Description
- Read the textbook chapters as indicated for this week. Write a 2 to 3 paragraph (200 to 500 words) discussion and reflection on the topics.
- Talk about was was interesting, difficult, or surprising in what your read. Note any "ah-ha!" moments.
- Find a current news article or journal article (Google News and Google Scholar are your friends here) that highlights the topics for this week. Summarize the article's main points and connect them to the material you read in the textbook.
Topic is HARDENING THE PROCESSES AND MINDSE
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I needed. Studypool is a lifesaver!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Southern New Hampshire University Travlr Getaways Software Design Document Essay
Overview
You are currently working toward building a full stack web application for your client, Travlr Getaways. It ...
Southern New Hampshire University Travlr Getaways Software Design Document Essay
Overview
You are currently working toward building a full stack web application for your client, Travlr Getaways. It is important to think about the overall system view of how all the pieces of the web app will come together to be a fully functioning website, which will include a customer-facing website, a database, and an admin single-page application that all need to work together.
Web applications are an inherently complicated undertaking because of the variety of complex technologies that must work together seamlessly and scale up to support thousands of connections in a short time frame. As part of your deliverables to the client, Travlr Getaways, you will need to prepare documentation to explain your process and the various components associated with the full stack web app.
It's best practice to document your plan for full stack development as you progress through a project. The Software Design Document (SDD) is an engineering document that contains technical specifications and some written descriptions and explanations. You will complete several components of the SDD in Milestone One.
Prompt
This milestone is intended for you to begin preparing the design documentation needed to deliver to your client, Travlr Getaways. Specifically, you will provide a high-level overview, a description of the design constraints, and a diagram that demonstrates the architecture of the web app. Keep your audience in mind and be sure to communicate clearly and concisely in client-facing documentation. Complete the following sections of the Software Design Document for your client:
Executive Summary: An executive summary is used to introduce the software design problem and present a solution. Be sure to provide the client with any critical information they must know in order to proceed with the process you are proposing. It will be essential to address the following in the Executive Summary section of the SDD:
Describe the appropriate architecture of the web application based on your client’s software requirements.
Reference your use of the MEAN stack for development.
Explain both the customer-facing side of the application and the administrator single-page application (SPA).
Design Constraints: Building an application has constraints. These constraints are things that provide boundaries or guardrails for the project and naturally come with limitations. Be sure to address the following in the Design Constraints section of the SDD:
Identify the design constraints for developing the web-based Travlr Getaways application.
Explain the implications of the design constraints on the application development.
System Architecture View: Component Diagram: A component diagram has already been created for you. Review the diagram provided and address the following in the System Architecture: Component Diagram section of the SDD:
Describe the overall system architecture of the web application by referring to the component diagram provided in the SDD.
Identify the significant components that will be used and their relationship to one another.
Please note: You will continue to add diagrams and complete additional sections of the Software Design Document throughout the course as you develop each aspect of the full stack web application.
1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls
Using the network diagram fig1.1 located below, incorporate into the diagram the devices on the lower right to create a se ...
1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls
Using the network diagram fig1.1 located below, incorporate into the diagram the devices on the lower right to create a secure corporate network. The devices you must incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server. Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server. Write a paper in which you: Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device(s) you need to incorporate. Include the following for each:Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.) Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.) IP address assigned to all devices Establish the configuration for each device in which you:
CIS144_OS Architecture
Introduction to OS
Architecture What is an operating system (OS)?In
order to deploy a SOHO type network to meet the ne ...
CIS144_OS Architecture
Introduction to OS
Architecture What is an operating system (OS)?In
order to deploy a SOHO type network to meet the needs of a small
business / home-office type environment, you must be able to match key
business needs with technological support. As a contractor you will
identify the key features of mainstream operating systems, their
deployment and configuration, and build a small network from scratch.
