Provide an excellent analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis must be clear and concise. Include information from the Blue Team and supplemente it with additional analysis by this student.

IT: Project #1 Incident Response Report

Contact Information: Provide an acceptable title page for the file. Provide a complete section 1 of the Incident Report Form that included realistic but fictionalized data for all of the following fields:

  • Name
  • Role
  • Organizational Unit and affiliation
  • Email address
  • Phone Number
  • location

Incident Details: Provide an excellent report of the incident details as required by the NIST template. Responses for all items must be clear, concise, and reflected the analysis of the Blue Team with additional contributions by this student.

Cause of the Incident: Provide an excellent report of the incident causes using information reported by the Red Team (from the assignment) and additional analysis performed by the Blue Team and this student. Appropriately use information from the Sifers-Grayson Overview and Enterprise Architecture diagrams. Reporting of analysis must be clear, concise, and reflected the analysis of the Blue Team with additional contributions by this student.

Cost and Impact: Provide an excellent analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis must be clear and concise. Include information from the Blue Team and supplemente it with additional analysis by this student.

General Comments: Provide an excellent discussion of the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson (clear, concise, accurate). Include information from the Blue Team and supplemente it with additional analysis by this student.

Provide justification for the addressing scheme. Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

Network Improvement Plan

TCP/IP Addressing and Management

Document an addressing scheme for the TCP/IP addresses used for the network.
Include categories of network resources, users, and the address ranges to be used for the current and potential future resources and users.
Provide justification for the addressing scheme.
Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

Are any of the businesses unionized? Are they in involved lawsuits or patent infringement issues? Are there issues with regulatory agencies such as the FDA or local health authorities? These are all international businesses. Are there any extra risks involved because they are international?

The Boeing Company

You should be able to click on the PDF file link provided here The Boeing Company 10-K report for the period ending 12.31.18.pdf Download The Boeing Company 10-K report for the period ending 12.31.18.pdf to access this company’s 10-K report.

The Hershey Company – You should be able to click on the PDF file link provided here The Hershey Company 10-K report for the period ending 12.31.18.pdf Download The Hershey Company 10-K report for the period ending 12.31.18.pdf to access this company’s 10-K report.
Tesla Motors Inc. – You should be able to click on the PDF file link provided here Tesla Motors Inc 10-K report for the period ending 12.31.18.pdf Download Tesla Motors Inc 10-K report for the period ending 12.31.18.pdf to access this company’s 10-K report.

The questions listed below will continue the process an auditor must take when preparing for an audit. Not only do you have to understand the company itself but the industry in which they operate so you can understand all of the risks for the company and formulate the audit procedures accordingly. One of the first few steps of the audit process is for the audit team to come together and hold a fraud brainstorming session where every member of the team will come up with any area of potential fraud within the company they are preparing to audit. In order to do this and completely participate in the brainstorming they have to understand the company, industry and any economic, social, regulatory, or legal issues the industry faces. Each student should answer the following questions for the company they choose:

What are the key economic factors about the industry in which the company operates? You can use this link as a starting point for your research on this question: http://www.marketingtutor.net/economic-factors-affect-business-environment/ (Links to an external site.). Don’t forget to also look at item 1 and 1A of your company’s 10-k report for specific risks for your particular company.

Where is the company in its life cycle? You can use this website to read about business life cycles: https://smallbusiness.yahoo.com/advisor/stages-business-lifecycle-challenges-100036770.html. (Links to an external site.) How might this affect audit risk? Are their different pressures (internal or external) that may affect the audit risk at different stages in a company’s life cycle?

What are the five or six most important factors for success in this business? You should be thinking outside the box a little here. Think about all kinds of things that make a business successful from it’s people, R&D, Patents, financial, international issues, and the legal and regulatory environments they all operate in.

Describe four or five significant business risks related to the client’s business and industry and why you think they are a significant risk that may affect how you plan and perform the audit. (Client business and industry risks are discussed in chapter 8 of the textbook. You should also be able to find specific risks associated with your particular company in sections 1 & 1A of the 10-k report. You can also find more information on identifying business risk at the following link: http://www.investopedia.com/articles/financial-theory/09/risk-management-business.asp (Links to an external site.)) Again don’t forget to think outside the box a little bit here as well. Are any of the businesses unionized? Are they in involved lawsuits or patent infringement issues? Are there issues with regulatory agencies such as the FDA or local health authorities? These are all international businesses. Are there any extra risks involved because they are international? For example, will the vote Great Britain made a few months ago to leave the European Union have any impact on these businesses that the audit team might want to think about during the next audit. Do any of the companies have warranty issues or patents that are expiring soon? For those of you who have Tesla as your company do you think Federal and State tax credits for purchasing electric automobiles have a significant impact on the business, audit, or industry risk? Why or Why not?

