Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

October 31, 2025
October 31, 2025

Community Profile Guide

First: Provide a detailed overview of the community demographics including factors such as population, racial makeup, crime rate, income levels, etc. What are the most important things to know about your city? Are there any interesting facts? Also discuss why it is important for social workers to be knowledgeable of their communities.

Second: Evaluate the community where you live in two of the categories listed below . Identify the strengths (things your area may be doing well to address the issue) and needs (why is it an issue, what are the stats, what is its impact on the community) associated with both categories. Data and factual information should be provided to support need. Select two categories from the list of social issues below:

· Medical care/facilities and services

· Mental health services

· Crime

Community Profile Guide

· Homelessness rate (adults, children, families)

· Substance abuse

· Poverty

· School systems

· Environmental Issues

Third: Discuss where social workers are employed in your community. Consider settings such as schools, hospitals, prisons, detention facilities, nursing homes, social service agencies, afterschool programs, Head Start, Veteran’s services, mental health agencies, etc. Name specific places . For instance, Freedom 424, an anti-trafficking organization in Forest, VA. employs social workers. Saying an anti-trafficking organization would not be enough information.

At least 3 community/environment or government websites, databases, etc. should be cited, for a minimum of 3 sources. There is not a maximum number of sources. Please follow the instructions carefully, use the template provided, and use current APA format. “Upload” your paper as a Word document; PDFs cannot be graded.

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

  • Provide a detailed overview of the community demographics including factors such as population, racial makeup, crime rate, income levels, etc. What are the most important things to know about your city? Are there any interesting facts? Also discuss why it is important for social workers to be knowledgeable of their communities.,

  • Evaluate the community where you live in two of the categories listed below., Identify the strengths and needs associated with both categories.,

  • For each category selected provide data and factual information to support need.,

  • Discuss where social workers are employed in your community; name specific places.,

  • Cite at least 3 community/environment or government websites, databases etc. in APA format.

October 30, 2025
October 30, 2025

Relational Set Operators

A relational database model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as “union” and “intersect” may be used.

  • Describe a business scenario where a “union” relational set operator may be used to merge two similar data sets.
  • Analyze the analysis and data consistency advantages of using a “union” operator rather than simply merging two data sets into one result table, within the context of your business scenario.

Relational Set Operators

  • Describe a business scenario where a “union” relational set operator may be used to merge two similar data sets,

  • Analyze the analysis and data consistency advantages of using a “union” operator rather than simply merging two data sets into one result table,


✅ Comprehensive General Answer

A practical business scenario where a UNION operator is useful occurs in a multi-store retail company that maintains separate customer purchase tables for each location. For example, Store A and Store B might each track customer loyalty activity independently in tables with the same structure:

StoreA_Customers (CustomerID, Name, Email)
StoreB_Customers (CustomerID, Name, Email)

When leadership wants to analyze the entire organization’s customer base (e.g., for marketing or revenue forecasting), they could combine these tables using:

SELECT CustomerID, Name, Email FROM StoreA_Customers
UNION
SELECT CustomerID, Name, Email FROM StoreB_Customers;

✅ Advantages of Using UNION Instead of Simply Merging Tables

1️⃣ Data Consistency Through Automatic Duplicate Removal

  • UNION removes duplicate rows by default.

  • If the same customer shops at both stores, their record appears only once in the result set.

  • This preserves data integrity and prevents double-counting during analysis such as:

    • Total customer unique count

    • Email marketing campaigns (avoiding duplicate sends)

    • Loyalty reward calculations

Without UNION, manually merging (appending) datasets could create inconsistencies that distort business decisions.


2️⃣ Efficient Analysis Without Permanently Modifying Data

  • UNION does not require altering existing production tables.

  • The combined dataset is query-based, not stored permanently.

  • Analysts can generate different merged views on demand based on business needs:

    • Seasonal shopping analysis

    • Regional vs. company-wide trends

    • Customer segmentation studies

This supports dynamic reporting while maintaining clean, isolated operational datasets.


✅ Summary

The UNION operator provides a cleaner, more reliable way to aggregate structured datasets across business units. It helps remove redundant rows automatically and avoids the risks and costs of physically merging data into a new table. As a result, leadership receives accurate, consistent, and scalable analytical insights — essential for data-driven decision making in modern organizations.