You will start by getting familiar with basic operating systems.·Watch the LinkedIn Learning course: IT Help Desk for Beginners with Jason Ruediger ·Watch the LinkedIn Learning course: Learning Ubuntu Desktop with Scott Simpson·Next, take some time to familiarize yourself with each of
the operating systems. ·Power on the virtual
machine with the Windows 7 installation and follow through some key exercises
designed to familiarize yourself with the Windows operating system desktop.·Power on the Ubuntu
virtual machine and again follow through some simple exercises to familiarize
yourself with the Linux operating system desktop.Last, create a simple report featuring the following
guidelines:·Create a list of
features that explain the fundamental differences between Windows and Linux.·Create a set of
guidelines for choosing an operating system for different kinds of users and
application specific uses.Please
select a project from the following list to work towards over the next 10
weeks:List
of projects:·Build
an IT infrastructure for a small company that provides consulting services·Create
a network for a home that also has an office·Build
an IT infrastructure for the administration of a small private school·Construct
a network for a small libraryFor
your task, provide responses to the following in a Word document and submit
them: Select a projectExplain why you selected this
projectBased on your project
selection, explain what requirements and restrictions would be encounteredExplain how you would go about
constructing this project using an engineering approach
discusssion board
Week 4
discussion deals with security controls available for Operating systems
and more specifically it deals with HID ...
discusssion board
Week 4
discussion deals with security controls available for Operating systems
and more specifically it deals with HIDS and AVs. Based on your research, what are some of the most common issues with
deployment of HIDS in an organization with 1000s of computers?As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
9 pages
Wbs For A Wedding
Wedding day is the most important day in one’s life, thus this day should be celebrated to create the best feeling possi ...
Wbs For A Wedding
Wedding day is the most important day in one’s life, thus this day should be celebrated to create the best feeling possible. During this time, it is ...
IT 252 SNHU Efficient and Successful Methods in IT Presentation
As a team, discuss ground rules that will guide your work together throughout the course. This discussion should include s ...
IT 252 SNHU Efficient and Successful Methods in IT Presentation
As a team, discuss ground rules that will guide your work together throughout the course. This discussion should include substantial input from all members of the team and all ground rules should be approved by all team members.The ground rules should define the standard operating procedures for the team as well as the expectations of the team members. This is also the discussion topic to address common sources of conflict to prevent issues in advance.Teams should conclude their discussions with a summary post that includes 10–15 ground rules related to the subjects of timeliness, responsibilities, individual conduct, and conflict prevention. The summary post should also determine what collaboration tools and resources the group will use to complete its collaborative assignments throughout the course.To complete this assignment, review the Ground Rules Discussion Rubric document.http://www.npd-solutions.com/groundrules.htmlhttp://blog.timedoctor.com/2010/12/03/the-8-best-c...PART 2 : For the second milestone of your final project, develop a presentation explaining the advantages and challenges of geographically dispersed teams, keeping in mind the MBT scenario posed in the Final Project Guidelines and Rubric document. Be sure to discuss the mechanisms and strategies used to mitigate limiting factors. An important consideration of this exercise is the effect of team size on lines of communication in such teams. You should also include examples identified from personal experiences or identified through research. To complete this assignment, review the Presentation Guidelines and Rubric document.Rubric will be sent to you.
Similar Content
Connecting Course Skills and Real World Applications Discussion
Applied Learning Practicum Reflection – Connecting Course Skills and Real-World Applications
Please write down 600 words...
New England College Ways to Develop a Secure Password Essay
Learn About creating good password security.An IT Security consultant has made three primary recommendations regarding pas...
Concepts and Scope, assignment help
Concepts and Scope[Integrate information from step 1. Initiate the project and define its scope. Start by reviewing securi...
Campbellsville University AWS vs Microsoft Azure Discussion
Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differe...
2 questions needing answered
1. Describe the role that application security policies play in ensuring that applications are not hacked.2. Describe, com...
California State University Program a Compiler Using ANTLR4 Computer Science Task
program a compiler using ANTLR4. ...
Security Policies 1
Institutions always face highly challenging circumstances when they expand and venture into new regions. The problem is co...
Access Control
The organization that I identified is a local supermarket outlet that sells goods and services to people in the neighborho...
