the submission requirements.

  Congratulations, you have been chosen to build out a network for a new faci

 
Congratulations, you have been chosen to build out a network for a new faci

 
Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc.
Office Schematic, (select ) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′.

Your focus will only be for the areas marked A, B, C, D, E, F and G (I recommend combining E, F and G using one Wireless Access Point (AP).

The topology is STAR and wireless 
A router will be placed at the edge of the network for Internet Service Provider connectivity
Use CISCO packet tracer to design the best layout for the ACME, Inc network