IT-603-683-NETWORK AND SECURITY AND MIT CAPSTONE

Question : 1 discussion question response should be at least 200 Words, with another 50 words per reply. 

Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability.  It is a threat to any Internet-connected device.  

What are the types of Malware being used today (Name two), and explain in your own words what they do. 

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Preview the document

Supplemental Material:

-Malicious Code Definition (veracode).  .  

-Malicious Code.   

-Networks & Telecommunications Differences.   

-Networking Example.   

-What is Networking (ibm).   

Question 2 : Describe your recommendations on the need for network changes and additional security precautions for the client due to the newly planned data analytics (DA) function.

Download this MS-Word document. Edit it. Select your options.  Add the expected text and diagrams. Upload it back here by the deadline.

Describe YOUR RECOMMENDATED PLAN for your client regarding his/her network and security

precautions for the creation of the new data analytics (DA) system.
1. The name of your client company is: ___________________________
2. The type of industry your client is in ___________________________
3. Database Recommendations (Click your recommendations)
? Know existing network
?Before network diagram
? Know recommended network
? LAN
? WAN
? Firewall
?DMZ
?ISP (name)________
?Current Internet Speed _______
?Proposed Internet Speed _______
? VPN (name) _________
?Screened Subnet
?Other network scheme (name) _______
?Leased Line (speed)__________
?After network diagram
?VPN (product name) _______
?Change to Virus-scan? (name)______
?Need to add PKI scheme?
?Need addn’l encryption (name)________
?Other security measures
?Have data security classification
?Have recommended data governance
?Need addn’l firewalls
?Need guards
?Need locked parking lot
?Need enhanced access control
?Need biometric lock protection
?Need addn’l security precautions
4. Add 1-2 paragraphs below describing why you make the above Networking and Security
recommendations for the data analytics (DA) 

5.systemShow your Before/After network diagrams here.

Question 3 :  discuss your planned Recommendations to you Client

Regarding the company you are writing about in your project (your client) – what issues will your client have to deal to support this new DA function in regard to the: 

Network – features?  speed? 

BIG DATA – quantity? locations? formats? 

Database/Data Warehouse.

What is the name of application software for analytics you are recommending?   Where is it (cloud, on-site?)   Is it in the cloud with your data or is it in the data center with your data – or is there some other kind of arrangement. 

Note you are not redesigning the client’s entire network – you are only advising the client on what NEW things he/she will have to arran ge.

The answers to all of this will vary according to your different company designs so you’re going to need to start your answers by saying something like “My customers will get monthly reports …” or maybe “The data I am collecting happens in real time….”.]

The Purpose of All This ? : Consider this to be some FREE CONSULTING.  You classmates will look at what you are recommending an offer opinions and/or advice about your recommendations.

IT-603-683-NETWORK AND SECURITY AND MIT CAPSTONE

We offer the best custom writing paper services. We have answered this question before and we can also do it for you.

GET STARTED TODAY AND GET A 20% DISCOUNT coupon code DISC20

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.