Seminar Poster Board presentation

User Generated

fnz546810

Computer Science

Description

Seminar: Symposium poster

You need use all your homework’s to create symposium poster.

My advice is to have large, easy-to-read and numbered sections that cover the main pillars of the story, which typically are:

Sections:

1 – Background

2 – Questions / knowledge gap

3 – Methods (keep this to the bare minimum or skip it if you can)

4 – Results

5 – Conclusions

6 – References and acknowledgements (smaller at the bottom)

Here is URL for sample poster:

https://www.animateyour.science/post/how-to-design-an-award-winning-conference-poster

https://hsp.berkeley.edu/sites/default/files/ScientificPosters.pdf

https://ugs.utexas.edu/our/poster/samples

Requirement

You must complete all 6 sections of this Seminar poster. I uploaded an example below.

Unformatted Attachment Preview

Homework 6 This is an image below of me about to check the storage on my hard drive and partition enough space. Below is an image of me partitioning space on my hard drive Below is an image of me shrinking some of the space of the hard drive. Homework 6 This is an image below of me about to check the storage on my hard drive and partition enough space. Below is an image of me partitioning space on my hard drive Below is an image of me shrinking some of the space of the hard drive. Homework # 5 • Nano Server refers to a remotely administered server similar to windows server although it is smaller as it occupies less disk space and only supports 64-bit tools and applications. The Nano Server is optimized for data centers and private clouds and it focuses on reducing resources consumption, provide greater speeds, have more stability and also security. • Containers in Microsoft are used to refer to ways supported by Windows Server 2016 operating system and are used to wrapping up an application into its own isolated box. Containers are managed by tools such as Docker and PowerShell. • Rolling updates or commonly termed as cluster rolling is a type of OS updates that allows upgrade of the operating system from an administrator without stopping the Hyper-V or the Scale-Out File Server workloads. Doing a rolling upgrade for a Hyper-V Cluster with a shared storage like a SAN means that the administrators can only upgrade the number of nodes that they have resiliency on. • Nested Virtualization in Windows Server 2016 refers to a function that allows an administrator to run Hyper-V inside a Hyper-V virtual machine. It allows an administrator to build labs that contain virtualized infrastructure within a single computer. • Docker refers to a computer program that allows for virtualization of operating system level. Docker support in Windows Server 2016 is used natively on Windows 10 together with Hyper-V container with the aim of building, shipping and running containers that are utilizing the Windows Server 2016. References Brooks, R. (2018). Windows Server 2016 Containers. Net Wrix. Microsoft. (2017). Windows Server 2016. Microsoft. Stroud, F. (2016). Nano Server. WebOpedia. Torep, J. (2018). Storage Spaces Direct Rolling Cluster Upgrade to Windows Server 2019. jtpedersen.com IT made simple. HW1 This is an image of me trying to format the disk space so I can create more space in the hard drive. This is a picture below and its asking me for an IP address Homework Number This is an image of me downloading shellexview, and I have installed and launged the application. This is an image when I have hidden all third party extensions. Software and Operating System Security - Run SFC and Chkdsk scans to check if the hard drive has any file error. - SFC/scan now looks for missing or corrupt Windows files Background • This Subject encompasses 11 in class assignments and 11 practical Homework • Installation of windows 10 and windows server • Securing computer system against malwares • Creating Share drives • Assign permissions and special privilege • Key components of server: Nano server, containers, Containers, Hyper-V, and nested virtualization. • Operating system security flaws and how to disable them. Methods • We used Windows 10, Windows Server 2016, Windows XP, Linux (Ubuntu and Kali), Windows server 2003, Mac OS X, and Netware to accomplish assigned works. Results - Creating multiple user accounts and admin accounts on Windows Server 2016, change privileges from user to administrator and vice versal • How you prevent attacks targeted on operating system? • How to create share drives in Window server 2016? • What tools are used to secure the web browsers? • What tools are available to tackle malwares? • How to secure email? • How Kali Linux performs penetration test? Server Manager is used to manage all local and remote services. I used Server Manager to install active directory domain service and VPN. Some roles and features available in server 2016 include; Hyper-V, file and storage service, DNS, DHCP, web server, RS, and so forth. Fake Virus, Merabheja is spreading after a single click Source Code of fake virus Learned Skills • • • • The main function of operating system Attacks on computer system( Network and OS) Common ports related with cyber threats Essential techniques to protect OS from malicious software Encryption methods: IP security, Stream and block cipher, public and private key, RSA, DES, Hashing Authentication methods: Digital certificate, Kerberos, EAP, SSL, SSH, TLS, and Security Token. The use of SMTP in e-mail and attacks on SMTP hardware redundancy and apply fault-tolerance options (UPS, RAID) Intrusion detection methods and hardening system Creating Share drive, assign share permissions to groups: Every one, Administrator, and other group Permissions: Full, Change, and Read • Configuring network connection in Windows XP in a virtual machine • Configured Internet Explores advanced security features • We broke into Windows XP using command line utility in Kali Linux. • Secure the web browsing by using secure tools such as HTPP everywhere, Trojan Remover, Questions / knowledge gap • • • • • - Configuring event viewer, used to troubleshoot windows and applications error. - Displays detailed information about computer • Configuring account policy and logon security techniques, global access privilege. • Implement directory, folder, and file security • Understand how TCP, UDP, and IP work, and the security vulnerabilities of these protocols • Configure the firewall capabilities in operating systems • physical security methods for workstations, servers, and network devices • Wireless networking security (IEEE 802.11): radio wave, infrared, and Bluetooth. • Configuring internet, web browser, RAS, VPN security Conclusions ▪ This course was quite informative and practically efficient. It not limited to windows operating system. ▪ We have done three projects that focused on real world and current problems: How to secure small business against cyber threat, data security, system security, and physical security. ▪ Each chapter contains in-class assignment and hands on project to implement theoretical knowledge into practice. ▪ The course focuses on identifying the vulnerabilities of the OS, configuring the built-in security features, and preventing computer system against cyber attacks. References and acknowledgements • I would like to thank you Dr. Haydar Teymourlouei for being an excellent instructor and guide of this course. I am also thankful to all my classmates who have been helpful through out the course.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Check it

CREATING SPACE ON LAPTOP
Background
• Increase hard disk
space
• Use different
methods
• Determine the best
method

1. Shrinking
Partitioning the hard
disk

Shirking the hard
disk

2. Formatting
Formatting hard
disk

Results

3. Dis...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags