TelecommunicationsNetwork Security Plan Project AssignmentThe Acme Corporation i

TelecommunicationsNetwork Security Plan Project AssignmentThe Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.  As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications: 1.     There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.2.     Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.3.     There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.4.     The primary data center will be located at the Atlanta location.5.     There will be a failover data center at the Cincinnati location.6.     Each location should be protected from intrusions that are not limited to state change attacks.7.     The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well. 8.     There will be database servers located at the Cincinnati site.9.     The servers must have redundancy.10.  The solution must have a plan to verify security measures.Your job is to develop a network design to meet the requirements above.1.     You should submit a network drawing listing the network’s topology including any necessary hardware.2.     You should list any recommended cable.3.     You can recommend wiring closets wherever you need them.4.     You should recommend ways to assure that you are not getting attacked.5.     You should build traps to stop attackers.6.     You should recommend any WAN or wireless technologies.7.     You should recommend any technology needed in the data center for high availability.8.     Justify your recommendations.Paper formatting requirements:Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 5 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper. Please review APA guidelines here: https://owl.english.purdue.edu/owl/resource/560/01/ for reference.·      For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).·      For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:Smyth, A. M., Parker, A. L., & Pease, D. L. (2002). A study of enjoyment of peas. Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http://www.articlehomepage.com/full/url/Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writelivingDe Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo Indian tales. University of Pennsylvania. Retrieved from  http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html·      Start your paragraph with an indent (tab).·      Use section and sub-section headings

The Acme Corporation is a new startup that wishes to sale their new phone to the

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.  As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications: 1.      There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.2.      Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.3.      There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.4.      The primary data center will be located at the Atlanta location.5.      There will be a failover data center at the Cincinnati location.6.      Each location should be protected from intrusions that are not limited to state change attacks.7.      The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.8.      There will be database servers located at the Cincinnati site.9.      The servers must have redundancy.10.  The solution must have a plan to verify security measures.Your job is to develop a network design to meet the requirements above.1.      You should submit a network drawing listing the network’s topology including any necessary hardware.2.      You should list any recommended cable.3.      You can recommend wiring closets wherever you need them.4.      You should recommend ways to assure that you are not getting attacked.5.      You should build traps to stop attackers.6.      You should recommend any WAN or wireless technologies.7.      You should recommend any technology needed in the data center for high availability.8.      Justify your recommendations.Paper formatting requirements:Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 5 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper. Please review APA guidelines here: https://owl.english.purdue.edu/owl/resource/560/01/ for reference.·         For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).·         For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:Smyth, A. M., Parker, A. L., & Pease, D. L. (2002).A study of enjoyment of peas.Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http://www.articlehomepage.com/full/url/Bernstein, M. (2002).10 tips on writing the living Web.A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writelivingDe Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo Indian tales. University of Pennsylvania. Retrieved from  http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html·         Start your paragraph with an indent (tab).·         Use section and sub-section headings

The Acme Corporation is a new startup that wishes to sale their new phone to the

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.  As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications: 1.      There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.2.      Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.3.      There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.4.      The primary data center will be located at the Atlanta location.5.      There will be a failover data center at the Cincinnati location.6.      Each location should be protected from intrusions that are not limited to state change attacks.7.      The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.8.      There will be database servers located at the Cincinnati site.9.      The servers must have redundancy.10.  The solution must have a plan to verify security measures.Your job is to develop a network design to meet the requirements above.1.      You should submit a network drawing listing the network’s topology including any necessary hardware.2.      You should list any recommended cable.3.      You can recommend wiring closets wherever you need them.4.      You should recommend ways to assure that you are not getting attacked.5.      You should build traps to stop attackers.6.      You should recommend any WAN or wireless technologies.7.      You should recommend any technology needed in the data center for high availability.8.      Justify your recommendations.Paper formatting requirements:Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 5 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper. Please review APA guidelines here: https://owl.english.purdue.edu/owl/resource/560/01/ for reference.·         For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).·         For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:Smyth, A. M., Parker, A. L., & Pease, D. L. (2002).A study of enjoyment of peas.Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http://www.articlehomepage.com/full/url/Bernstein, M. (2002).10 tips on writing the living Web.A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writelivingDe Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo Indian tales. University of Pennsylvania. Retrieved from  http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html·         Start your paragraph with an indent (tab).·         Use section and sub-section headings

Term Paper: Security Administrator Handbook  Due Week 10 and worth 200 points   

Term Paper: Security Administrator Handbook  Due Week 10 and worth 200 points    
One of the responsibilities of a Security Administrator is to create and document policies that protect the organization and guide users to making smart decisions. In this assignment you will build a handbook that can be used for such a purpose. The NIST’s Special Publications Website, a government operated Website, provides several documents for you to review in order to see examples that may be helpful to start this assignment (http://csrc.nist.gov/publications/PubsSPs.html).    
Other helpful Websites for this assignment include: 
•DISA.mil (http://iase.disa.mil/) 
•TechRepublic (http://www.techrepublic.com/search?q=Security+Administrator+handbook&e=1) 
•ACM (http://www.acm.org/search?SearchableText=security+administration) Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. 

