Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Justify the need of the IEEE 802 standard used in networking.
Evaluate the three standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources
Cybersecurity Architecture and EngineeringINTRODUCTION
As technology companies continue to move business services to the cloud, many companies are finding a need to upgrade the technological infrastructure. When implementing new architecture, IT companies will consult with IT security firms to identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.
You are the newly hired LAN administration and security manager at Healthy Body Wellness Center (HBWC). The HBWC includes the Office of Grants Giveaway (OGG), a growing department responsible for distributing hospital research grants.The HBWC currently relies on a local area network (LAN), but plans to expand their services and hire more employees this year. It is evident the current cybersecurity architecture is limited and unable to meet current needs. In addition, HBWC’s cybersecurity architecture will need to transition to a wide area network (WAN).Using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report,” conduct a security analysis of HBWC’s current technologies and applications and identify threats to the company’s existing architecture. You will use the findings from your analysis to complete the attached “Business Requirements Document Template.”
Your submission must be your original work. No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. Use the report provided when submitting your task as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
Analyze HBWC’s existing architecture using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Consider common security needs and functionalities necessary to meet the needs of the target network as part of your analysis. Record all responses in the appropriate section of the attached “Business Requirements Document Template.”
A. Introduction – Summarize each aspect of the project summary, project scope, and system perspective based on the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Company Security Assessment Report.” Use the “Introduction” of the attached “Business Requirements Document Template” to record your responses.
B. Business Process Overview – Describe the current business processes at HBWC and the proposed processes, including the interactions between systems and various business units. Include visual process flow diagrams to further illustrate the processes the new product will replace or enhance. Use the “Business Process Overview” section of the attached “Business Requirements Document Template” to record your responses for each aspect.
C. Business Requirements – Record the business requirements for the project, categorized by both priority and area of functionality addressing the needs from the “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Provide functional and nonfunctional requirements that can be followed throughout the project for the recorded business requirements. Use the Business Requirements Document (BRD) template to record your responses for each aspect of the document in the “Business Requirements” section.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )File size limit: 200 MBFile types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
The submission does not summarize each aspect of the project summary, the project scope, and the system perspective.
The submission summarizes each aspect of the project summary, the project scope, and the system perspective, but the information provided is inaccurate or does not provide details from the case study and security assessment report, or the responses are not recorded in the “Introduction” section of the Business Requirements Document (BRD) template.
The submission accurately summarizes each aspect of the project summary, the project scope, and the system perspective using details provided in the case study and security assessment report. All responses are recorded in the “Introduction” section of the “Business Requirements Document Template.”
B:BUSINESS PROCESS OVERVIEW
The submission does not include current and proposed processes or required flow diagrams.
The submission describes current and proposed business processes, but the proposed processes do not accurately reflect the case study or security assessment report. Current and proposed interactions between systems and various business units are included, but the information provided contains errors or not all aspects are covered. Process flow diagrams illustrating the proposed new processes are provided but are not viable, or all responses are not recorded in the “Business Process Overview” section of the attached “Business Requirements Document Template.”
The submission accurately describes current business processes at HBWC and proposed processes derived from the case study and security assessment report. The submission includes interactions between systems and various business units and includes viable process flow diagrams illustrating the processes the new project will replace or enhance. All responses are recorded in the “Business Process Overview” section of the “Business Requirements Document Template.”
The submission does not include business requirements for the project.
The submission includes business requirements, but information provided does not address the information from the case study or assessment report or contains errors; or the requirements are not categorized by priority and areas of functionality. All responses are not recorded in the “Business Requirements” section of the “Business Requirements Document Template.”
The submission includes viable business requirements based on the case study and assessment report and are categorized by priority and areas of functionality. Both functional and nonfunctional requirements accurately represent the business requirements provided and can be followed throughout the project. All responses are recorded in the “Business Requirements” section of the “Business Requirements Document Template.”
The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.
The submission includes in-text citations for sources that are quoted, paraphrased, or summarized and a reference list; however, the citations or reference list is incomplete or inaccurate.
The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.
Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.
Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.
Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.
SUPPORTING DOCUMENTS: They are listed below
Select a computer science topic and writeComputer Science Assignment Help Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the topic. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the topic. You should do a deep dive into a topic. Do not do a survey. – 400 words.
Short-Range Strategic IS Planyou will write a 3-page short-range strategic IS plan for Reynolds Tool
We Offer Fast, Confidential Academic Writing Services
Get assignment help from the best academic help website. We have professors and expert writers ready to help you beat deadlines and score A+ grades.
We write all kinds of assignments. We offer high-quality online academic writing services on any subject.
· Essay Writing Help
· Assignment Help
· Homework Help
· Case Study writing help
· Research Paper help
· Research Proposal writing help
· Online Exam and quiz assistance
· Dissertation Writing Service
· Thesis Writing Help
Need other services? Contact us for a quote.
We cover all subjects, including
· Computer science
· Information technology
· Social sciences
· Physical sciences
Yes. Expect high-quality assignment solutions along with their detailed explanations as part of your order. In line with our plagiarism-free policy, your completed order will include a free copy of the Turnitin report to verify that the content is original and custom-written for you.
· We provide correctly completed papers that meet all the criteria and instructions.
· Properly researched content that meets the expectations of your instructors.
· You get to work with a highly dedicated professional that can guarantee your success from the word go.
Yes. We ensure timely delivery of all custom papers you order to ensure that you never miss your deadlines.
Contact us any time via WhatsApp, live chat, or email. We have a dedicated round-the-clock customer support service with a highly experienced team specially trained to answer all your queries.
Communicate directly with your writer and get frequent updates on your order.
We have top-notch experts to help you achieve top grades: – All our assignment writers are native English speakers; have PhDs or Masters; possess in-depth knowledge of appropriate writing and formatting styles such as APA, MLA, Harvard, Chicago, AMA and more; and adhere to the highest standards to deliver well-written A+ assignments.
• Native writers
• Subject-matter experts
• Academic veterans
o Former students
• Industry professionals
The most affordable pricing for high-quality assignment help services: from just $7 per page.
· Get the best assignment help at the best prices in the market!
· Get any revisions free of charge.
Get high-quality custom papers at affordable prices from our expert writers.
- Free revision
- Free plagiarism check
- Free title page
- Free formatting
- Free bibliography
- Free simple outline (on request)
- 100% confidentiality
- BA, MA, and PhD degree writers
- No Plagiarism
- 24/7/365 Customer Support
- Quality research and writing
- No hidden charges
- Never resold works
- 100% authenticity
- Secure payment processing
Essay Writing at Profs Only
Review This Service