+1-316-444-1378

Incident Response Lead

Background:Acting as a computer security incident response team leader of a nuclear facility in the United States of America. This facility contains sensitive industrial control systems that are connected to a network and is working on researching various nuclear reactions for commercial nuclear power use. There has been unusual activity Read more…

Wireless Communication

Topic 1: How Antennas Work The purpose of an antenna in a radio transmitter is to launch the radio waves into space. In a receiver, the idea is to pick up as much of the transmitter’s power as possible and supply it to the tuner. The size of a radio Read more…

System Integrtion

In the fast-paced, evolving enterprise environment, there is a need to integrate systems, whether with recently acquired organizations or with the latest off-the-shelf technology. The challenge seems insurmountable without some formalized approaches, tools, techniques, and best practices to support the effort. You will select a manageable systems integration project so Read more…

Audit of Infrastructure

You work for a consulting company that performs audits of a companys IT infrastructure. Your company has been contracted to audit the IT Infrastructure for LSS (LMJ-Star Services). You and your team were sent in to complete the audit. You determine that this will be the first review that LSS Read more…

Information Technology

Please respond substantively to the following Share the link to the resource on social media initiatives and information technology that was most useful to you.Be sure to explain what was most useful to you in this resource.Describe the importance of effective change leadership in relation to an organizations adoption of Read more…

Incident Response

Background: Attacks on critical infrastructure are likely to become the norm in cyber warfare and cyber espionage. Nation states and other hostile actors (e.g. terrorists) are likely to use these attacks to make a statement or further their interest in some fashion. Consider the following:Being in charge of information security Read more…

Attacks on nuclear facilities

Background: History can be one of the most important teachers, especially when it comes to cyber security and incident response. Learning from attacks on others from the same or similar industries can provide insight on how the IRT should be prepared for similar, if not the same, attacks within their Read more…

Hardening Memo

Write a professional memo to management with your recommendation for whether or not to implement a set of hardening guidelines. What guidelines would you recommend, if you would recommend them? Clearly explain your reasons, one way or the other, including important benefits for your recommendation. Also, recommend guidance for performing Read more…

Digital Divide

The questions that guide your M1A are: What groups of people are at a disadvantage within this ‘Digital Divide’? What are the implications of not having proper access, technology, and/or the knowledge of how to use internet technologies? How does this impede participation in the digital world? Your Module Assignment Read more…