CYB 220 Project Two Guidelines and Rubric Overview One of the projects for this

CYB 220 Project Two Guidelines and Rubric
Overview
One of the projects for this

CYB 220 Project Two Guidelines and Rubric
Overview
One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security manager.
The project leverages the skills that you have built in Module Four. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe the fundamental principles and practices of network traffic flow policy and enforcement
Scenario
As a security analyst, you are tasked with creating a network segmentation strategy for your IT security manager. This includes configuration tasks in a network as well as a written rationale of the network segmentation strategy.
Your instructor will post a real-world scenario that includes the minimum specifications on which your work will be based (SCENARIO ATTACHED BELOW). You will also be provided with a Packet Tracer native file (.pkt) that you will import into the Packet Tracer application to use as the base diagram for your network. You will use the scenario and the provided Packet Tracer lab environment to do your work.
Prompt
You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Network Segmentation Strategy
ConfigurationConfigure the host-based firewall policy to meet project specifications. Provide a screenshot of the configured policy.
Configure the FTP server to meet project specifications for access control. Provide a screenshot of the configured FTP server.
Configure the network-based firewall policyto meet project specifications for the extended access control list. Provide a screenshot of the configured policy.
RationaleDescribe how network segmentation is achieved after meeting the configuration requirements for the host-based firewall.
Describe how the concept of least privilege is achieved in the configuration of the FTP server.
Describe an approach of employing a network-based firewall to achieve network isolation to meet project specifications.
What to Submit
Your submission should be 1 to 2 pages in length (not including screenshots) and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Project Two Rubric
CriteriaExemplaryProficientNeeds ImprovementNot EvidentValue
Configuration: Host-Based Firewall PolicyN/AConfigures the host-based firewall policy to meet project specifications and provides a screenshot of the configured policy (100%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Configuration: FTP ServerN/AConfigures the FTP server to meet project specifications for access control and provides a screenshot of the configured FTP server (100%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Configuration: Network-Based Firewall PolicyN/AConfigures the network-based firewall policy to meet project specifications for the extended access control list and provides a screenshot of the configured policy (100%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Rationale: SegmentationMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Describes how network segmentation is achieved after meeting the configuration requirements for the host-based firewall (85%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Rationale: Least PrivilegeMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Describes how the concept of least privilege is achieved in configuration of the FTP server (85%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Rationale: IsolationMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Describes an approach of employing a network-based firewall to achieve network isolation to meet project specifications (85%)Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail (55%)Does not address critical element, or response is irrelevant (0%)16
Articulation of ResponseSubmission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format (100%)Submission has no major errors related to grammar, spelling, or organization (85%)Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas (55%)Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas (0%)4
Total: 100%

Submit a 1-page document explaining methodologies, procedures, or algorithms use

Submit a 1-page document explaining methodologies, procedures, or algorithms use

Submit a 1-page document explaining methodologies, procedures, or algorithms used for the project:
Which improvement in methodologies, procedures, or algorithms you contributed relative to the methodologies, procedures, or algorithms used in the references, or if you use novel data to analyze, how does your work contribute to the new knowledge?
Explain a novel qualitative contribution of your project to the topic.
Define quantitative research goals that help the understanding of the problem solutions.

you have to have virtual machine installed and SEEDUbuntu16.04 dont copy and pas

you have to have virtual machine installed and SEEDUbuntu16.04 dont copy and pas

you have to have virtual machine installed and SEEDUbuntu16.04 dont copy and paste from online, you must to do your own it will check by turnitin and even not use Ai plagiarism, so try to not use them and after that send me the turnitin report with it too

PROJECT STEPS City Tours Ltd. is a company that provides tours in a city that a

PROJECT STEPS
City Tours Ltd. is a company that provides tours in a city that a

PROJECT STEPS
City Tours Ltd. is a company that provides tours in a city that attracts tourists from around the country. As a customer service manager for the company, you need to be able to modify tables and create multiple-table forms.

Open the Customers table in Design View. Use the Input Mask Wizard to create an input mask for the Mobile field. Store the data without symbols in the mask. Save the change to the Customers table without closing it.
Switch the Customers table to Datasheet View, and then add a new field named CustomerNotes at the end of the table. Use Long Text as the data type for the field. Save the change to the table.
With the Customers table still open in Datasheet View, update the record for customer Martha Bers (who has the CustomerID 10010) by completing the following tasks:

Using the input mask, enter 585-555-0111 in the Mobile field.
Enter the text Free tour winner in the CustomerNotes field.

Close the table.
Open the Tours table in Design View, and then add a new field with the name TourDetails following the DiscountedCost field. Use Attachment as the data type for the field, and use Description as the caption property for the field. Save the change to the table, and then close the table.
Modify the Confirmation Update Form by completing these tasks:

Open the Confirmation Update Form in Design View.
Open the field list for the form.
Add the TourNumber field to the form directly above the TourDate label and text box. The left edge of the TourNumber text box is at the 4″ mark on the horizontal ruler and the top of the label and control are at the 1″ mark on the vertical ruler.

