8 HOURS DELIVERY: PLAGIARISM FREE AND QUALITY WORK GUARANTEED.

For this assignment, you need to do the following: Search and submit reference d

For this assignment, you need to do the following:
Search and submit reference details for at least four scholarly resources on your language and topic
Your references should be in APA format
Design and submit a list of tentative interview questions that you would like to ask your relatives or other persons associated with your ancestral language
Plan ahead and submit a tentative list of family members you want to interview, as well as a tentative interview schedule
For additional information, review the assignment guidelines and requirements in your syllabus
Instructions: 
Use the Worksheet attached to the assignment. In Part I, create a reference list of at least four scholarly sources that you will use in your final project; references should follow APA format (7th edition). In Part II, include your tentative list of questions, relatives you would like to interview, and a tentative interview schedule.
Finding scholarly sources  
For this part of the final project, UMGC library databases, or Google Scholar to locate four scholarly or credible sources on your chosen topic.
What is a scholarly or credible source? You should rely on sources that have credibility. Appropriate sources are articles written by experts in the field, articles found in peer-reviewed journals, published documents from well-known research groups (e.g., Pew Research), and reports published by government agencies (e.g., NIH, CDC). Inappropriate sources would include popular websites (e.g., about.com, ehow.com, Wikipedia) or media outlets (e.g., Fox, MSNBC, Wall Street Journal, New York Times, Forbes, etc.). These sources do not always accurately report their findings and are sometimes prone to bias. If a website or article fails to report the credentials of the author(s) and does not include citations for the information contained in the article, chances are it is not a scholarly source and therefore should not be used. 
Submit a summary of each article using the attached worksheet. In your own words, identify the key findings of the article. Do not simply state what the article was about (e.g., “This article talks about cyberbullying”). What specific information did you learn from your source? (e.g., “Cyberbullying has become a popular means of abuse among teenagers, affecting about half of all young people.”) The purpose of the key findings section is to demonstrate that you have read and understood each of your sources. Your key findings should be 250 words in length. Do not simply copy and paste the abstract or any other part of your source! This is plagiarism and violates university policy. 
The purpose of this assignment is to 1) ensure that you are using appropriate, scholarly sources, and 2) to make sure you are on track for your final project. 

The organizational analysis will utilize a minimum of five external, peer-review

The organizational analysis will utilize a minimum of five external, peer-reviewed academic sources and contain the following sections:
Organizational Ethical Analysis
This is your introduction. Write 100-150 word introductions to ethical analysis here. 
What is the organization and how would you describe it?
Write 200-250 words minimum with 2-3 paragraphs. Describe your chosen organization, what type of product or service the organization offers. When it was formed and how the organization was started.  
Who are the leaders of the organization? Write 200-250 words minimum with 2-3 paragraphs. Describe leadership at your chosen organization. Address the leadership board or executives at the organization. Discuss the organizational structure and any information regarding change in leadership.  An organizational chart if available can be shown in this section. But you have to analysis the leadership and do not just list bulletins. 
Is the organization successful? Write 200-250 words minimum with 2-3 paragraphs. Describe and discuss if the organization is successful or not successful. Why makes this organization successful or not successful. Critical analysis and thinking from your own perceptive of the organization and its success or failure should be addressed in this section. 
How do you determine whether an organization is ethical or not? Write 200-250 words minimum with 2-3 paragraphs. From your own perspective and point of view discuss how to determine if the organization is ethical or not ethical. Discuss any unethical occurrences such as fraud and failure of leadership here. Use what you have learned so far in class to address how to determine if organization is ethical or not ethical. 
Based on your assessment and research, is the organization ethical? Write 200-250 words minimum with 2-3 paragraphs. Write your assessment if the chosen organization is ethical or not ethical? Use your research and analysis to answer this question. Why do you think that the actions outlined are considered as ethical or not ethical?  
What would you change about the organization to make it better, without sacrificing ethical standards?
Write 200-250 words minimum with 2-3 paragraphs. Address any organizational or leadership changes that you would recommend making the organization ethical or not ethical. Do you think that an ethics department or ethics manager might be needed to oversee ethics at the organization?  Address any and all changes that you think are needed to standardize ethics and enforce ethics at the organization.
Conclusion
Write 100-150 words minimum to summarize your paper and close this organizational ethical analysis.