October 30, 2025
October 30, 2025

Data Quality & Concurrency

  • Recommend at least three specific tasks that could be performed to improve the quality of data sets using the software development life cycle (SDLC) methodology. Include a thorough description of each activity per each phase.
  • Recommend the actions that should be performed to optimize record selections and to improve database performance from a quantitative data quality assessment.
  • Suggest three maintenance plans and three activities that could be performed to improve data quality.
  • Suggest methods that would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.
  • Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking while the database is in operation.

Data Quality & Concurrency

Read the following articles and incorporate them into your paper. You are encouraged to review additional articles as well:

  • Recommend at least three specific tasks that could be performed to improve the quality of data sets using the software development life cycle (SDLC) methodology. Include a thorough description of each activity per each phase,

  • Recommend the actions that should be performed to optimize record selections and to improve database performance from a quantitative data quality assessment,

  • Suggest three maintenance plans and three activities that could be performed to improve data quality,

  • Suggest methods that would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment,

  • Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking while the database is in operation,


Comprehensive answer

Below I provide practical, actionable recommendations that map to SDLC phases, database tuning and record-selection optimizations, maintenance plans, concurrency-control methods (with lock granularity guidance), and analyses of how these choices reduce security risks and avoid excessive record-level locking in multiuser environments.


1) SDLC-based tasks to improve data quality (three tasks per SDLC phase)

SDLC phases: Requirements → Design → Implementation (Development) → Testing → Deployment → Maintenance.

A. Requirements (Task 1: Data quality rules specification)

  • Activity: Define explicit data quality (DQ) requirements up front: required fields, value ranges, referential integrity, uniqueness constraints, format/regex rules, completeness thresholds, acceptable error rates, and SLAs for data timeliness.

  • Why: Clear DQ rules enable validation logic to be designed rather than patched later. (ISO/IEC 25012)

B. Design (Task 2: Data model normalization & stewardship design)

  • Activity: Create a canonical data model normalized to eliminate redundancy where appropriate; identify master data sources and appoint data stewards for each domain; design lineage and metadata capture.

  • Why: Good schema design prevents many quality issues (inconsistency, update anomalies) and assigns ownership for remediation.

C. Implementation (Task 3: Embedded validation & ETL quality controls)

  • Activity: Implement validations at the point of capture (UI constraints, client-side + server-side checks), and design ETL pipelines with staged cleansing (profiling → standardization → enrichment → deduplication) and transactional rollback on quality violations. Use a data quality engine (e.g., OpenRefine, Talend, or commercial DQ tools).

  • Why: Fixing bad data at entry and during ETL reduces downstream errors and rework.

D. Testing (Task 4: Data quality testing & synthetic scenario tests)

  • Activity: Create test suites for data quality: unit tests for validation functions, integration tests for ETL, regression tests for schema evolution, and fuzz and boundary tests. Include data-driven tests that exercise large volumes to detect performance-related corruption.

  • Why: Testing verifies that rules work at scale and that changes do not regress quality.

E. Deployment (Task 5: Monitoring instrumentation & rollout controls)

  • Activity: Deploy with feature flags or phased rollouts, and activate DQ monitoring dashboards (data completeness, error rates, latency). Configure automated alerts for DQ metric thresholds.

  • Why: Early detection in production prevents large-scale contamination.

F. Maintenance (Task 6: Continuous profiling & feedback loop)

  • Activity: Schedule automated profiling (weekly/monthly) to monitor drift, and maintain a feedback loop from consumers to producers with issue-tracking for data defects. Maintain a data catalogue and lineage to speed fixes.

  • Why: Data quality is ongoing — monitoring and governance preserve quality over time.

(These tasks align with academic guidance on lifecycle-based data quality management and software engineering best practices — see S. B. et al., 2019; ISO/IEC 25012.)