Save the changes to the form, confirm that it matches Figure 1, and close the Confirmation Update Form.
Select the Guides table, and create a new form in Design View. Update the form by completing these tasks:

Add the GuideID, LastName, FirstName, Phone, StartDate, and HourlyRate fields from the Guides table to the Detail section of the form. The left edges of the controls are at the 3″ mark on the horizontal ruler. The controls are separated vertically by approximately 0.1″. If necessary, reposition the controls and their labels after adding them to the form.
Save the form with the name Guide Data Entry Form but do not close the form.
Add a title to the form. The title of the form should match the name of the form.

Save the form, confirm that it matches Figure 2, and then close the Guide Data Entry Form.
Open the Confirmation Master Form in Design View, and ensure that the Use Control Wizards button is selected. Then, use the Subform/Subreport Wizard to add a subform with the following options:

Use the Customers table for the subform.
Select the CustomerID, LastName, FirstName, and Mobile fields from the Customers table to add to the form.
Accept the default link (Show Customers for each record in using CustomerID to link the main form to the subform).
Save the subform as Customers subform (which is the default name).
If necessary, reposition the subform so that the top-left edge of the subform control is at the 2.5″ mark on the vertical ruler and the .5″ mark on the horizontal ruler. The bottom-right edge of the subform control is at the 4″ mark on the vertical ruler and the 6″ mark on the horizontal ruler.

Save the form, confirm that it matches Figure 3, and then close it.
Open the Confirmation-Tour Form in Design View, and then modify it by resizing the width of the subform so that the right edge is at approximately 6.5″ on the horizontal ruler. Confirm that the form matches Figure 4, and then save but do not close it.
With the Confirmation-Tour Form still open in Design View, modify the form title by completing the following tasks:

Change the font color of the title to Red (2nd column, 7th row of the Standard Colors palette.)
Change the font size of the title text to 22 point.
Apply the Chiseled special effect to the title.

Save the form, confirm that it matches Figure 4, and then close it.
Open the Segway Tours Form in Design View, and then modify the form by completing the following tasks:

Delete the ChildCost control and accompanying label.
Change the label for the AdultCost control using Price as the new label name.

Save and close the form.
Open the Driving Tour-Customer Form in Design View, and then modify the form to match Figure 5 by completing the following tasks:

Select the CustomerID, FirstName, LastName, State, and Mobile controls and labels simultaneously.
Adjust the spacing of these controls to have equal vertical spacing.

Save but do not close the form.
With the Driving Tour-Customer Form still open in Design View, change the tab order so that users tab to the TourNumber field immediately after the ConfirmationID field. Save and close the form.
Open the Basic Confirmations Form in Design View, and then change the background color of the form to Light Gray 2 (1st column, 3rd row of the Standard Colors palette). Save the form but do not close it.
With the Basic Confirmations Form still open in Design View, modify the form by performing the following tasks:

Select the ConfirmationID label, ConfirmationID control, CustomerID label, and CustomerID control simultaneously. Align the controls to the top.
Select the LastName control and the FirstName control simultaneously. Do not select any labels, and make sure the TotalTourCost control is not selected. Align the controls to the left.

Save but do not close the form.
With the Basic Confirmations Form still open in Design View, add a title to the form using Basic Confirmations Form as the name. (Hint: This is the default name.) Save but do not close the form.
With the Basic Confirmations Form still open in Design View, change the Tab Stop property to No for the TotalTourCost control. Save the form, confirm that it matches Figure 6, and close the Basic Confirmations Form.
Open the Guides Special Skills Query in Design View, and then modify the query to find all guides hired after 1/1/2017 who have Spanish skills. (Hint: The SpecialSkills field has the Long Text data type.) The query should return one record. Run the query, and then save and close it.
Figure 1: Confirmation Update Form—Design View
Figure 2: Guide Data Entry Form—Design View
Figure 3: Confirmation Master Form—Design View
Figure 4: Confirmation-Tour Form—Design View
Figure 5: Driving Tour-Customer Form—Design View
Figure 6: Basic Confirmations Form—Design View
Save and close any open objects in your database. Compact and repair your database, close it, and then exit Access. Follow the directions on the website to submit your completed project.

