Telecommucations | Telecommunications Engineering homework help



Case Assignment

The B-LIT, LLC is a new startup that wishes to sale their new phone to the public called LIT-phone, a more secure version of the phone to business organizations, called the LIT-phone B+, and highly secure version of the phone, called the LIT-phone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Orlando, FL and Anaheim, CA based upon the following specifications:


1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350’x350’.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Orlando location.

5. There will be a failover data center at the Anaheim location.

6. Each location should be protected from intrusions that are not limited to state change attacks. 

7. The Orlando location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well. 

8. There will be database servers located at the Anaheim site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above. 

1. You should submit a network drawing listing the network’s topology including any necessary hardware. 

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Assignment | Engineering homework help


Development plans: 2 pages, APA format

· I’m currently pursuing my Master’s in Industrial Engineering

· Career Goals as a Validation Engineer

· How the Internship as a Validation engineer helped as a stepping stone to my career

· Strengths and weaknesses

Periodic Report: 2 pages

· Briefly discuss the activities and tasks that I have been involved in working as a validation engineer.

Final Summary Report: 2 pages

· Roles & responsibilities as a validation Engineer, Continuous process improvement, handling a lot of technical problems, biggest issues, Opportunities, Learning Experience

Risk management case study – anmc

1. Evaluate the risks associated with completing this project by using a risk matrix. Identify at least 6 important threats, define your probability and cost scales, evaluate the risks and list the threats in order from highest to lowest risk.

2. Of the risks you identified, which risks should you mitigate? What steps could you take to manage and/or mitigate the risks you identified.

Wk 2 assignment | Telecommunications Engineering homework help

As we have learned, the overall purposes of the informative presentation can be to describe, demonstrate, or explain something to your audience. For this assignment, you will choose a topic that interests you and decide which of the three forms of informative speaking you would like to fulfill in presenting to your audience. You must be able to includes references to credible outside sources, (at least one for each main point of your presentation) so be sure to select a speech topic that has scholarly sources written about it. The natural tendency is for us to want to show how to do something as opposed to telling the audience. For this presentation, however, we will not be using visual aids. Therefore, it is very important that you use effective language in the delivery of your presentation as we learned in Week 1. This will help you to learn to be vivid in your delivery of a presentation without the use of presentation aids. A great presentation is well organized and easy for the listener to understand. Your audience has only one opportunity to understand the message conveyed in your presentation. This assignment requires that you create a formal outline. A formal outline is detailed and written in complete sentences instead of using a keyword or sentence fragment for each point.

Creating a formal outline will assist you both in developing your ideas and in following the organizational patterns that you have learned in this week’s readings and discussion forum about delivering presentations. A great presentation is well organized and easy for the listener to understand. Your audience has only one opportunity to understand the message conveyed in your presentation. It is important to have a clearly established audience for your presentation and to consistently adapt the content of your presentation for that audience.

For examples of acceptable and unacceptable ways of developing your formal outline, please review the Sample Outlines documentPreview the document.

Create your formal outline using the Informative Presentation Outline TemplatePreview the document. The template includes all of the elements that are required for the outline.

Application security | application security


Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Application Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Choose : not working currently option 


Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Choose from the all  listed topics and make the assignment and you can choose some more topics related to the subject :- Application Security

Topics are as listed below:

· How information security applies to Windows OS. 

· Security features of Windows OS.

· build Implement secure access controls in Windows.

· setup encryption to secure a Windows environment.

· Install controls to protect Windows from malware.

· build Group Policy controls in Active Directory in Windows.

· use the profile and audit tools that keep Windows systems secure.

· review backup and restore operations on a given Windows system.

· design techniques to protect Windows networks from security vulnerabilities.

· develop a security administration framework to ensure security policy goals.

· decide which security controls are the most effective for computers & networks.

· design techniques to protect Windows apps from security vulnerabilities.


Research paper and presentation | Telecommunications Engineering homework help

Please see the below provided youtube url and use it for both paper and presentation

Group 3 – Physical Risk

Security Risk Management | Norbert Almeida

Research paper Format:

1. Please use this link to submit the group paper.  You will be able to submit the group paper multiple times in order to view the SafeAssign report.

Residency paper and presentation topics.

Watch the assigned TedTalk

Provide an overview of the speaker

• Introduction

• Access Control Topic discussed in detail

• Relevant research / Justification for hypotheses

• Why would a company care and how to implement

• Conclusion

• Citations / References

• Length 8 – 12 pages


Residency presentation format: 

• Introduction

• TedTalk Topic discussed in detail

• Relevant research / Justification for hypotheses

• Why would a company care and how to implement

• Conclusion

• 12 slides other than title and references