2) Actions to optimize record selections and improve DB performance from quantitative DQ assessment

After running a quantitative DQ assessment (metrics like completeness, uniqueness, accuracy, consistency, timeliness), take the following actions:

  1. Indexing strategy based on access patterns

    • Create composite and filtered indexes for frequently-used query predicates revealed by profiling. Use statistics to tune which fields are selective and deserve indexes to optimize record selection.

  2. Partitioning & archiving

    • Use range or hash partitioning on high-volume tables (date-based partitions for time-series) and implement a data retention/archival policy for stale records, reducing the working set and improving query performance.

  3. Materialized views and pre-aggregation

    • For complex analytic queries on large sets, create materialized views or summary tables updated incrementally to avoid scanning base tables repeatedly.

  4. Denormalization where justified

    • Where repeated joins are expensive yet data volatility is low, denormalize selective columns to improve read-heavy workloads, while ensuring processes to maintain consistency.

  5. Statistics & query plan maintenance

    • Regularly update optimizer statistics and capture query plans to identify and fix slow queries (rewrites, hints, or indexes).

  6. Use data quality filters in queries

    • Add predicates to exclude records flagged by DQ assessment (e.g., null keys or flagged invalid records) or route them to special handling pipelines.

Result: These steps reduce I/O, decrease full-table scans, and enable faster, cleaner record selection — measured quantitatively via reduced average query latency, lower CPU I/O, and improved transaction throughput.


3) Maintenance plans (three) and associated activities (three) to improve data quality

Maintenance plans

  1. Scheduled Data Profiling & Remediation Plan (weekly/monthly)

    • Activities: Run automated profiling jobs; generate DQ scorecards; automatically quarantine records failing thresholds; trigger workflow tickets for stewards.

  2. ETL/Streaming Pipeline Health & Reconciliation Plan

    • Activities: Implement end-to-end checksums and row counts between source and target; anomaly detection for throughput spikes; automatic rollback/replay procedures for pipeline failures.

  3. Schema & Change-Control Governance Plan

    • Activities: Use migration tooling (versioned migrations), require DQ regression tests for schema changes, and create backward-compatible migration policies.

Other activities to improve quality: periodic deduplication runs, master data reconciliation, and automated enrichment (geocoding, reference data lookups).


4) Methods for proactive concurrency control and lock granularity; security assessment

Recommended concurrency methods

  1. Multi-Version Concurrency Control (MVCC)preferred

    • How it works: Readers access snapshot versions; writers create new versions, minimizing read locks. Implemented in PostgreSQL, Oracle, MySQL/InnoDB.

    • Lock granularity: Row-level for writes, no read locks for most reads.

    • Security benefits: Reduces need for escalated locks that expose record timing or allow lock-based inference attacks; audit trails can track version changes. Snapshot isolation reduces contention and keeps transactions short.

  2. Optimistic Concurrency Control (OCC)

    • How it works: Allow transactions to proceed without locks, validate on commit (version checks); abort on conflict.

    • Lock granularity: Minimal locking, mainly at commit.

    • Security benefits: Short-lived or no locks reduce attack surface for lock-based denial; less exposure to lock-table exhaustion attacks.

  3. Two-Phase Locking (2PL) with careful granularity (row-level preferred over page/table)

    • How it works: Acquire locks as needed, hold until commit. Use fine-grained row locks; escalate only when necessary.

    • Lock granularity: Start with row-level; monitor for frequent escalations and tune thresholds.

    • Security benefits: Ensures serializability; with role-based access and audit, unauthorized lock acquisitions are detectable.

October 30, 2025
October 30, 2025
Power Sector Protection
  • List and categorize three project risks,

  • Was the response plan adequate to mitigate these risks?,

  • How would you respond differently now?,

  • Include experience from a small or large project,

  • Reference Lewis (2020) or relevant concepts,


✅ Comprehensive General Response

Drawing from experience on an IT network upgrade project, several risks emerged that align with standard risk categories used in project management and critical infrastructure discussions (Lewis, 2020).

1️⃣ Risk Identification & Categorization

Risk Category Description
Server hardware delivery delays Supply Chain Risk Vendors were late delivering core components, threatening timeline and dependencies
Misconfigured network settings during cutover Operational/Technical Risk Configuration errors caused short outages and work stoppages
Staff resistance to new technology Human/Organizational Risk Lack of training and change anxiety slowed implementation and adoption

These risks reflect interconnected vulnerabilities similar to those seen in critical infrastructure protection where delays, human performance, and technology missteps can cascade into larger disruptions (Lewis, 2020).


