Network Infrastructure Essay Paper

Network Infrastructure Essay Paper

Part 2 (80 points): 3–5 pages
You are a well-known expert in the design and security of corporate network infrastructures. As such, Z Corporation, Inc. (ZCorp) has contacted you requesting a proposal for a network infrastructure integration design.
ZCorp is a global financial institution that intends to add Internet Protocol version 6 (IPv6) to its existing network. The headquarters of ZCorp is in Denver, CO, and it has main offices in Sydney, Australia; Vienna, Austria; Tokyo, Japan; and Rio de Janeiro, Brazil. Local routers are providing network services such as Dynamic Host Configuration Protocol (DHCP), network address translation (NAT), and Domain Name System (DNS). It is using Enhanced Interior Gateway Routing Protocol (EIGRP) as its interior gateway protocol and Exterior Gateway Protocol (EGP) as its exterior gateway protocol. Its wide area network (WAN) involves multiple T3 connections and the use of Asynchronous Transfer Mode (ATM). It is unclear to the ZCorp information technology (IT) staff whether they should replace Internet Protocol version 4 (IPv4) with IPv6 or use both versions of IP (dual-stack operation). Network Infrastructure Essay Paper


Your mission is to prepare a proposal document that makes a recommendation for either replacing IPv4 with IPv6 or using both versions of IP. This recommendation must be supported and explained in detail. Research IPv4 and IPv6 to understand differences, benefits, and challenges. Seek information regarding LANs implementing dual protocol stacks. Make a recommendation for: a) replacing IPv4 with IPv6 and b) using IPv4 and IPv6 together (dual-stack operation). Support your recommendations.
Your proposal should specify a phased approach for your recommendation. You should include the following considerations in your document:

  • List and explain 5 of most significant changes of IPv6 over IPv4
  • Benefits of implementing IPv6, especially in the area of security
  • Potential issues and concerns with IPv6
  • Whether or not to continue the use of network services with IPv6
  • Necessary changes to existing hardware with IPv6
  • Other resource factors
  • High-level set of steps to implement your recommendation, including IP addressing scheme

Your proposal should be an APA Word document of 3–5 body pages plus a title page and a reference page. Refer to the APA Style Guide found in the Library for further information. Network Infrastructure Essay Paper

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Empowering Leadership and Effective Collaboration Question

Empowering Leadership and Effective Collaboration Question
This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool.
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.


Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:Empowering Leadership and Effective Collaboration Question

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.
Empowering Leadership and Effective Collaboration Question

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Authenticating People, Encrypting Files & Secret And Public Keys Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.


Summarize the different situations in which people use file encryption software.

According to text, one way in which people use file encryption software would be sending a file to another person. In a work situation, putting an encryption on an email sent, the receiving user would need to have the access to this particular encryption to read the file, message, etc. This type of encryption is a good practice, the issue is that users only do this part of the time. For example, military are encouraged to use this particular feature when sending and digitally signing their emails, but the extra couple of clicks seem to be too much for some. Another example the text gave was transferring files via USB, but where I have worked while in the military and now as a contractor, USB anything is not allowed into the building and/or workspace. This is to include anything that also Bluetooth transmittable (ie: phones, fitbits, headphones w/ voice access, etc.) to prevent adversaries from indirectly accessing data not meant for public use.

An issue with USB transfer brings to mind the recent presidential election and the debated results. While one side claims that this election was the most secured in history, the other side have testimonial and sometimes video proof of persons either leaving unattended USB drives in voting machines, workers uploading the files from the USB drives multiple times, or conveniently lost USB drives.

Again, according to text, another way in which people use file encryption software is to keep files on hard drives safe. Any files on a computer, no matter the security measures, still leave these types of files open to malicious attacks. The examples the text gives are these files can be accessed by Trojan horse, separately booted operating system and/or low-level data written to the hard drive. When a person deletes a file, where does that file go? Just because the user is unable to find the file in a generalized search does not mean that the file is actually gone. Due to this conundrum, if an adversary penetrates the system, though the file is supposed to be deleted forever, he or she may still find files embedded on the user’s hard drive. Windows offers built-in encryption, but whether it be Windows or another operating system, there is not a cure-all to anyone’s information if someone is determined to get information. Separately booting an operating system may give an adversary accesses to plain text files though they have been encrypted.

Makes one wonder exactly the nature of intent when an adversary attacks someone’s system.

