Explain how to make the file transfer process more secure.

erm Paper Project: Designing a Secure Network

Due Week 10 and worth 190 points

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages

Part 1

  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)

 

  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.

Part 2

  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.comsends an email to user534@yahoo.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more sec

What opportunities in the marketing environment did Gannett seize in launching USA Today?

 

Case Analysis: USA Today

This Week’s Case

USA Today: Innovation in an Evolving Industry

Write an analysis paper on the USA Today case study. Within your paper be sure to answer the following questions:

1.      What opportunities in the marketing environment did Gannett seize in launching USA Today? How did the company learn about and respond to these opportunities? Answer the same questions for USAToday.com

2.      How has a continuous strategy of marketing innovation proved successful for USA Today as it looks toward its future? Explain.

3.      Based on USA Today’s experiences with print and online news, evaluate the long-term potential of printed news and the newspaper publishing industry. Do you believe printed newspapers will continue to survive despite digital competition?

 

The requirements below must be met for your paper to be accepted and graded:

·         Write between 750 – 1,250 words (approximately 3 – 5 pages) using Microsoft Word in APA style.

·         Use font size 12 and 1” margins.

·         Include cover page and reference page.

·         At least 80% of your paper must be original content/writing.

·         No more than 20% of your content/information may come from references.

·         Use an appropriate number of references to support your position, and defend your arguments. The following are examples of primary and secondary sources that may be used, and non-credible and opinion based sources that may not be used.

·

1.      Primary sources such as, government websites (United States Department of Labor Bureau of Labor Statistics, United States Census Bureau, The World Bank, etc.), peer reviewed and scholarly journals in EBSCOhost and Google Scholar.

2.      Secondary and credible sources such as CNN Money, The Wall Street Journal, trade journals, and publications in EBSCOhost.

3.      Non-credible and opinion based sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. should not be used.

Challenges in the Global Business Environment

Complete the Power Point and the Writing portion

Assignment 2: Challenges in the Global Business Environment

Due Week 9 and worth 330 points

According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among businesses. Imagine that you have been appointed as Apple’s Chief Compliance Officer and must prepare a video presentation for Apple’s suppliers regarding Apple’s Supplier Code of Conduct to deliver via a web meeting. To prepare for your presentation, review Apple’s Supplier Code of Conduct, located at https://www.apple.com/supplier-responsibility/. Next, use a tablet, smartphone, laptop, desktop, or traditional video recorder to record a maximum of a five to seven (5-7) minute dynamic video on Apple’s Code of Conduct. Alternatively, you may submit a four to six (4-6) page paper instead of the video submission.

In addition to the recorded video, you must also create a presentation using PowerPoint (or other equivalent software) summarizing the important changes and explanations regarding the code of conduct that you communicated in your video presentation to email to the suppliers after the meeting for future reference.

You must submit both parts of the assignment to receive full credit.

Note: If you are using a tablet or smartphone you will need to email the video file to yourself, then save it to a computer in order to upload to Blackboard. You may want to upload your video to a file sharing service, such as Dropbox, if your email will not let you send a large video file. Dropbox is accessible from all smartphones and tablets from the Dropbox app.

Once you are ready to upload your video to Blackboard, view the Kaltura video tutorial found in your online course shell (Week 9).

Please use the following naming convention in the popup window for your video once it is finished uploading:

  • Title: Your First Name, Your Last Name – Challenges in the Business Environment
  • Tags: BUS475, Business Environment
  • Description: First Name, Last Name – BUS475 Assignment 2 (Date Uploaded ex. 11-14-2014)

Part 1: Video Presentation OR Paper

Prepare and present a video that is a maximum of five to seven (5-7) minutes OR write a four to six (4-6) page paper in which you:

  1. List specific changes that Apple has made to its Code of Conduct in recent years. Provide at least one (1) example of each change.
  2. Explain the identified changes to the suppliers in such a way that they will understand the standards that Apple requires in order to maintain their relationship with the company.

Part 2: PowerPoint Presentation

Create a six to eight (6-8) slide PowerPoint presentation in which you:

  1. Summarize Apple’s Supplier Responsibility information.
  2. Discuss Apple’s stance on each of the following areas:
    1. Empowering workers
    2. Labor and Human Rights
    3. Health and Safety
    4. The Environment
    5. Accountability
  1. Identify the key ways that Apple’s Progress Report has changed since last year.
  2. Examine the manner in which Apple’s Supplier Code of Conduct helps the organization operate as a socially responsible organization.
  3. Provide detailed speaker notes of what you would say if you were delivering the presentation.
  4. Submit a reference page with at least two (2) quality references that you have used for this presentation / paper. Note: Wikipedia and other Websites do not qualify as academic resources.

Your PowerPoint presentation must follow these formatting requirements:

  • Format the PowerPoint presentation with headings on each slide and three to four (3-4) relevant graphics (photographs, graphs, clip art, etc.), ensuring that the presentation is visually appealing and readable from 18 feet away. Check with your professor for any additional instructions.
  • Include a title slide containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The title and reference slides are not included in the required slide length.

If you choose the written paper, your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Evaluate the influences of changing economic, political, social, cultural, and technological forces on business and society.
  • Use technology and information resources to research issues in business and society.
  • Write clearly and concisely about business and society using proper writing mechanics.

Click here to view the grading rubric for this assignment

Compare and contrast the significant similarities and differences among the theories of goal setting,

  • Compare and contrast the significant similarities and differences among the theories of goal setting, self-efficacy, and reinforcement. Specify the theory that you believe most closely aligns with your current or future approach to motivating employees. Support your response with at least one (1) example that demonstrates your approach to employee motivation.