Write a twelve to eighteen (12-18) page Security Administrator’s handbook including policies tailored to your work environment or for a business environment with which you are familiar. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate your company’s existing handbook. Create your own unique work based on what you have learned in this course. 

There will be two (2) major sections of the handbook: Main Body and Policies.     
Section 1: Main Body  In four to six (4-6) pages total, develop the basic procedures and guidelines that the organization must address to properly secure its corporate network and information assets in the followings seven (7) items: 1.Network Architecture and Security Considerations 
2.Wireless Security 
3.Remote Access Security 
4.Laptop and Removable Media Security 
5.Vulnerability and Penetration Testing 
6.Physical Security 
7.Guidelines for Reviewing and Changing Policies 

Section 2: Policies  Develop the policies section of the handbook and include two to three (2-3) pages for each policy in which you define the policies used by the organization identifying the unique requirements of your industry. It must include, at a minimum, the following four (4) security policies: 
1.Acceptable Use Policy 
2.Password Policy 
3.Incident Response Policy 
4.User Awareness and Training Policy To organize your policies and to give your policies structure, 
follow this sequential format: 
1.Policy Statement 
2.Purpose 
3.Objectives 
4.Standards 
5.Procedures and Guidelines 
6.Responsibilities 
7.Review and Change Management 

•Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: 
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. 
•Include a cover page containing the title of the assignment, the title of the company and industry, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are: 
•Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity. 
•Explain the process of developing and implementing an enterprise-wide information security policy. 
•Summarize the methods and practices related to perimeter security. 
•Use technology and information resources to research issues in security assessment and solutions. 
•Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.

Assignment 4: Recruit Requirements   Due Week 9 and worth 100 points     Write a

Assignment 4: Recruit Requirements   Due Week 9 and worth 100 points    
Write a three to four (3-4) page paper in which you: 
1.Describe the requirements for a recruit based on your state police as well as your local law enforcement agency. 
2.Contrast the recruitment requirements between your state police and local law enforcement agency and rationalize the additional requirements at the state level. 
3.Evaluate the positions to determine which is a more challenging career and which you would prefer. Explain your decisions. 
4.Give one (1) suggestion of a new requirement that is not currently included in the recruitment requirements for both your state police and local law enforcement agency. 
5.Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements: 
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. 
•Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are: 
•Explain the process of developing and implementing an enterprise-wide information security policy. 
•Summarize the human resource activities involved in security services. 
•Use technology and information resources to research issues in security assessment and solutions. 
•Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.

 Once a breach has occurred, it’s very important to know about it. Not only does

 Once a breach has occurred, it’s very important to know about it. Not only does a company need to know that it occurred, but it also needs to know the scope of the damage. Was data stolen? Were files damaged? Was a back door installed that will facilitate future breaches? This is the forensic part of information security. Describe one of the topics from this week that you think would make a good episode of a crime drama like CSI. How would the main character go about solving the crime and identifying the perpetrator using the tools you’ve learned about? Have fun throwing in plot twists on your classmates’ posts.

   Mush be original and due 11/23/17 at 8pm Eastern Time USA. AT least 250 words

  
Mush be original and due 11/23/17 at 8pm Eastern Time USA. AT least 250 words . Please follow instructions bellow.
The Center for Project Management in San Ramon, California, examined 24 IT projects and compiled a list of ten dumb mistakes. The center then presented this list to 50 conference attendees and asked them to grade their organization on each mistake. The average grade was between a C+ and D. Here are the ten mistakes:
 1. Mistaking every half-baked idea for a viable project.
2. Overlooking stakeholders, forgetting the champions, and ignoring the nemesis.
3. Not assessing the project’s complexity.
4. Not developing a comprehensive project charter.
5. Not developing a comprehensive project plan.
6. Not designing a functional project organization.
7. Accepting or developing unrealistic or unachievable estimates.
8. Accepting status reports that contain mostly noise and not enough signal.
9. Looking back and not ahead.
10. Not following a robust project process architecture.
 Read the above list and find an example of a project for which this is the case. The project can be one that you have personal experience with or that you have read or heard about. Describe the example and state which of the mistakes was made with respect to the project. (Note that there may be more than one for a particular project.) If you choose a project in the news, provide a citation so that your classmates can read more about it. Minimum length of response is 250 words. 