2️⃣ Adequacy of Response Plans

Risk Original Response Plan Adequacy
Supply chain delays Reactive tracking only ❌ Inadequate — delays caused critical schedule slip
Misconfiguration / errors Backup configs and after-hours migration ✅ Partially adequate — outages still occurred but minimized
Staff resistance Quick-reference guides distributed ❌ Insufficient — didn’t address fear or lack of skill

Overall, the project relied too heavily on reactive measures instead of proactive planning.


3️⃣ What I Would Do Differently Now

Risk Improved Approach
Supply chain delays Multiple vendor sourcing, contingency inventory, milestone-based procurement tracking
Misconfigurations More testing in a fully simulated environment + phased rollout instead of a single cutover
Staff resistance Hands-on training sessions, change champions within teams, early communication about benefits

These changes reflect the risk mitigation mindset emphasized in homeland security and infrastructure protection—anticipate vulnerabilities before they impact critical functions (Lewis, 2020).


Key Takeaways

  • Even small IT projects mirror principles of critical infrastructure protection—redundancy, preparation, and human reliability are vital.

  • The best risk strategy combines:
    ✅ Preventive measures
    ✅ Strong communication
    ✅ Contingency plans

  • Modern projects must assume unavoidable uncertainty and design resiliency into every phase.


Reference

Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

October 30, 2025
October 30, 2025

Power Sector Protection

Begin by researching and identifying a critical infrastructure sector or component (there are 18 of them to choose from) such as power, finance and banking, or municipal services. Perform an analysis of the selected component, identifying its vulnerabilities. After conducting your research, either in the CSU Online Library or on the Internet, propose improvements in the protection of that component. Your paper must contain the following elements.

1. An introduction to describe your chosen critical infrastructure sector or component

2. An analysis and assessment of the critical infrastructure importance and vulnerabilities of the infrastructure, plus strategies to deal with the threats and vulnerabilities

Power Sector Protection

3. A section to identify any interdependencies with other sectors

4. A proposal with strategies for improvements to enhance the protection and reduce the vulnerability of the infrastructure or component

5. A comprehensive listing of the references consulted in conducting the evaluation

Your paper should be a minimum of three pages in length and in APA format. You may use your textbook as source material for your assignment. You must also use three outside sources that can come from the CSU Online Library. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.

Power Sector Protection

Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley. https://online.vitalsource.com/#/books/9781119614562

  • An introduction to describe your chosen critical infrastructure sector or component,

  • An analysis and assessment of the critical infrastructure importance and vulnerabilities of the infrastructure, plus strategies to deal with the threats and vulnerabilities,

  • A section to identify any interdependencies with other sectors,

  • A proposal with strategies for improvements to enhance the protection and reduce the vulnerability of the infrastructure or component,

  • A comprehensive listing of the references consulted in conducting the evaluation,


Introduction

I selected the Electric Power (Energy) sector, a foundational critical infrastructure component that generates, transmits, and distributes electricity to businesses, government, and households. Reliable electrical service underpins modern society — powering communications, water/waste systems, transportation, healthcare, finance, and emergency services — so disruptions have broad and immediate consequences (Lewis, 2020). The growing modernization of grid assets (smart grid, distributed energy resources) and expanded connectivity between operational technology (OT) and information technology (IT) environments have increased attack surface and interdependence, making analysis and targeted protection essential (Qu et al., 2023).


Importance, Vulnerabilities, and Risk Assessment

Importance

Electric power enables nearly every other critical function: hospitals use it for life-sustaining equipment, traffic systems require it for safety, and data centers depend on continuous power for services. The sector’s centrality means outages cascade rapidly across other sectors and communities (U.S. DOE, 2016).

Key vulnerabilities

  1. Cybersecurity gaps in OT/ICS/SCADA: Many control systems (PLCs, RTUs, SCADA servers) were designed with availability, not security, in mind. Legacy protocols, default credentials, and insufficient patching create exploitable weaknesses (NIST, 2015; Alanazi et al., 2023).