What notable accounting considerations are there for companies in this industry? You will have to read the company’s 10-k and possibly due other research on the specific industry your company is in. (For example, do they have revenue recognition issues, do they have assets such as goodwill that are difficult to value, do they have huge inventories in a variety of different locations that will be difficult to observe, are they involved in lawsuits that will need to be disclosed or recorded,etc….) You should be looking at areas on the balance sheet and income statement which have difficult accounting principles, are difficult to value, are easy to manipulate, have significant changes from one year to the next, and/or make up a large portion of the balance sheet or income statement (such as inventory, property, plant, and equipment, patents, goodwill, allowance for doubtful accounts, cost of goods sold, revenue recognition, payroll, pensions, etc..). These are the areas which usually require the most audit work.

What legal or regulatory matters are of concern for your specific company or companies within their industry. (For example Banks would have to deal with Banking and Financial regulations imposed on them by the Federal Reserve. If they are publically traded banks they will also have to deal with any SEC regulations. Company’s like BP and Exxon would have to deal with the EPA.)

What social matters are of concern?
Don’t forget to post your original response to the questions above for the company you choose. When you are replying to at least 2 other student’s responses you should choose at least one student that analyzed a different company than the one you chose.

Analyze the findings and come up with a disruptive solution or a technique that fits the construction industry’s efficiency and reduces the risks on the environment at the same time in Egypt compared to other developed countries.

Negative environmental impact

Effective technologies that construction companies in Egypt can implement in order to reduce negative environmental impact without sacrificing productivity.

Interviews will be made with professionals working in construction companies in Egypt. In order to then analyze the findings and come up with a disruptive solution or a technique that fits the construction industry’s efficiency and reduces the risks on the environment at the same time in Egypt compared to other developed countries.

Explain Windows 10 deployment methods. Which method or methods do you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario. Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data can be backed up and restored.

Client Presentation

Scenario: Your proof of concept was well-received by the client, Tetra Shillings Accounting. The firm has accepted your company’s plans. The client has a small IT team, and the members have limited knowledge of Windows 10. It will be up to you to provide a presentation to the team members on how to install and configure Windows 10. The presentation should include how to improve the firm’s backup and recovery process using Windows 10 tools, as well as best practices and screenshots from the VM you created for the proof of concept.

Your final project will be to design a training presentation to the client’s IT staff. Use the VM installation from Project 2 to create a Windows 10 upgrade presentation to the client. Include screenshots from the VM where indicated in the project template. The presentation should address your recommendations for the following items:

Version Summary: Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).

Installation Methods: Explain Windows 10 deployment methods. Which method or methods do you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.

Security Features: Windows Security, BitLocker, Defender, Local Security Policy

Backup and Recovery Overview: Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data can be backed up and restored. This should address:

  • the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
  • the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
  • the ability to restore system files and settings without affecting the user’s personal files and data.
  • the concerns that the client has about recovering systems that are negatively impacted by an operating system update.

Backup and Recovery Tools: You will need to explain how to use Windows 10 Backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.

Backup Procedure to Recover from Ransomware Attack: Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.

Procedure to Recover a Restore Point: Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Identify at least 5 potential causes of network failure. For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure.

Network Improvement Plan

For this assignment, you will develop a Fault Tolerance Plan section to add to the overall Network Improvement Plan document.

Fault Tolerance Plan

Identify at least 5 potential causes of network failure.

For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure.

Include the cost and benefit comparison for each risk reduction plan to justify the plan.

Describe three digestive disorders, including their causes as well as any nutritional interventions used in their treatment. Describe how the mouth is able to both mechanically and chemically break down food prior to it entering the stomach.

Digestive disorders

You can use the links provided as references including the textbook chapter 3.
1.)Describe three digestive disorders, including their causes as well as any nutritional interventions used in their treatment.