Due Week 8 and worth 120 points In this very competitive climate, many companies

Due Week 8 and worth 120 points
In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points to attract and retain customers. 
Review this Article titled “Delta Named Top Tech-Friendly U.S. Airline”, located here. 
Use Internet or Strayer Library to search articles on wireless and mobile technologies as well as the application in business. Select one (1) company other than Delta which uses mobile and wireless technology.
Write a four to six (4-6) page paper in which you:

Define wireless technologies and mobile technologies. Next, determine at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency. 
Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response. 
Specify the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Next, evaluate the level of efficiency of such implementation within the selected company. Provide rationale for your response.
Give your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Justify your response.
Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response. 
Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. 

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the use of network management, Web, wireless, and mobility technologies.
Compare and contrast operational and enterprise systems.
Use technology and information resources to research issues in information systems and technology. 
Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Points: 120
Case Study 2: Wireless and Mobile Technologies
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Define wireless technologies and mobile technologies. Next, determine at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency.
Weight: 15%
Did not submit or incompletely defined wireless technologies and mobile technologies. Did not submit or incompletely determined at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency.
Partially defined wireless technologies and mobile technologies. Partially determined at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency.
Satisfactorilydefined wireless technologies and mobile technologies. Satisfactorily determined at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency.
Thoroughly defined wireless technologies and mobile technologies. Thoroughly determined at least three (3) ways which companies or organizations utilize such technologies to improve business efficiency.
2. Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response.
Weight: 20%
Did not submit or incompletelydetermined the wireless technologies and mobile technologies that Delta has implemented. Did not submit or incompletelyevaluated the level of efficiency of the technology implementation. Did not submit or incompletelyprovided a rationale for your response.
Partially determined the wireless technologies and mobile technologies that Delta has implemented. Partially evaluated the level of efficiency of the technology implementation. Partially provided a rationale for your response.
Satisfactorily determined the wireless technologies and mobile technologies that Delta has implemented. Satisfactorily evaluated the level of efficiency of the technology implementation. Satisfactorily provided a rationale for your response.
Thoroughlydetermined the wireless technologies and mobile technologies that Delta has implemented. Thoroughlyevaluated the level of efficiency of the technology implementation. Thoroughlyprovided a rationale for your response.
3. Specify the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Next, evaluate the level of efficiency of such implementation within the selected company. Provide rationale for your response.
Weight: 20%
Did not submit or incompletely specified the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Did not submit or incompletely evaluated the level of efficiency of such implementation within the selected company. Did not submit or incompletely provided rationale for your response.
Partially specified the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Partially evaluated the level of efficiency of such implementation within the selected company. Partially provided rationale for your response.
Satisfactorilyspecified the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Satisfactorilyevaluated the level of efficiency of such implementation within the selected company. Satisfactorilyprovided rationale for your response.
Thoroughly specified the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Thoroughly evaluated the level of efficiency of such implementation within the selected company. Thoroughly provided rationale for your response.
4. Give your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Justify your response.
Weight: 15%
Did not submit or incompletely gave your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Did not submit or incompletely justified your response.
Partially gave your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Partially justified your response.
Satisfactorily gave your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Satisfactorily justified your response.
Thoroughly gave your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Thoroughly justified your response.
5. Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.
Weight: 15%
Did not submit or incompletely determined the operational and enterprise systems that support wireless and mobile technologies for each company. Did not submit or incompletely provided a rationale for your response.
Partially determined the operational and enterprise systems that support wireless and mobile technologies for each company. Partially provided a rationale for your response.
Satisfactorily determined the operational and enterprise systems that support wireless and mobile technologies for each company. Satisfactorily provided a rationale for your response.
Thoroughly determined the operational and enterprise systems that support wireless and mobile technologies for each company. Thoroughly provided a rationale for your response.
6. 3 references
Weight: 5%
No references provided.
Does not meet the required number of references; some or all references poor quality choices.
Meets number of required references; all references high quality choices.
Exceeds number of required references; all references high quality choices.
7. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present

  Mary Smith, a former student at the local college, has been expanding her onli

 
Mary Smith, a former student at the local college, has been expanding her online business, Mary’s MediBracelets, in the local college’s incubator.
Mary has determined that her product, a specialized medical ID bracelet, is nearly ready to be sold and she needs someone to set up her initial website and business systems. Mary wants to include a charitable component to her business and is considering using a sales model in which her business will provide one free bracelet to a low-income senior citizen for every bracelet purchased.
Mary has hired your small business, IT Business Services Consultants, to develop her website and business systems.
Write a 2- to 3-page report for the client including the following:

A description of the relationship between business processes and information systems
A flowchart for handling an online order
Areas for Information Systems (IS) use and security concerns
A list of areas of concern for ethical handling of customers’ private information