Do research on one-or-two large software systems that were implemented successfu

Do research on one-or-two large software systems that were implemented successfully and on one-or-two large software systems that failed in their implementation. Write at least a 3-page Word document, double-spaced, detailing each system.
Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of the system, a section to discuss the D.-Development of the system, a section to discuss the I.- Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of the system (successful or failed). Provide the following: 
1. An Introduction paragraph describing the assignment and a short description of the systems selected. 2. A section that describes the first Software System (with an appropriate section Heading) and a description of that Software System to include: 
a. What is its purpose? 
b. What operations it performs? 
c. What are its inputs (resources, interfaces, when used)? 
d. What are its outputs (interfaces, data)? 
e. The system’s complexity/cost/feasibility. 
f. Any constraints or risks found during the research. 
3. Sections with details for each component of A.D.D.I.E. (with an appropriate section Heading) to include: 
a. Success or failures identified. 
b. Issues or findings identified. 
c. Recommendations or lessons learned. 
Your paper should then conclude with a Findings section the compares the two systems. Provide the following: 
1. What made one system successful but make the other system fail. 
2. What could have been done to make the failed system more successful. 
3. What could have been done to make the successful system even more successful. 
You must include at least 3 scholarly references with citations.  

12.  Propose and defend a topic for your final Text.  Write  450 words or more e

12. 
Propose and defend a topic for your final Text.  Write  450 words or more explaining why this topic is important for your peers to understand. Be focused and specific.  You should do a deep dive into a topic. Do not do a survey. 
Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 
Write in format not in bulleted, numbered or other list format.

Project: Methodology Development Analysis Assignment Instructions Overview This

Project: Methodology Development Analysis Assignment Instructions
Overview
This part of the project develops the methodology and begins analysis of the information security solution. The problem statement, project scope, risk analysis, and literature review performed in the Project: Problem Identification Assignment must justify the selection of the elements that require analysis for the final fault-tolerant security solution. For example, if the final solution requires a network security solution, an analysis may begin by evaluating the network architecture diagram in Project: Problem Identification Assignment.
Instructions
Segments of the network must be assessed, such as all local node connections in the LAN (e.g. local processes, local devices, local data storage), as well as other connections to the LAN (e.g. network gateways, WANs, wireless APs, network control resources, network databases, cloud integrations). The environment and architecture must justify the analysis of the coinciding threats. A few of the many network threats you could analyze (but are certainly not limited to) are DDS, session hijacking, parameter modification, server-side includes, addressing errors, message integrity, protocol flaws, reconnaissance, impersonation, wiretapping, malicious active code, connection flooding, man-in-the-middle, spoofing, misdelivery, redirection, and/or other transmission failures. The analysis in the latter example must identify any targets such as confidentiality, integrity, or availability and the coinciding vulnerability such as impersonation, protocol flaw, or misdelivery.
This is just an example given for a network security project and in no way limits the outcomes. The review of literature and detailed analysis of the system or application will determine the primary deliverables. Each requires objective justification for credit.
It is critical to identify the proper targets and vulnerabilities to ensure the final fault tolerant security design includes the appropriate correlated controls. For example, if the target is confidentiality, and the vulnerability is misdelivery, an appropriate control solution to design could be encryption. If the target is availability, and the target is a DNS attack, an appropriate control solution to design could be an intrusion detection system (IDS), access control list, and honeypot.
Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.
At the minimum, this phase of the project must include:
I. Executive summary, introduction, and conclusion
II. Methodology (must be supported by relevant and current research from scholarly, peer-reviewed journals)
a. Approach(es) for the information security analyses and design
i. Organizational security structure
ii. System, computing, network, or application architecture
iii. Security models that will be utilized
b. How the data will be gathered to objectively analyze the solution
i. System evaluation method
c. Limitations of the analysis
i. Security threats and risks inside the scope that need to be addressed
ii. Security threats and risks outside the scope
III. Synthesis review of literature to support analysis decisions
a. Analysis of the proper solution
i. Targets of the attack
ii. Vulnerabilities
iii. Controls
b. Create the appropriate correlated diagrams
c. Detail the results of the analysis
d. NOTE: Required minimum length (8 peer-reviewed sources and at least 7 double-spaced current APA formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements
IV. Diagram examples in this phase could include but are not limited to:
a. Advanced system and/or network architecture diagrams
b. Use case, activity, class, system sequence, and/or state machine diagrams
c. Fault tree
d. Access control matrix
e. Authentication, traffic, and/or data map
f. Dataflow diagrams (DFD)
g. CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings
h. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).
Each diagram must be justified by the literature review. In other words, if the plan secures an object-oriented language such as Java, the Java Virtual Machine must be properly analyzed from the class loader to the applet security manager. Analysis and associated diagrams must parallel the proper notations, formatting, and modeling rules and standards outlined in the prior IT infrastructure and systems analysis and design. These must align with peer-reviewed journal research as well as industry best practices.
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
8 peer-reviewed sources exist (can have overlap from Phase 1 if appropriate) and a minimum of 7 double-spaced, current APA-formatted pages, excluding the SAD diagrams, graphics, tables, or any other non-textual components.

