Subnetting Requirements1. Every department and dormitory should be put on their own subnet. When you design the subnets, make sure your design supports the following: i. 3 subnets for 3 dorms- each should support 200 hosts (no growth)ii. 3 subnets for 3 departments. Each of these subnets should be capable of accommodating the expected number of students in 6 years. All of the professors from all departments should be put in another subnet and th...
Wiring RecommendationBreeze-Yob, a manufacturer of fine hand creams originally started in Sweden in 1966, requires a network for their new un-networked building. The offices are located in one building; 4 stories of approx 12 ft high each – W x D of approx 200 x 160 ft. (see diagrams on BB). The owner of the company, Mr. Lou Scannon, requires recommendations, with pricing, for the following services for the new network. P...
Documentation HeaderCreate a source code / script file named Your_Initials_IPv4BreakDown.py.For example, if your name is Bob Belcher, you would name the script BB_ IPv4BreakDown.py.Include a documentation header (comments) that looks like the following example. # Program: [Your Initials]_IPv4BreakDown.py # Date: [Date the program was last modified] # Author: [Your Name] (Student #[Your Student Number]) # Description: [Enter a description...
Task 1 – Clausewitz fog of war in the modern enterprise information environmentThis is an individual assessment comprised of three tasks. Task 1 and 2 carry 25% respectively and task 3 carries 45% of the overall portfolio mark. 5% is allocated to the overall conclusion of the portfolio. Task 1 will assess your understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical...
Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access, Develop a deep and systematic understanding and knowledge of current theoretical and methodological approaches to offensive Cyber Operation concepts and philosophies, Critically reflect on the implementation and management of offensive Cyber Operations at all levels, Critically reflect...
Set up VMs in Nat Network mode and create a virtual LANPlease install VirtualBox on your own machine, then import the following two VM images in your VirtualBox: Kali Linux VM, and Windows 7 VM (with any version of IE you want). 1). Set up these two VMs in “Nat Network” mode and put them in one virtual LAN that has the subnet (i.e., network CIDR) of 192.168.100/24. After that, please find out what are these two V...
ObjectivesIn this Capstone Project activity, you will demonstrate your ability to: Design and implement an IPv4 VLSM addressing scheme that fulfills the requirements Design and implement an IPv6 VLSM addressing scheme that fulfills the requirements Design, configure, verify, and secure EIGRP for the necessary networks Design, configure and verify Link Aggregation, RapidPVST+, FHRP, Port Fast, Edge Ports Create detailed design documentat...
ObjectivesThe aim of this experiment is to familiarize the students with the Opnet Modeler network simulation software package. Objectives The objectives of this experiment are: 3.1 Introduce Opnet Modeller. 3.2 Create a new project. 3.3 Build a network in the project. 3.4 Define the traffic characteristics of the designed network. 3.5 Create alternative project scenarios for comparison purposes. 3.6 Simulate the network(s) and g...
Recent Cyber AttacksYou work for Cyber Operations Inc (CyOps). CyOps is a military contractor specialising in information systems security. CyOps has decided to create a library of past cyberattacks for intelligence purposes. The aim is when a new attack is being investigated, comparisons may be made with previous attacks. These comparisons can help CyOps identify the perpetrators and can offer clues about how the attack was waged. CyOps has ...
Your task is to write a comparative analysis of the media reporting on a specific incident or issue relating to religion. Provide clippings/print-outs of news articles about one particular incident or issue from at least two different media sources. Use secular media sources (no more than one of your sources can be from an explicitly religious or denominational media source). Use news articles, not opinion pieces or editorials. Make s...
Assignment BriefAs part of the formal assessment for programme you are required to submit a Data Communications assignment. Please refer to your Student Handbook for full details of the programme assessment scheme and general information on preparing and submitting assignments. Each task addresses aspects of the learning outcomes listed after the task title. The assignment as a whole covers all the learning outcomes, spread across the tasks...
Assign IP addresses and default gateways to each of the Eleven PCsPlease note that the FOUR switches are 2960 (each with 16 FastEthernet ports) and the Router can be any model with a Fast Ethernet or higher interface. Use the PC-PT for the 11 computers.Assign ip addresses and default gateways to each of the ELEVEN PCs. Use the text tool to indicate what ip address you are assigning to each of the eleven PCs.The marks for points 6 &nd...
Task 1 - Clausewitz fog of war in the modern enterprise information environmentThis is an individual assessment comprised of three tasks. Task 1 and 2 carry 25% respectively and task 3 carries 45% of the overall portfolio mark. 5% is allocated to the overall conclusion of the portfolio. Task 1 will assess your understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical and p...
Module Learning OutcomesThis Assignment assesses the following module Learning Outcomes:1. Develop a deep and systematic understanding and knowledge of Information Environments in terms of deterrence, detection, protection and reaction to access,2. Develop a deep and systematic understanding and knowledge of current theoretical and methodological approaches to offensive Cyber Operation concepts and philosophies,3. Critically reflect on the...
Introduction to Task 1Assignment Brief: This is an individual assessment comprised of three tasks. Task 1 and 2 carry 25% respectively and task 3 carries 45% of the overall portfolio mark. 5% is allocated to the overall conclusion of the portfolio. Task 1 will assess your understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical and practical aspects of computer security an...