2.)Probiotics are often suggested as a dietary supplement to reduce diarrhea symptoms when one is taking antibiotics for some types of infection. What effect would antibiotics have on digestion? Why might probiotics help?

3.)Describe how the mouth is able to both mechanically and chemically break down food prior to it entering the stomach.

Be sure to cite the sources you use. You may use either APA format . Use sources that have a scientific basis (text, articles/videos provided in the study materials, major organizations, etc.). Your response to each bulleted item should be approximately 250 to 300 words (1 page)

*****https://www.ck12.org/biology/digestive-system-bacteria/lesson/Bacteria-in-the-Digestive-System-MS-LS/*****
*****https://advances.umw.edu.pl/pdf/2013/22/5/759.pdf*****
*****http://pressbooks-dev.oer.hawaii.edu/humannutrition/chapter/protein-digestion-and-absorption/*****
*****https://www.niddk.nih.gov/health-information/digestive-diseases/digestive-system-how-it-works*****
*****Textbook Chapter 3: https://drive.google.com/file/d/1kYBSAznSjktxsPUn8hcgn_-jgDPFX_Xz/view*****

Describe and Examine the literature and present a discussion document that summarises the competing viewpoints.

FDM (Flight Data Montioring)

Technology now makes installing cameras in cockpits feasible in terms of cost, and there are many parts of the industry that would favour installing them for the benefit of flight safety and accident investigation. If you look back a few decades, then there was some resistance to FDM, and yet this is now generally viewed as one of the most significant contributors to flight safety.

Describe and Examine the literature and present a discussion document that summarises the competing viewpoints.

‘Applying relevant literature, discuss the challenges facing health organisations when implementing information systems. Based on this literature what would be your recommendations to management when implementing information systems in health care organisations?

Managing Information Systems essay

Applying relevant literature, discuss the challenges facing health organisations when implementing information systems. Based on this literature what would be your recommendations to management when implementing information systems in health care organisations?

How many instructions will be executed for your code in Q1 without optimisation? Optimise using inline expansions and loop unrolling to use a minimum number of instructions in to run your assembly code and explain the methods done. How many instructions will be executed for your code with optimisation conducted?

Computer architecture

This exercise will allow you to write programs in the language of the computer.

Submission details
Submission of coursework will be performed using Turnitin on Canvas. You need to upload two files:
-the first file is a Word document that includes the answers to the Q1, Q2 and Q3 below.
-the second file is the MIPS programs for the assignment problem. Upload your files to the submission boxes within the Assignments page of the Canvas module by midnight of the day of the deadline.

Coursework Brief
The coursework consists of one program with three questions to answer: Q1, Q2 and Q3. You should compile your answers to Q1, Q2 and Q3 and related discussion in a document to submit to Canvas. Add a front page to the document showing your name, student number, module title and code, and assignment title.

The C program shown in the Appendix will add the coursework array marks to the exam array marks and store them in the results array. Assume the number of students is 10. The program will then increase the marks in the results array if half of the students fail. Note that CURVE is a function called by the main program. Finally, the program will create counters for the number of students with a result >= 70, >=60, >=50 and < 50.

Q1 Use the MIPS instruction set and the MARS MIPS simulator to:

(i) Write the equivalent MIPS assembly code for the C-code shown above. Remember to add comments to your assembly code.
(ii) Test the assembly code program via the MARS MIPS simulator.
(iii) Show the assembly code and all test results of running the assembly code in the report.

Q2 Consider the basic MIPS 5-stage pipeline (IF, ID, EX, MEM, WB). Assume that there is full forwarding and branch not taken.

(i) Show the pipeline execution table of your code from Q1.
(ii) Based on the pipeline execution table, does your solution in Q1 have any pipelining hazards?
If yes, then list these hazards and show how these hazard(s) can be resolved by rewriting the code you produced in Q1. You should test the rewritten code and provide the new code and the results in the report.
If your code from Q1 does not have any pipeline hazards, discuss why this is the case and how did you resolve the pipeline hazards issues in Q1.

Q3 Performance measurement.
(i) How many instructions will be executed for your code in Q1 without optimisation?
(ii) Optimise using inline expansions and loop unrolling to use a minimum number of instructions in to run your assembly code and explain the methods done.
(iii) How many instructions will be executed for your code with optimisation conducted?