Threat Interception Project Assignment Instructions Overview When accessing the

Threat Interception Project Assignment Instructions
Overview
When accessing the Internet via wireless methodologies, a certain level of protection has been granted to the users. This protection is largely due to the many types of security protocols that have been developed. Without these different security protocols, users would not be able to engage in the activity that they have become accustomed to on the Internet. In order to preserve this freedom with which users utilize the Internet, IT professionals must have both a thorough understanding of the primary forms of security protocols as well as how each security protocol functions.
One of the best methods that can be utilized to minimize security threats is by intercepting these attacks before they are successfully utilized. Three security protocols that are used to achieve this include Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Private Communications Transport (PCT). Do any other security protocols exist? Research one additional modern security protocol and add this to your analysis.
Instructions
Assume that you are the information security officer of a business, and you must evaluate these four (4) security protocols in order to determine which should be implemented in your organization.  Analyze the protocols on at least two (2) different operating systems from a threat interception standpoint. Use current threat and vulnerability data when performing this assessment. US-CERT, the United States Computer Emergency Readiness Team, is one example of a U.S. Department that has information on current threats to information systems.  Regardless, many other public and private sector organizations can be used as long as they are credible.  
In order to perform this analysis, if you do not have access to two different physical workstations with different operating systems, it is recommended you use virtual machines. VMware and Oracle VirtualBox are examples. Search for either and download them free of charge. Subsequently, you can use open source pre-built images or install from the operating system ISO images. For instance, Kali Linux is a popular operating system that has the tools to do this analysis. Search “Kali Linux VirtualBox Image” to find a virtual box image pre-installed with Kali Linux.
In your analysis, be sure to assess the threats that each protocol is likely to mitigate or prevent and evaluate the strengths and weaknesses associated with each of these protocols. Be sure to include the following in your project:
· A properly formatted APA paper;
· Screenshots with visible OS dates of the network security threat assessments on the two different operating systems, at least one OS being Linux, using relevant security tools on Kali Linux or Linux alternatives;
· Justification and use of appropriate security tools to demonstrate and evaluate the vulnerability of intercepting information from each of the four (4) networking protocols;
· A review of which safeguards the organization could implement to guard against these attacks, and
· A well supported report regarding the most advantageous safeguard/mitigating factors of the network security threats your project addresses;
· Hint: Create Microsoft Excel spreadsheets that list the operating systems, security assessments, tools used, four (4) networking protocols, and findings from the threat interceptions that occurred;
· Your project must be a minimum of 1500 words and must contain at least 7 peer-reviewed sources;
· Before being graded, all code, security tool logs/reports, server logs, access control rules, and diagrams (each) must include screenshots with a valid OS date/timestamp and a unique piece of data that shows completion on the student’s Kali Linux distribution or relevant alternative security OS. Include the screenshots in appendices in your written paper.