  2. Supply-chain and vendor vulnerabilities: Insecure third-party components or firmware (hard-coded passwords, unpatched modules) have been exploited in advisories and incidents (Wired; CISA advisories).

  3. Increased attack surface from digitization: Smart meters, telecontrol links, and IoT/IIoT endpoints extend connectivity into many field devices, multiplying potential entry points (Wadhawan et al., 2018).

  4. Physical threats and vandalism: Substation attacks and physical tampering remain a risk, as documented by increasing incidents of shooting and vandalism at grid infrastructure (Reuters, 2024).

  5. Operational complexity and human factors: Misconfiguration, insufficient operator training, and lack of coordinated incident response raise risk (Qu et al., 2023).

Threat scenarios

  • Nation-state or advanced persistent threat (APT) targeting grid control to cause outages (Crash Override, Pipedream examples).

  • Ransomware or supply-chain compromise of vendor software used in operations.

  • Physical attacks on substations or distribution lines causing localized outages with cascading effects.


Interdependencies with Other Sectors

The power sector both supports and depends on multiple sectors:

  • Communications/ICT relies on power for network equipment; conversely, power systems use communication networks for telemetry and control (Lewis, 2020).

  • Water and wastewater require electricity for pumps and treatment; power loss risks public health.

  • Transportation infrastructure (traffic signals, EV charging) depends on electricity.

  • Healthcare and emergency services require resilient power sources (generators, prioritized restoration).

  • Finance systems rely on power and telecommunications for transactions — outages affect economic stability (DOE, 2016).

These interdependencies mean an attack or failure in the power sector quickly propagates, so resilience in power supports whole-of-society continuity.


Proposed Improvements & Protective Strategies

To reduce vulnerability and enhance protection, implement a layered, risk-informed strategy combining technical, operational, and policy measures.

1. Strengthen OT/ICS Cybersecurity (NIST SP 800-82, CISA guidance)

  • Network segmentation: Enforce strict separation between IT and OT networks using firewalls, data diodes where necessary, and demilitarized zones (DMZ) for safe data exchange. Apply least-privilege ACLs for control traffic (NIST, 2015).

  • Patch and configuration management: Develop vendor-coordinated patch processes and compensating controls for devices that cannot be patched rapidly; eliminate default credentials and enforce strong authentication (Alanazi et al., 2023).

  • Endpoint protection & monitoring for OT: Deploy specialized IDS/IPS for ICS protocols (e.g., Suricata/Zeek tuned for Modbus/DNP3) and integrate telemetry into SIEM for cross-domain correlation (NIST SP 800-94).

  • Hardening and change control: Use secure baselines, whitelisting, and enforced change management for OT devices.

2. Supply-chain security & vendor assurance

  • Secure procurement practices: Require vendors to follow secure development lifecycle practices, supply-chain transparency, and rapid-patch commitments. Use SBOMs (Software Bill of Materials) and third-party assessments.

  • Diversity and redundancy: Avoid single-vendor dependencies for critical relays/RTUs; maintain alternative spare inventories.

3. Physical security and resilience

  • Harden critical substations: Improve fencing, surveillance, lighting, and local access controls; coordinate with local law enforcement for rapid response (DOE, 2016).

  • Resilient power options for critical facilities: Encourage microgrids, on-site generation, and prioritized blackstart capabilities for hospitals and emergency services (CISA Resilient Power Best Practices, 2023).

4. Incident response & exercises

  • Cross-sector exercises: Conduct tabletop and full-scale exercises that include utilities, telecom, water, and emergency managers. Implement playbooks for cyber–physical incidents (CISA/NERC guidance).

  • Information sharing: Participate in ISACs (e.g., E-ISAC) and leverage government advisories for threat intelligence and coordinated mitigation.

5. Policy, workforce, and training

  • Operator training: Simulators and regular cybersecurity drills for control room staff.

  • Workforce development: Invest in cyber/OT talent pipelines and retention.

  • Regulatory alignment: Adopt and enforce standards (NERC CIP where applicable) and implement voluntary frameworks such as NIST CSF for broader resilience.

