What is network optimization and what are some of the best practices that are us

What is network optimization and what are some of the best practices that are us

What is network optimization and what are some of the best practices that are used in the industry to optimize networks?
Also, why is network documentation important and what are the security pitfalls that can arise from poor and/or lack of network documentation?

Title: Edge computing: A paradigm shift in Data Dynamics subtitle: Investigating

Title: Edge computing: A paradigm shift in
Data Dynamics
subtitle:
Investigating

Title: Edge computing: A paradigm shift in
Data Dynamics
subtitle:
Investigating the impact of Edge computing on Network
architecture and security

I got this feedback from the professor and I need a modification that tackles all of this points, for sure you can change the references if needed : Much of this report is well written, but most of it is simply description. This report defies the instruction given in the introductory lecture and on Moodle. For that reason alone, it is destined to gain an E at best.
The discussion simply continues the results, as does the conclusion.
The research questions do not encourage analysis: only description. How are you going to create a discussion or demonstrate critical thinking?
There is not a great deal of unity or coherence in that facts are not linked in a cohesive way to show that there is a red thread that runs through the report. It is almost as if you have chosen to ignore the contents of the lectures.
Therefore, there is a lack of argument and reasoning and there is no critical thinking at all. This must be introduced into the final submission.
I will attach a pdf of a research paper that got an A grade the topic of the paper is zero trust security, you can take a look at it as a reference.
The report should follow this requirements:
The text is academic and therefore must follow the academic style regarding language use. The citations and referencing should utilise the IEEE system. You should write a maximum of 10 A4 pages including title page, abstract, table of contents and references. The report should be aimed at a potential reader who is your peer in terms of educational level, but who does not have specialist knowledge in your chosen subject. Note:
a) The report should pose research questions. These will then be answered, discussed and a conclusion given
b) The report is therefore NOT *write all you know about’ and you are not to present a mass of facts and figures that are not discussed.
c) Likewise, all assertions must be proven and referenced as evidence of research.
d) All reports are monitored electronically for plagiarism. The penalties for copy and pasting from external sources or previous student papers are severe.

1.1: Describe 2 storage techniques and compare their uses, strengths and limitat

1.1: Describe 2 storage techniques and compare their uses, strengths and limitat

1.1: Describe 2 storage techniques and compare their uses, strengths and limitations. What is the software you would suggest to protect the stored data in the above mentioned storage techniques. Briefly list down their pros and cons. (1.1)
1.2: Identify a trending industry and explain how Artificial Intelligence (AI) can be used to optimize its operations (1.2)
1.3: Assuming you want to implement the above solution to your company create a requirement specification to submit to the
vendor (1.3)
1.4: Create wireframes for the above proposed solution, covering your requirement specification given in question 1.3. (1.4)

No length requirements submission just has to answer all requirements below. SC

No length requirements submission just has to answer all requirements below.
SC

No length requirements submission just has to answer all requirements below.
SCENARIO
Review the attached “TechFite Case Study” for information on the company being investigated. You should base your responses on this scenario.
REQUIREMENTS
No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Demonstrate your knowledge of application of the law by doing the following:
1. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study.
2. Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.
3. Discuss two instances in which duty of due care was lacking.
4. Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.

B. Discuss legal theories by doing the following:
1. Explain how evidence in the case study supports claims of alleged criminal activity in TechFite.
a. Identify who committed the alleged criminal acts and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity.
2. Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite.
a. Identify who was negligent and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices.

C. Prepare a summary (suggested length of 1–2 paragraphs) directed to senior management that states the status of TechFite’s legal compliance.

D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

E. Demonstrate professional communication in the content and presentation of your submission.

Discuss the advantages and disadvantages using PKI and Encryption and provide at

Discuss the advantages and disadvantages using PKI and Encryption and provide at

Discuss the advantages and disadvantages using PKI and Encryption and provide at least one practical example in which this technology should and should not be used. Support your thoughts with the text or other reputable source.

Hi thank you. This assignment has several parts roughly 500 words but does have

Hi thank you. This assignment has several parts roughly 500 words but does have

Hi thank you. This assignment has several parts roughly 500 words but does have use Visio for decision diagrams. I am more than capable of doing the visio my self but would be nice for a rough outline

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 references in the section at the end. Use the instructions below: ###Instructions:### Ethical Decision-Making Going back to the opening case of this chapter, let’s assume that Iris had just finished her search for a new job and knew that she would soon leave the company. When Linda came in to talk about the tedious and time-consuming review process, let’s assume that Iris had put Linda off and asked her to schedule another meeting “in 2 or 3 weeks,” knowing full well that she would be gone by then. Do you think this kind of action would be unethical if Iris knew she was leaving soon?