Write a fully developed paper in which you:  Included grading Rubric for your re

Write a fully developed paper in which you: 
Included grading Rubric for your review.
Assess the probable difficulties of the St. Luke’s IT executives’  view of wireless networking as a key lever in their quest to increase clinician productivity and improve patient care. 
Analyze how the Mobility XE enables the IT department to centrally manage all wireless devices used by clinicians. 
Critique the Mobility works solution and recommend one change to the solution to provide better productivity and improved patient care. 
Use at least three quality resources in this assignment. Note:  Wikipedia and similar Websites do not qualify as quality resources. 
Construct a comprehensive analysis of the challenges and benefits  related to a communication technology solution to improve an  organization’s efficiency and quality.

PowerPoint Presentation Project Valencia is expanding its services into internat

PowerPoint Presentation Project
Valencia is expanding its services into international markets opening markets in Ireland and Vietnam, and the projections are now twofold. After exhaustive research, you came up with the notion of using cloud computing technologies, and you have determined that this technology offers the best alternative for keeping the current customer and project requirements. you have been directed to analyze the situation and come up with a proposed solution for the chief information officer (CIO) and the sales manager. The time to implement is measured in months, not in years.
You also observed, during your research on cloud computing, that as enterprises move more of their IT resources to the cloud, protecting against security breaches is a top concern. IT executives often cite worries over security as a reason why they are not taking greater advantage of cloud services.
Your job is to persuade top management, including the sales manager, that this technology does the following:
Offers the best solution in terms of cost, time to implement, and sustain.
Reduces the cost of added infrastructure and technical personnel to maintain.
Safeguards the privacy and confidentiality of customers’ data and helps protect organizational information from cyberattacks.
Oral Communication Parameters and Expectations:
The presentation must be at least 6–8 content slides long, with each slide having narration in Standard English explaining the key ideas in each slide.
In addition to the content slides, the presentation must include the title and reference slides.
The oral presentation should have a highly developed and sustained viewpoint and purpose.
Oral communication should be highly ordered, logical, and unified.
The oral delivery technique, including word choice and oral expressiveness, must display exceptional content, organization, and style while leading the audience to a dynamic and supported conclusion.
The narration must provide clear enunciation, a professional tone, and no background noise.
The communication must be free of grammatical errors and show no evidence of plagiarism.
Assignment Requirements
You may use a theme provided with MS PowerPoint to format your presentation, or you may create your own style. A consistent background for all slides works best.
Use text and background colors that provide sufficient contrast for readability. Dark text against a light background works well, but avoid extremes like black on white, vibrant or neon colors, or clashing contrasts like blue on red.
Use a consistent, plain font such as Arial, Times New Roman, or Verdana throughout, and a readable font size such as 20 or 24.
The presentation should contain sufficient information to adequately support the narration and contain no spelling, grammar, or APA errors. Remember that the slides will contain summary information of what you provide in your narration. Points deducted from grade for each writing, spelling, or grammar errors are at your instructor’s discretion according to the Undergraduate Writing Rubric located in Course Resources.
Include both APA style in-text citations and a reference page for any sources you use to support your argument.