October 30, 2025
October 30, 2025

IDS & IPS Security Tools

Network or host-based intrusion detection systems (IDS) and network or host-based intrusion prevention systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.

Complete the following for both IDS and IPS:

  • Examine two advantages and two disadvantages of each system.
  • Explain where you recommend using each system, or both systems, and why.
  • Provide a specific example of each system that meets the budget and defensive needs of a home or small office.
    • Include the strengths and weaknesses.
  • Provide a specific example of each system that meets the budget and defensive needs of a large corporate office.
    • Include the strengths and weaknesses.

IDS & IPS Security Tools

  • Two advantages of IDS?,

  • Two disadvantages of IDS?,

  • Two advantages of IPS?,

  • Two disadvantages of IPS?,

  • Where should each system be used and why?,


✅ Comprehensive General Answer

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are critical elements in layered cybersecurity defense, helping organizations detect and mitigate malicious activity across networks or individual hosts.


🔹 Intrusion Detection System (IDS)

An IDS monitors traffic and alerts administrators to suspicious activity but does not actively block threats.

Advantages

  1. Visibility into network activity — Helps detect unknown or stealth attacks that firewalls may miss.

  2. Useful forensic tool — Logs help analysts investigate attack patterns and vulnerabilities.

⚠️ Disadvantages

  1. False positives can overwhelm analysts and reduce operational efficiency.

  2. Detection only — cannot automatically stop attacks, meaning damage may occur before action is taken.


🔹 Intrusion Prevention System (IPS)

An IPS monitors and automatically blocks detected threats in real-time.

Advantages

  1. Active threat prevention — stops intrusions before they execute.

  2. Improves compliance and network hygiene by blocking policy violations automatically.

⚠️ Disadvantages

  1. Can block legitimate traffic if misconfigured, causing business disruptions.

  2. Higher cost and complexity to install, tune, and maintain.


✅ Recommended Deployment

Environment Best Use Rationale
Small office/home IDS or combined IDS/IPS in security appliance Affordable, easier to manage
Large enterprise Both IDS & IPS in multiple layers Provides early detection and active prevention

Using both systems together enables a defense-in-depth model:

  • IDS = monitoring + alerting

  • IPS = enforcement + protection


✅ Budget-Friendly Examples

🏠 Home or Small Office

Example: UniFi Dream Machine (UDM)

  • Type: Integrated firewall + IDS/IPS

  • Strengths: Affordable, easy UI, protects Wi-Fi and wired networks

  • Weaknesses: Limited performance if IDS/IPS enabled on high-speed internet


✅ Corporate Environment Examples

🏢 Large Corporate Office

Example: Palo Alto Networks PA Series

  • Strengths: Advanced threat prevention, minimal false positives, scalable

  • Weaknesses: Expensive licensing and skilled staff required

Example: Snort IDS (open-source) — used for network-wide visibility

  • Strengths: Highly customizable, free, widely supported

  • Weaknesses: Analyst time required to manage alerts and tuning


✅ Summary Table

System Best Qualities Ideal Use Key Limitation
IDS Detect stealth activity, forensics Enterprise monitoring False positives, no blocking
IPS Stops attacks in real-time Edge security in all organizations Risk of blocking legit traffic

✅ Conclusion

Both IDS and IPS deliver unique but complementary capabilities. Implementing them together creates a proactive and resilient security posture across environments from home offices to enterprise networks.


If you’d like, I can also:
✅ Provide APA citations
✅ Add graphics or a network deployment diagram
✅ Expand this to a full paper or discussion post format

October 30, 2025
October 30, 2025
Cybersecurity Framework Reflection
  • What steps illustrate how an organization could use the Cybersecurity Framework to create or improve a cybersecurity program?,

  • What key messages and ideas will you take away from this course?,

  • What surprised you about the class?,

  • What has changed in your opinion?,

  • How might that move forward into your professional practice?,


✅ Comprehensive General Answer

The NIST Cybersecurity Framework (CSF) provides organizations with a structured method to build or enhance their cybersecurity posture. To illustrate implementation, I would take the following steps:

