Entries by Sarah Kaelo

How Wireshark can be used for traffic capture and analysis.

How Wireshark can be used for traffic capture and analysis. The manager of the IT Guru network operations center has recently hired 5 new employees to provide 24×7 coverage of the NOC and has asked you to provide an overview on the use of Wireshark as a network troubleshooting tool. Your presentation will be used […]

Describe the security strategy used.

The purpose of this assignment is to identify an appropriate information security (InfoSec) governance program for a company, using a quantitative risk assessment to justify the investment in the program and an executive summary to concisely present findings. Using the case study company selected for the Topic 1 assignment, write a paper (1,250-1,500 words) that […]

The CEO is somewhat technical and has tasked you with creating a threat model.

Threat Modeling A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a […]

· Demonstrate a connection to your current work environment.

· Demonstrate a connection to your current work environment. SUBJECT    ISOL-535-  Cryptography Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when […]

Discuss how your design best mitigates potential threats to validity.

For this assignment, you must write a paper describing your design  for an experiment that will serve as a pilot project and will help you  address an organizational problem or identify opportunities for  continuous improvement or revenue growth. When designing your experiment, remember to design it in a way that  minimizes threats to validity, best […]

Analyze the various security measures that could be taken within the organization.

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course: Vampire Legends (Wk 1) Cruisin’ Fusion (Wks 2–3) Devil’s Canyon (Wks 4–5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results […]

Leverages creative and adaptive problem solving to selecting the right tool for the job

Hello Thank you for taking the time to complete the technical interviews thus far to explore Data Analysis opportunities with Capital One. I have enjoyed speaking with you and look forward to advancing you forward to complete our Data Challenge as the next step in this process. The Data Challenge (attached) will give you an opportunity to showcase your skills and abilities in […]

How does the article help address your knowledge deficiencies?

Need to work on 3 credible  sources, each sources a paragraph answering the below questions.. need around 2 pages..  Creating Value: In the second section of this assignment, you will research and review 15 credible sources, excluding the sources provided in this course, which provide information about value creation and stakeholder perspective in the industry […]