Exp19_Access_Ch05_CapAssessment – Paterson Credit Union 1.0 Exp19_Access_Ch05_Ca

Exp19_Access_Ch05_CapAssessment – Paterson Credit Union 1.0
Exp19_Access_Ch05_CapAssessment – Paterson Credit Union 1.0
Project Description:
You work as a database administrator at the Paterson Credit Union. You are modifying a database to add validation, lookup fields, and an input mask. You will also modify queries to take advantage of advanced functions and features.
Start Access. Open the file named Exp19_Access_Ch05_CapAssessment_Paterson_Credit_Union.accdb. Grader has automatically added   your last name to the beginning of the filename.
You   want to make sure that the customer account types are documented and stored   correctly. To do this you will create a table that will list each account   type.
Use Design view to create a new table. Add AccountType   as the first field name, with data type Short Text and field size 10. Ensure AccountType is set as the   primary key. Save the table and name it AccountTypes.   Add three records: Platinum,   Silver, and Gold.   Save and close the table.
Now,   you wish to ensure that, when customers are added to your database, the phone   number and account type must be entered. To do this you will set the   PhoneNumber and AccountType fields as required fields.
Open the Customers table in Design view. Set the PhoneNumber and AccountType   fields to Required. Save and close the table.
Paterson   Credit Union only offers loans with interest rates between 2.0% and 10.25%.   To ensure that no loans are offered outside of those constraints you will add   a validation rule that will not allow loans outside of that range to the   InterestRate field in the Loans table.
Open the Loans table in Design view. Establish a validation rule for the   InterestRate field that requires the value to be greater than or equal to 2.0 but less than or equal to 10.25. Create validation text for the   InterestRate: Value must be between 2   and 10.25   (no period). Save the table and switch to Datasheet view. Change the   InterestRate in the first record to 1.9.   The validation text appears. Press ESC to restore the original value. Close   the Loans table.
You’ve   made the PhoneNumber field required in the Customers table, but now you want   to ensure that phone numbers are entered in a specific format. To do this you   will add an input mask to the PhoneNumber field in the Customers table.
Open the Customers table in Design view. Add a phone number input mask for   the PhoneNumber field, storing the symbols with the data.
You   would like to easily add the account type for each customer without typing   anything on your keyboard. To do this you will turn the AccountType field   into a Lookup Wizard using the AccountTypes table, that you recently created,   as the source.
Change the Data Type of the AccountType field to Lookup Wizard. Use the   AccountTypes table for the values in the lookup field, select the AccountType   field from the table, accept the default sort, accept default column widths,   and then accept the default name AccountType.   Save the table. Switch to Datasheet view.
Change   the account type to Platinum in the   first record. Close the table.
For   ease of use, you would like for users to be able to indicate the minimum loan   amount on which they would like to pull loan information. You will do this by   adding a parameter criterion to the LoanAmount field in the Customer Loans   Parameter query.
Open the Customer Loans Parameter query in Design view. Add criteria for the   Amount field. The user should be prompted to Enter Minimum   Loan Amount (no period). The query should display   all records that have a loan Amount that is greater than or equal to the value   entered as the parameter. Run the query. Enter 250000   when prompted to Enter Minimum Loan Amount. You should have five results.   Ensure that the query results display a total at the bottom of the Date   column, and an average at the bottom of the Amount column. Save and close the   query.
You   have noticed that a few of your customers are missing address information.   You would like to address this by creating a query that returns only the   customers that are missing addresses so that you can update that information.   You will complete this by adding a field that indicates whether an address is   missing then adding criteria to that field so that only customers with   missing addresses are returned.
Open the Missing Addresses query in Design view. Add a new column to   determine if a customer does not have an address on file. If the customer’s   Address is null, it should display Missing.   If not, it should display nothing. Name the column AddressPresent. Add criteria of Missing to the column you just created, so only   the customers missing an address display. Move the AddressPresent field so it   appears between PhoneNumber and Address. Run the query. Ensure only customers   with null Address fields display. Save and close the query.
For   simplicity, you are now interested in rounding the interest rates for each   loan to the nearest whole number. To do so, you will utilize the Round   function in the Loans by Interest Rate query.
Open the Loans By Interest Rate query in Design view. Create a new column to   round the InterestRate of each Loan to the nearest whole number. Name the   field RoundedRate. Run the query and verify the   RoundedRate column displays whole numbers. Save and close the query.
Seeing   what the total and average payments month over month are is important to your   operation. To display this information, you will use the DatePart function to   extract the month from the PaymentDate field then ensure that the query is   grouped by month.
Open the Payment By Month query in Design view. Change the first column so   that instead of grouping by the payment date, you group by the month. Use the   DatePart function to extract the month from the date. Name the column MonthNumber. Group by the MonthNumber field and   display the Sum of the first Total field and the Average of the Average   field. Run the query. The first line should read 2 (as the month,   representing February), with a total of $5,246.51 as the total payments   received and $1,311.63 as the average payment amount. Ensure that the query   results display a total at the bottom of the Total column, and an average at   the bottom of the Average column. Save and close the query.
Finally,   you would like to classify the various loans as either high or low priority   for the Credit Union. To do this you will add a column that determines   whether the interest rate for a loan is greater than or equal to 7.9%, as   that is what is considered high priority.
Open the Refinance Candidates query in Design view. This query displays all   adjustable loans in the database. Create a new column to display High Priority for all loans that have an   InterestRate of 7.9% or more, and Low Priority   otherwise. Name the field Priority.   Run the query. Notice customers with the highest interest rate values show a   higher priority. Save and close the query.