INTEGRATION OF ARTIFICIAL INTELLIGENCE AND PROJECT MANAGEMENT: FUTURE TRENDS AND

INTEGRATION OF ARTIFICIAL INTELLIGENCE AND PROJECT MANAGEMENT: FUTURE TRENDS AND

INTEGRATION OF ARTIFICIAL INTELLIGENCE AND PROJECT MANAGEMENT: FUTURE TRENDS AND IMPLICATIONS
Explore the potential impact of artificial intelligence on the field of project management. Discuss emerging trends,
challenges, and opportunities in integrating AI tools into project management processes.
Conduct the project work for the systems in coordination with the Software Development Life Cycle (SDLC)
Prepare a report and presentation for the senior management based on your assessment study.
Format: Microsoft Word or compatible
▪ Font: Times New Roman, 12-point, double-space
▪ Citation Style: IEEE
Provide grapghs when needed for the report.

This assignment aims to explore the integration of sustainability principles int

This assignment aims to explore the integration of sustainability principles int

This assignment aims to explore the integration of sustainability principles into project management practices.
Students are expected to assess the role of project managers in promoting sustainability, analyze the challenges faced,
and propose strategies for incorporating sustainability into the project life cycle.
Analyze the systems in coordination with the Software Development Life Cycle (SDLC) and software development
methodologies.
Prepare a report for the senior management based on your assessment study.
Citation Style: IEEE

This assignment has two parts #1APA Cite: Goleman, D. (2014). Leadership That G

This assignment has two parts
#1APA Cite:
Goleman, D. (2014). Leadership That G

This assignment has two parts
#1APA Cite:
Goleman, D. (2014). Leadership That Gets Results. In D. Goleman (Ed.), What Makes a Leader: Why Emotional Intelligence Matters. (Vol. 1., pp. 34-68). Florence, MA: Key Step Media.

Read: Chapter 1 “What Makes a Leader?” Read the 2013 postscripts also.
Page one (1): Prepare one (1) page of typed single spaced notes, in your own words, for the article.
Page two (2): Prepare five (5) questions to prompt discussions. Do not prepare questions that ask for restating material from the article.
Put the APA cite, given above, in the document footer (use the footer function in Word). Use a small text size so that it will fit in 1 or 2 lines.
Do not copy and paste from the book.
Use Calibri 12. Put direct quotes in “ “. Use direct quotes sparingly
#2
APA Cite:
Goleman, D. (2014). Leadership That Gets Results. In D. Goleman (Ed.), What Makes a Leader: Why Emotional Intelligence Matters. (Vol. 1., pp. 34-68). Florence, MA: Key Step Media.
Read: Chapter 2 “Leadership That Gets Results.” Read the 2013 postscripts also.
1. Page one (1): Prepare one (1) page of typed single spaced notes, in your own words, for the article.
2. Page two (2): Prepare five (5) questions to prompt discussions. Do not prepare questions that ask for restating material from the article.
3. Put the APA cite, given above, in the document footer (use the footer function in Word). Use a small text size so that it will fit in 1 or 2 lines.
5. Do not copy and paste from the book.
6. Use Calibri 12. Put direct quotes in “ “. Use direct quotes sparingly.

Your discussion question response should be at least 200 Words, with another 50

Your discussion question response should be at least 200 Words, with another 50

Your discussion question response should be at least 200 Words, with another 50 words per reply.
An incident is an event that results in an actual or threatened violation of security policy. When an incident occurs, an organization needs to respond. The incident-handling process consists of the following steps: Preparation, Identification, Notification, Response, Recovery and follow-up, and Documentation.
If you were tasked with handling an incident, which step would need the most help with, and where would you get the help to do it right? Explain how you came up with your answer.
NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference
5)What ever written in questions i need like same answers No extra NO missing

Assignment Questions: 1. Question: Storage Hierarchy and Secondary Storage Devic

Assignment Questions:
1. Question: Storage Hierarchy and Secondary Storage Devic

Assignment Questions:
1. Question: Storage Hierarchy and Secondary Storage Devices
Explain the concept of storage hierarchy in computer systems, and describe the primary characteristics of secondary storage devices. Compare and contrast two different types of secondary storage devices in terms of their advantages, disadvantages, and typical use cases. Provide examples of situations where choosing the appropriate secondary storage device is crucial for optimizing data management in computing environments.
2. Question: Data Transfer Rate and Disk Access Times
Define data transfer rate and disk access times in the context of computer peripherals. Discuss the factors that influence these performance metrics for storage devices. How do the characteristics of storage devices impact the overall system performance? Illustrate with real-world examples, and explain the strategies that can be employed to improve data transfer rates and reduce disk access times for various applications.
3. Question: GPU Technology and Display Resolution
Explore the role of Graphical Processing Units (GPUs) in modern computing systems, especially in relation to display resolution and picture size. Describe how GPUs contribute to enhancing graphics performance and enabling high-quality visuals. Discuss the factors that affect display resolution and how it relates to the capabilities of GPUs. Highlight the importance of GPU technology in applications such as gaming, multimedia, and professional graphics work, and provide insights into the trends shaping GPU development.
NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference
5)What ever written in questions i need like same answers No extra NO missing