Monday, 17 December 2018

ECO 550 Case Study 1 Auctions

ECO 550 Case Study 1 Auctions



Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.



Latest A+ Graded at link below








  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.
Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.

  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.

ECO 550 Case Study 1 Auctions



Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.

  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.
Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.

  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.

ECO 550 Case Study 1 Auctions



Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.

  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.
Case Study 1: Auctions Due Week 7 Worth 250 pts
The following video describes auctions as price discovery mechanisms https://www.youtube.com/watch?v=4kWuxfVbIaU Use the video on auctions and at least 3 academic and/or high-quality business publications, see definitions below, to answer the following questions in 5-7 pages: 1.
There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast: a) the English and Dutch auctions; and, b) the sealed bid first price auction and the Vickery Auction.

  1. After many months of offers and counter offers for Sky PLC, the UK’s The Takeover Panel (http://www.thetakeoverpanel.org.uk/) required that Sky PLC be acquired via an auction. What type of auction was the Sky auction, who were the bidders and who won? Given that there had been multiple public offers revealed by the bidders, was the auction type selected the best type of auction for the Sky acquisition?

  1. Auctions are widely used in finance, e-commerce and in e-games. Identify 3 applications of auctions used in finance, e-commerce and/or e-games. Explain the: a) need for an auction in the product/service; and b) what type of auction is used and why that type of auction is appropriate for the product/service.

  1. Auctions are also widely used to generate revenue for not-for-profit organizations. What are the advantages/disadvantages of auctions as revenue generators for not-for-profit organizations?

  1. Suggest ways in which the company you work for, or the company which you aspire to work for, can use auctions to better uncover value and increase revenue.

CIS 534 Week 3 Discussion

CIS 534 Week 3 Discussion


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.



Latest A+ Graded at link below











Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.

CIS 534 Week 3 Discussion


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.

CIS 534 Week 3 Discussion


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.


Attacks to business networks and hacking in general are consistent topics in today’s news. A wide variety of hacker tools are available to criminal hackers.  Perform an internet search to review the various hacking tools that are available.
  • There are many different types of infrastructure attacks.  These include, but are not limited to, malware, insertion, buffer overflow, etc.  After examining the various types of attacks, select the two that you believe are the most successful, and explain why. Include an explanation as to how the hacker tools are used. Evaluate the available tools and explain which one(s) appeared most frequently in your searches. Analyze the predominant ones discussed and available for download.

CIS 534 Week 2 Discussion

CIS 534 Week 2 Discussion


Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
  • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?



Latest A+ Graded at link below















Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
  • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
  • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.


  • CIS 534 Week 2 Discussion


    Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
    • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
    Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
    • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
    Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
    • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
    Most Virtual Private Networks (VPNs) encrypt their traffic to make it secure. Imagine that you are working for a company that has asked you to examine the various types of encryptions. The company has asked you to choose the one you would recommend.
    • VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?
    VPNs are used to establish a secure remote connection.  Examine whether they are totally secure and if not, what additional features would make them so.  Would you use a VPN to establish a remote connection with the hypothetical company you are working for?  Why or why not? What type of encryption (encryption method, # of bits) would you recommend and why? Is there a standard for encryption on which you can rely?

CIS 534 Week 1 Discussion

CIS 534 Week 1 Discussion


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.



Latest A+ Graded at link below















After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

CIS 534 Week 1 Discussion


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.


Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.
  • Examine two advantages and two disadvantages of both the IDS and IPS.  Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other.  Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall.  Provide the rationale for your response.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

CIS 534 Assignment 1 Defense in Depth

CIS 534 Assignment 1 Defense in Depth



Assignment 1: Defense in Depth
Due Week 5 and worth 80 points

Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:




Latest A+ Graded at link below








Corporate Site (Chicago)
  • All servers exist here (Web server, file server, print server, mail server, ftp server)
  • Connection to the Internet (50mbps)
  • 300 employees who only need access to local corporate resources and the Internet

1 Remote Site (8 miles away)
  • 20 employees who need access to all resources at corporate  plus the Internet
  • Connection to the Internet (3mbps)

Write a paper in which you:
  1. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
    1. All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)
    2. The interconnections between network devices
    3. The end user (client) devices (desktops, laptops)
    4. The Internet cloud, generically, to represent your network’s interface to the Internet
Note: The graphically depicted solution is not included in the required page length.
  1. Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
  2. Use at least four(4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.
  3. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.