Smith, R. E. (2015). Elementary Information Security. [VitalSource Bookshelf]. Retrieved from



1.Describe the five basic attacks on authentications systems.

Clone or borrow, sniff, Denial of service (DOS), trial and error, and retrieve from offline are five of the basic attacks on authentication system. Clone or borrow the credentials can be performed by memorizing someone’s password or using common access card (CAC) that doesn’t belong to you to gain access without permission. Sniff is a method this that acquire credentials or any log on information when a user uses his or her credentials to log on to an information system. Denial of service is self-explanatory, and it is as simple as blocking a user or damaging the information system to prevent the user from using it. Trial and error are in some way similar to brute force attack, where the perpetrator will be trying to guess someone’s password by using patterns left on a screen until he gains access to the system.   Lastly retrieve from offline is retrieving information form any kind of external storage device to access the system.

2.Outline the symmetric encryption process and explain the components involved in the process

The symmetric encryption is a methodology of using encryption keys to encode and decode data. The process is simple, we use an algorithm that converts plain text into unreadable format.  Then the system will perform several changes called permutations on the plain text to convert it into ciphertext. Once it is converted into the ciphertext the other user will need the encryption key it was use by the originator to be able to read the text or convert it back to plain text.

3.Summarize the different situations in which people use file encryption software.

People use encryption in order to protect information from unwanted users or the people that doesn’t have the need to know. It could be used as well to protect Personal identifiable information (PII). In the military is used

to protect mission critical information that could affect the operations if it was known by other people.

4.Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

– Diffie-Hellman – This encryption algorithm requires both users to have a public and private key in order to send and read encrypted messages between the two.

– Elliptic Curve – Similar encryption as Diffie-Hellman but using different mathematical calculation both parties still need secret keys commonly used in military operations and government agencies.

– Rivest-Shamir-Adleman – RSA encryption uses a public and a private key and each pair contains tow modules, public exponent, and modular inverse.


Smith, R. E. (2016). Elementary Information Security (2nd ed.). Burlington, MA: Jones & Bartlett Publisher.


"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Information System Management Mod 6

Minimum references for each is 4

ISMG Chapter 4 Netflix Case Study

For this assignment, read Chapter 4 – “Netflix – The making of an e-commerce giant and

the uncertain future of atoms to bits” from the ISMG book and answer the following

questions. Please submit your file in a Word/PDF format only and name the file as:


1. Discuss all the components of IS (Hardware, Software, Data, People, and Process) in

the context of Netflix as outlined in the case (in the context of the time period presented

in the case) (Use the information in the case or refer to external sources to formulate

your answer)..………………….………………………………………………..…….25 points

2. The chapter presents Netflix’s (then) business model – utilizing the DVD-by-mail option

and how it became a market leader. Describe how Netflix gained competitive advantage

in a niche and novel market (at the time of the case) by using Porter’s five forces model.

…………………………………………………………………………………………..25 points

3. Today, Netflix is one of the leading online subscription based streaming service

providers. But it is operating in a highly competitive market along with other streaming

service providers like Apple, Disney Plus, Hulu, YouTube, Amazon Prime etc. Identify the

ways in which Netflix is using or can use IS / IS based strategies to compete with these

market players. Propose some steps that Netflix should take in order to maintain a

dominant position in this market. ……………………………………………………………..25 points

Grading Notes:

1. To be considered for grading, you must submit your assignment in the stated

file format only and follow the file naming conventions.

2. Each question carries 25 points, total points for this assignment – 75.

3. You must answer all the three questions and your answer must address all parts

of the question, for example in question 1 you need to discuss all the five

components of IS. For question 2, you need to elaborate on the five forces

discussed in the chapter and how they apply to this case.

4. Answers to each of the three questions must meet a minimum word count is 350 words.*

5. Include the word count for each answer (excluding references Minimum 4 References), 5 points

per question will be deducted if the word count is not included in the

6. Turnitin is enabled for this assignment and your Turnitin score for this

assignment must be less than 7% (Higher Turnitin scores are unacceptable

and points will be deducted for not meeting the Turnitin score threshold).

*References will not be counted in the word count, you can use any format MLA / APA.

• To prepare for this assignment, you may refer to Module 1 for a refresher on

Porter’s Five Forces model. Additionally, review the supporting resources

(videos, links) for this case study available on Moodle to prepare your answers.

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"