Methods for Reconnaissance and Social Engineering I will add the screenshots in

Methods for Reconnaissance and Social Engineering
I will add the screenshots in

Methods for Reconnaissance and Social Engineering
I will add the screenshots in part 2 and answer any questions related to the lab assignmnets
Part one:
Write 1–2 pages on the following: Identify the technologies and tactics that a small organization can employ to prevent DOS and DDOS attacks.
Please answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
Describe the different capabilities of Low Orbit Ion Cannon. Search and identify at least one other product that allows you to conduct denial of service attacks, and identify two differences between the products. Provide appropriate citations.
In this lab you performed TCP, UDP, and HTTP flood attacks. Research and describe three different ways that an organization can prepare against denial of service attacks. Describe how the defense strategies against denial of service attacks differ based on the types of attacks. Provide appropriate citations.
While using tcpdump in step 9 of the lab, search and identify what –nntttt, -s 0 and –w options are supposed to do.
What steps should an organization take when it is actively under a DDOS attack? Provide appropriate citations.
Review the sources below and write out five questions that you would need to answer in your pen test plan.
Korpela, K., & Weatherhead, P. (2016). Planning for Information Security Testing—A Practical Approach. ISACA Journal, 5, 1-10. Retrieved from https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-information-security-testinga-practical-approach
Pentest Standard: Pre-engagement. (n.d.). Retrieved from http://www.pentest-standard.org/index.php/Pre-engagement
Part 2:
Write an additional 1–2 pages on the following: How can a large global organization protect themselves against passive Reconnaissance attacks?
Section 2
Answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
What is the purpose of banner grabbing? Identify two tools/methods/commands to perform banner grabbing in addition to Nmap, Zenmap, netcat and telnet, which you used in the lab. Provide an example of one of them.
When would you use the Nmap scriipting engine? Describe a commonly used scriipt and give an example of its use syntax.
Why are there timing and performance options in Nmap? When would you perform a paranoid scan? Give an example of an Nmap scriipt that performs the paranoid scan.
Why would you use a wordlist with John the Ripper? Give an example of the syntax of John the Ripper with a wordlist.
Identify how you arrived at the conclusion that the firewall is redirecting to both the Windows®and Linux® machines in the lab. Provide screenshots from your Nmap scans to support your argument.
Requirements
Place your work from Part 1 and Part 2 into a Microsoft® Word® document. Support any assertions made with credible sources using APA style formatting.

Hello I would like you to please do my computer assignment please, thank you so

Hello I would like you to please do my computer assignment please, thank you so

Hello I would like you to please do my computer assignment please, thank you so much and if you need anything feel free to let me know, but i only have one problem with the payment because i have to pay with words and I don’t know how much i need to add so if you would like me to add more please tell me.

For this class I am supposed to complete labs but some of them just are experien

For this class I am supposed to complete labs but some of them just are experien

For this class I am supposed to complete labs but some of them just are experiencing issues, The professor said it was okay to forgo the labs and work on the assignments. With that being said it is your choice on what vulnerabilities to write about :
Lesson 1.1: Conducting Vulnerability Scans
Lesson 1.2: Consulting a Vulnerability Database
Lesson 1.3: Scanning Vulnerabilities Using Microsoft Baseline Security Analyzer
Using your lab results and the Common Vulnerability Scoring System (CVSS), analyze a minimum of three vulnerabilities you found in the labs and identify system components responsible for each vulnerability as well as the root cause of the vulnerability. An example would be discovering that the root cause of a vulnerability is an outdated version of an open-source library. This would then provide you with the remediation strategy, which would involve upgrading the library.
Be sure to note the exploitability, the relative impact on the organization, and the scope of the vulnerability. A generic example template for a vulnerability assessment (VA) is provided in Course Resources, or you can use a Word® table. As part of your analysis, include descriiptions of the vulnerabilities, how each of the vulnerabilities relates to risk for the organization, and how each vulnerability can be mitigated.
Part 1 Requirements
Your assessment should:
Be a minimum of 2–3 pages in length (excluding title and reference pages). If you require more pages to thoroughly discuss the identified vulnerabilities, then include them.
Include an analysis that provides a detailed descriiption and assessment of a minimum of three vulnerabilities identified. Be sure to discuss root causes, the potential impacts on the organization, and mitigation strategies for each vulnerability.
Follow APA style format to reference any sources you consult and include in-text citations and a reference page. For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.
Contain no spelling or grammar errors.
Lesson 2.2: Using Social Engineering Techniques to Plan an Attack
Lesson 2.3: Demonstrating Network Mapping and Quarantining a Vulnerable System
Lesson 2.4: Identifying a Suspicious Account on the System User Groups
Analyze a minimum of three social engineering techniques. Feel free to include more techniques in your analysis, but three should be the minimum. Be sure to note the exploitability, the relative impact on the organization, and the scope of the attack. As part of your social engineering analysis, provide descriiptions of the social engineering techniques, including how each of the techniques relates to risk for the organization and how each technique can be mitigated.
An example of a social engineering technique would be a user receiving a phishing email purporting to be from the IRS giving the status of their tax refund with a link that downloads ransomware. The related remediation strategy might involve a combination of user training and restoring a recent backup image of the affected system.
Part 2 Requirements
Your assessment should:
Be a minimum of 2–3 pages in length (excluding title and reference pages). If you require more pages to thoroughly discuss the identified vulnerabilities, then include them.
Include an analysis that provides a detailed descriiption and assessment of a minimum of three vulnerabilities identified. Be sure to discuss root causes, the potential impacts on the organization, and mitigation strategies for each vulnerability.
Follow APA style format to reference any sources you consult and include in-text citations and a reference page. For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.
Contain no spelling or grammar errors.