Assignment 1: Defense in Depth
Due Week 5 and worth 80 points

Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

Corporate Site (Chicago)
  • All servers exist here (Web server, file server, print server, mail server, ftp server)
  • Connection to the Internet (50mbps)
  • 300 employees who only need access to local corporate resources and the Internet

1 Remote Site (8 miles away)
  • 20 employees who need access to all resources at corporate  plus the Internet

    CIS 534 Assignment 1 Defense in Depth



    Assignment 1: Defense in Depth
    Due Week 5 and worth 80 points

    Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

    Corporate Site (Chicago)
    • All servers exist here (Web server, file server, print server, mail server, ftp server)
    • Connection to the Internet (50mbps)
    • 300 employees who only need access to local corporate resources and the Internet

    1 Remote Site (8 miles away)
    • 20 employees who need access to all resources at corporate  plus the Internet
    • Connection to the Internet (3mbps)

    Write a paper in which you:
    1. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts:
      1. All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others)
      2. The interconnections between network devices
      3. The end user (client) devices (desktops, laptops)
      4. The Internet cloud, generically, to represent your network’s interface to the Internet
    Note: The graphically depicted solution is not included in the required page length.
    1. Describe the flow of data through your network, and explain how your network design provides multiple layers of security.
    2. Use at least four(4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.
    3. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.


    Assignment 1: Defense in Depth
    Due Week 5 and worth 80 points

    Oftentimes, the process of implementing security opens one’s eyes to other forms of security not previously considered. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following:

    Corporate Site (Chicago)
    • All servers exist here (Web server, file server, print server, mail server, ftp server)
    • Connection to the Internet (50mbps)
    • 300 employees who only need access to local corporate resources and the Internet

    1 Remote Site (8 miles away)
    • 20 employees who need access to all resources at corporate  plus the Internet

CIS 534 Week 5 Discussion

CIS 534 Week 5 Discussion


Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.



Latest A+ Graded at link below














After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

CIS 534 Week 5 Discussion


Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

Network Security Storage & Cloud Storage
Compliance audits take place in corporations on a regular basis. In many instances, an organization’s security posture is driven by such compliance mandates, whether they are administered by the government, a third party, or prompted by internal measures. In addition, the security of network storage and cloud storage are also frequently discussed among industry professionals.
  • Examine the prevalence of honeypots and honeynets. Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why. Cloud backup storage is growing in popularity.  Examine the advantages and disadvantages of an organization using cloud backup storage.  Explain whether you would recommend using cloud backup storage.
After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

CIS 534 Case Study The Ethical Hacker

CIS 534 Case Study The Ethical Hacker



Case Study: The Ethical Hacker
Due Week 4 and worth 80 points

Imagine for a moment that you are a hacker — an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any politics of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security. These include firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security sufficiently to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.




Latest A+ Graded at link below









Write a paper in which you:
  1. Explain your method of attack and operation within reasonable parameters of the law.
  2. Discuss specific malware, social engineering, or any other type of attacks you would deploy to achieve your desired goals.
  3. Assess the hurdles you expect and how you plan to overcome them.
  4. Determine how you would remain anonymous and avoid detection.
  5. Use at least four (4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:
  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Explain the concepts of network security and associated ethical issues in addressing exploits.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Case Study: The Ethical Hacker
Due Week 4 and worth 80 points

Imagine for a moment that you are a hacker — an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any politics of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security. These include firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security sufficiently to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a paper in which you:
  1. Explain your method of attack and operation within reasonable parameters of the law.
  2. Discuss specific malware, social engineering, or any other type of attacks you would deploy to achieve your desired goals.
  3. Assess the hurdles you expect and how you plan to overcome them.
  4. Determine how you would remain anonymous and avoid detection.
  5. Use at least four (4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.

CIS 534 Case Study The Ethical Hacker



Case Study: The Ethical Hacker
Due Week 4 and worth 80 points

Imagine for a moment that you are a hacker — an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any politics of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security. These include firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security sufficiently to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a paper in which you:
  1. Explain your method of attack and operation within reasonable parameters of the law.
  2. Discuss specific malware, social engineering, or any other type of attacks you would deploy to achieve your desired goals.
  3. Assess the hurdles you expect and how you plan to overcome them.
  4. Determine how you would remain anonymous and avoid detection.
  5. Use at least four (4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:
  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Explain the concepts of network security and associated ethical issues in addressing exploits.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
Case Study: The Ethical Hacker
Due Week 4 and worth 80 points

Imagine for a moment that you are a hacker — an ethical one. You are called upon by law enforcement to hack into a business network known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any politics of the job and that your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security. These include firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security sufficiently to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a paper in which you:
  1. Explain your method of attack and operation within reasonable parameters of the law.
  2. Discuss specific malware, social engineering, or any other type of attacks you would deploy to achieve your desired goals.
  3. Assess the hurdles you expect and how you plan to overcome them.
  4. Determine how you would remain anonymous and avoid detection.
  5. Use at least four (4) quality resources in this assignment. Note:Wikipedia and similar websites do not qualify as quality resources.