1️⃣ Identify Current State
Assess existing cybersecurity capabilities and risks, including assets, data sensitivity, and critical infrastructure dependencies (Lewis, 2020).
2️⃣ Determine Target State
Define where the organization aims to be based on industry standards, threats, and regulatory requirements.
3️⃣ Gap Analysis & Prioritization
Compare current conditions to target goals and prioritize actions by likelihood and impact of threats.
4️⃣ Develop & Implement Action Plans
Apply appropriate controls across the framework’s core functions—Identify, Protect, Detect, Respond, Recover.
5️⃣ Monitor, Evaluate, Improve
Cybersecurity needs continuous review, updating policies, training, and technologies as threats evolve.


🔹 Key Messages & Ideas Taken from the Course

A major takeaway is the recognition that critical infrastructure is deeply interconnected, meaning a vulnerability in one sector can cascade into others. The course emphasized that cybersecurity is not solely a technical function—it requires organizational policy, leadership engagement, and risk-informed decision-making (Lewis, 2020).

Another key message is the importance of defense in depth, integrating multiple layers of security to reduce single points of failure.


🔹 What Surprised Me

I was surprised by how much human behavior and organizational culture impact cybersecurity success. Technical controls alone are not enough — training and awareness are vital.


🔹 What Has Changed in My Perspective

I now better understand cybersecurity as a national security issue, not just an IT concern. Threats to power grids, healthcare networks, and communication systems can disrupt the entire nation.


🔹 Application to Professional Practice

Going forward, I would adopt a risk-driven mindset in my cybersecurity work. I plan to:

  • Incorporate NIST CSF into organizational planning

  • Promote continuous monitoring and improvement

  • Advocate for stronger employee security awareness programs

This course reinforced that protecting critical infrastructure requires collaboration, vigilance, and proactive planning.


✅ Reference — APA 7 Format

Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

October 30, 2025
October 30, 2025

Project Contracts

Choose a project with a relatively simple description (building a LAN, designing a web page, inventing a new communication device, etc.).  Which type of contract structure (Fixed total price, Fixed unit price, Fixed price with incentive, Fixed fee with price adjustment) and what procurement documents (Request for Proposal, Invitation for Bid, Request for Quotation/Proposal) would you recommend for this project and why?

Project Contracts

  • Which type of contract structure would you recommend for this project and why?,

  • Which procurement documents would you recommend for this project and why?,

  • Choose a project with a relatively simple description,

  • (Explain) what makes this project suitable for the chosen contract type?,

  • (Explain) why the chosen procurement documents align with the needs of the project?,


Comprehensive Answer

For this discussion, I selected a small LAN (Local Area Network) installation project for a business office with approximately 20 employees. The objective of the project is to install network cabling, switches, a router/firewall, and wireless access points to support basic internal connectivity and secure internet access. The scope is well-defined, and outcomes are measurable.


✅ Recommended Contract Type: Fixed Total Price Contract

A Fixed Total Price contract is most appropriate because:

  • The project scope is clearly defined (specific number of drops, devices, and installation requirements).

  • Costs can be accurately estimated in advance.

  • The risk of cost overrun primarily shifts to the vendor, incentivizing efficient work.

  • There are limited unknowns or changes expected in the technical requirements.

According to the Project Management Institute (PMI), fixed-price contracts are ideal when requirements are stable and deliverables are measurable (PMI, 2021).

This structure minimizes financial uncertainty for the purchaser and ensures vendors remain accountable for successful delivery.


✅ Recommended Procurement Document: Invitation for Bid (IFB)

An Invitation for Bid is the best match because:

  • The technical specifications are already established (e.g., number of ethernet ports, cable category, equipment models).

  • Vendor selection can be based primarily on cost and compliance.

  • It is ideal for straightforward projects with little need for negotiation.

IFBs work well when expectations are clear, and the purchaser wants competitive pricing from qualified vendors (Garrett, 2019).


🔍 Why These Fit This Project

Project Element Contract Advantage Procurement Advantage
Clearly defined LAN installation Fixed cost predictability Price-based vendor competition
Low risk of changes Vendor assumes cost overrun Minimal negotiation needed
Objective deliverables Easy performance measurement Transparent bidding process

✅ Conclusion

Because a LAN setup is low risk, easy to scope, and simple to measure, a Fixed Total Price contract combined with an Invitation for Bid provides the greatest efficiency, fairness, and accountability in procurement.


