Order a plagiarism free paper now

Our professional writers are ready to do this paper for you

  

Assignment 1: 
“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link:
http://www.visual-literacy.org/periodic_table/periodic_table.html
Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others.
Requirement: 
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
· Add reference separately for each assignment question.
· Strictly follow APA style. 
· Include at least two citations (APA) from academic resources
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.

Assignment 2: 
Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.
Answer the following question(s):
Does a multilayered defense guarantee that attacks will not be successful? Why or why not?
Requirement: 
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
· Add reference separately for each assignment question.
· Strictly follow APA style. 
· Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.

Assignment 3: 
Project Part 1.
Refer to the “Project Part 1-Active Directory Recommendations (1)” word document for questions and instructions. 
Requirement: 
· ****Separate word document for each assignment****
· Minimum 3 pages. Cover sheet, abstract, graphs, and references does not count.
· Add reference separately for each assignment question.
· Strictly follow APA style.
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $15 max. Please bid if you agree.

Project: Securing a Microsoft Windows Environment

Overall Project Scenario
Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.
The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.
Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.
Project Part 1: Active Directory Recommendations

Scenario
Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks
Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:
1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?
2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?
3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?
4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources
· Internet access
· Course textbook

Submission Requirements
· Format: Microsoft Word (or compatible)
· Font: Times New Roman, size 12, double-space
· Citation Style: APA
· Length: 4 pages

Self-Assessment Checklist
· I addressed all questions required for the summary report.
· I created a well-developed and formatted report with proper grammar, spelling, and punctuation.
· I followed the submission guidelines.

Order your essay today and save 10% with the discount code ESSAYHELP