Cloud Based Data Storage Solution For Your Company

create a post where you assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.

Initial posts should be a minimum of 400 words that cites sources and follows APA formatting.

Notes:

APA writing, you want to focus on creating paragraph narratives. Since paragraphs are 3-5 sentences, your layout doesn’t work. Instead, try talking about each cloud service type, and then its characteristics, advantages, applications and so forth.

Do not use bolded text within your paragraphs.  Use headings to separate ideas. Be sure to properly format and align your headings –  https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_headings_and_seriation.html

this = these

Week 2 Disaster Disscusion

Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan.

must contain a properly formatted in-text citation and scholarly reference.

Cyber Security Planning

Please read the following link and summarize the reading in your own words. EXAMPLE attached to show you the format requirements. 

   

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

Eh 1 19483529

Review the BELOW LINK ARTICLES and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Discussion Questions Case Study 19759093

Read the mini-case, Project Management at MM (pp. 324-327).  Submit a Word document with answers to questions one and three on page 327. Your answer to question one should be about one page long. Your answer to question three should be about two pages long.

Discussion Questions:

1. Some organizational factors increase a project’s likelihood of success. Identify these 

“facilitators” for the Green project.(1 complete page)

3. Outline the things that McCann needs to do right away(2 complete pages)

3 complete pages with strictly zero plagarism

Use APA level one headings to separate your answers to each question.

Have two scholarly sources, not including our textbook.

Article On Serverless Computing

Need a 15 page APA research article on Serverless Computing. The article should strictly follow the below rules. The attached document has details on the formate

1) A minimum of five (5) peer-reviewed journal citations is required.

2) Chapter 1 illustrates the document details of the research report [Review the Final Exam Research Report Guide (Research Report Help section)] and constitutes Background/Introduction, Problem Statement(s), Goal(s), Research Question(s), Relevance and Significance, Barriers and Issues related to topic chosen. Chapter 2 should consist of student paraphrasing the cited research material (i.e. what happened in case study x). Chapter 3 should be the reasoning for doing a basic compare/contrast or advantages/disadvantage of what was stated in Chapter 2 (do not state because the professor said so). Chapter 4 is a complete analysis, synthesis, and evaluation of what was stated in chapter 2. In effect, chapter 3 is a statement of what will be done and chapter 4 is what was done and what the findings were. Again, thus far the writing is objective and must not contain student opinion. Chapter 5 states results, conclusion, and future work recommendations. Here is where student opinion (or any researcher) can state their respective opinion as the student has now “done the work” and are justified in stating results.  Graduate student ar

Python Application Project

  

This exercise (50 points) uses the AWS Cloud9 environment develop and fully test a set of tools and Web Forms to perform the following functionality: 

a. Password Login form – This Python form allows a user to login to a simple web application with a username and password. A file can be used to store the username and password for validated users for this activity. No additional Web application functionality is needed after successful login other than a Greeting of your choice and the ability to update the password in a form. 

b. Password update Form – This Python form allows a user to update a user’s password after they have successfully logged in. 

c. Authentication functions – These Python functions that will check the following NIST SP 800-63B criteria are met upon login or upon password update:   SHALL be at least 8 characters in length 

• SHOULD be no more than 64 characters in length 

• SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised (Provided as CommonPasswords.txt) 

• If the chosen secret is found in the list, the application SHALL advise the subscriber that they need to select a different secret, SHALL provide the reason for rejection, and SHALL require the subscriber to choose a different value 

• SHALL implement a time-based rate-limiting mechanism that effectively limits the number of failed authentication attempts that can be made on the subscriber’s account. For this exercise throttling should start after 15 attempts. 

• When the subscriber successfully authenticates, the verifier SHOULD disregard any previous failed attempts for that user from the same IP address 

d. Logger – Create a log to log all failed login attempts. The Log should include date, time and IP address. 

e. Log Analyzer – Create a Python log analyzer application that reads the log file created in part d to identify and geo-locate all IP addresses where more than 10 failed attempts in a period of less than 5 minutes. The geolocation should include the Lat/Long value provide from the IP Address location. 

A sample report might look like this: 

100.16.4.23 had 12 failed login attempts in a 5 minute period on Jul 7, 2019. 

100.16.4.23 has a Lat/Long of 41.2908816/-73.610759. 

Hints:

  

1. Leverage the File I/O, Flask and Data structures work previously performed in the class. 

2. Use functions to enhance code reuse and modularity. 

3. Use the AWS Cloud9 IDE. 

4. Use Python Lists or other data structures to store the Common Passwords and then appropriate search functions to expedite comparisons. 

5. You can use “request.environ[‘REMOTE_ADDR’]” to obtain the client IP address. You will need to import the request package: “from flask import request”. 

6. You will need to load the ip2geotools Python module to perform the GeoLocation (sudo python3 -m pip install ip2geotools). You will need to import the IpCity Package (from 

ip2geotools.databases.noncommercial import DbIpCity). See the ip2geotools for additional method and objects available. 

Discuss 19561595

The decision to adopt or bypass a technology can give a company a tremendous competitive advantage or remove a company from the market completely.   Using the 3 paragraph structure described in the announcements, please research and explain  

In your own words, no quotations allowed this week.

Choice ONE Technology, that YOU predict will have a major impact on the way work is done?  write one paragraph describing the technology, one paragraph on What you see as possible negatives to this technology  and one paragraph on a positive aspect.

This is your format. Deviations from this format will result in a failing grade and additional scrutiny for plagiarism.

Project Management Critical Success Factor

Topic: Procurement

Note: try to find the critical success factor in project management procurement and give a real time day-to-day example.

should contain 350 words.if possible please include supportive content like tables, charts.

please add at least 2 references ( 1 peer review journal reference and 1 regular sources references)

Oragan Case 2

 Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format.