📌 References (APA 7)

Garrett, G. A. (2019). World class contracting (7th ed.). CCH Incorporated.
Project Management Institute. (2021). A guide to the project management body of knowledge (PMBOK® Guide) (7th ed.).

October 30, 2025
October 30, 2025

Layered Network Design

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.

The specific course learning outcome associated with this assignment is:

  • Recommend best security practices to achieve business objectives based on risk assumptions.

Layered Network Design

Instructions

Design a network that incorporates the following:

  • One corporate site (Chicago).
    • All servers exist here (web server, file server, print server, mail server, FTP server).
    • Connection to the Internet (50 MBps).
    • 300 employees who only need access to local corporate resources and the Internet.
  • One remote site (8 miles away).
    • 20 employees who need access to all resources at corporate, plus the Internet.
    • Connection to the Internet (3 MBps).

Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:

  • Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:
    • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
    • The interconnections between network devices.
    • Connections to end-user (client) devices (desktops, laptops).
    • Connections from the Internet cloud to the network input.

Part 2

Write a 6-10 page paper in which you:

  • Describe the flow of data through the network, citing specific, credible sources.
    • Assume data begins at the remote site.
    • Data flow may be monitored by an IDS.
  • Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
  • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

Submission Requirements

Import completed diagrams or charts into your paper before submitting your work.

  • Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following: All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others), The interconnections between network devices, Connections to end-user (client) devices (desktops, laptops), Connections from the Internet cloud to the network input,

  • Describe the flow of data through the network citing specific credible sources. Assume data begins at the remote site. Data flow may be monitored by an IDS,

  • Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach citing specific credible sources that support your assertions and conclusions,

  • Support your main points assertions arguments or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence,

  • Import completed diagrams or charts into your paper before submitting your work,

October 30, 2025
October 30, 2025

Firewall Security Discussion

For this discussion:

  • Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend a hardware or software firewall. Provide the rationale for your response.
  • Consider the importance of your home or personal network security. Discuss where to use a firewall to secure a home office. Provide a rationale for your response.

Firewall Security Discussion

  • Two advantages of hardware firewalls?,

  • Two disadvantages of hardware firewalls?,

  • Two advantages of software firewalls?,

  • Two disadvantages of software firewalls?,

  • Hardware or software firewall recommendation and why?,

  • Where to use a firewall to secure a home office and why?,


✅ Comprehensive General Answer

Firewalls act as a protective barrier between trusted and untrusted networks, inspecting traffic and blocking potential threats. Both hardware and software firewalls are commonly used to secure networks, but each comes with strengths and limitations.


🔹 Hardware Firewall

A hardware firewall is a physical device placed between a network and the internet, often within routers.

Advantages

  1. Network-wide protection
    One device can protect all connected systems simultaneously—ideal for multi-user environments.

  2. Better performance
    Dedicated processing reduces the load on individual devices, offering faster filtering of traffic.

⚠️ Disadvantages

  1. Higher cost and complexity
    Hardware firewalls can be more expensive and require networking knowledge to configure.

  2. Less customizable per device
    Harder to tailor security policies to individual computers compared to software firewalls.


🔹 Software Firewall

Installed directly on individual devices (PCs, laptops, smartphones).

Advantages

  1. Customizable protection
    Rules can be set per application or per user—useful for blocking specific programs.

  2. Better visibility
    Users receive alerts when suspicious activity occurs on their own system.

⚠️ Disadvantages

  1. Resource consumption
    Uses system memory/CPU and may reduce performance, especially on older devices.

  2. One device at a time
    Protection does not extend to other devices on the same network.


✅ Recommendation & Rationale

I recommend using both hardware and software firewalls together (a layered approach).

Rationale:

  • Hardware firewalls block threats before reaching devices

  • Software firewalls offer additional application-level protection

  • Defense-in-depth is considered a best practice in cybersecurity

This combination minimizes vulnerabilities and strengthens overall network resilience.