Globalization Analysis
Generally globalization is a phenomenon that is dynamic because it cases results in higher interdependence and integratio...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Southern New Hampshire University Travlr Getaways Software Design Document Essay
Overview
You are currently working toward building a full stack web application for your client, Travlr Getaways. It ...
Southern New Hampshire University Travlr Getaways Software Design Document Essay
Overview
You are currently working toward building a full stack web application for your client, Travlr Getaways. It is important to think about the overall system view of how all the pieces of the web app will come together to be a fully functioning website, which will include a customer-facing website, a database, and an admin single-page application that all need to work together.
Web applications are an inherently complicated undertaking because of the variety of complex technologies that must work together seamlessly and scale up to support thousands of connections in a short time frame. As part of your deliverables to the client, Travlr Getaways, you will need to prepare documentation to explain your process and the various components associated with the full stack web app.
It's best practice to document your plan for full stack development as you progress through a project. The Software Design Document (SDD) is an engineering document that contains technical specifications and some written descriptions and explanations. You will complete several components of the SDD in Milestone One.
Prompt
This milestone is intended for you to begin preparing the design documentation needed to deliver to your client, Travlr Getaways. Specifically, you will provide a high-level overview, a description of the design constraints, and a diagram that demonstrates the architecture of the web app. Keep your audience in mind and be sure to communicate clearly and concisely in client-facing documentation. Complete the following sections of the Software Design Document for your client:
Executive Summary: An executive summary is used to introduce the software design problem and present a solution. Be sure to provide the client with any critical information they must know in order to proceed with the process you are proposing. It will be essential to address the following in the Executive Summary section of the SDD:
Describe the appropriate architecture of the web application based on your client’s software requirements.
Reference your use of the MEAN stack for development.
Explain both the customer-facing side of the application and the administrator single-page application (SPA).
Design Constraints: Building an application has constraints. These constraints are things that provide boundaries or guardrails for the project and naturally come with limitations. Be sure to address the following in the Design Constraints section of the SDD:
Identify the design constraints for developing the web-based Travlr Getaways application.
Explain the implications of the design constraints on the application development.
System Architecture View: Component Diagram: A component diagram has already been created for you. Review the diagram provided and address the following in the System Architecture: Component Diagram section of the SDD:
Describe the overall system architecture of the web application by referring to the component diagram provided in the SDD.
Identify the significant components that will be used and their relationship to one another.
Please note: You will continue to add diagrams and complete additional sections of the Software Design Document throughout the course as you develop each aspect of the full stack web application.
1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls
Using the network diagram fig1.1 located below, incorporate into the diagram the devices on the lower right to create a se ...
1. Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls
Using the network diagram fig1.1 located below, incorporate into the diagram the devices on the lower right to create a secure corporate network. The devices you must incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server. Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server. Write a paper in which you: Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device(s) you need to incorporate. Include the following for each:Make or vendor's name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.) Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.) IP address assigned to all devices Establish the configuration for each device in which you:
CIS144_OS Architecture
Introduction to OS
Architecture What is an operating system (OS)?In
order to deploy a SOHO type network to meet the ne ...
CIS144_OS Architecture
Introduction to OS
Architecture What is an operating system (OS)?In
order to deploy a SOHO type network to meet the needs of a small
business / home-office type environment, you must be able to match key
business needs with technological support. As a contractor you will
identify the key features of mainstream operating systems, their
deployment and configuration, and build a small network from scratch.
You will start by getting familiar with basic operating systems.·Watch the LinkedIn Learning course: IT Help Desk for Beginners with Jason Ruediger ·Watch the LinkedIn Learning course: Learning Ubuntu Desktop with Scott Simpson·Next, take some time to familiarize yourself with each of
the operating systems. ·Power on the virtual
machine with the Windows 7 installation and follow through some key exercises
designed to familiarize yourself with the Windows operating system desktop.·Power on the Ubuntu
virtual machine and again follow through some simple exercises to familiarize
yourself with the Linux operating system desktop.Last, create a simple report featuring the following
guidelines:·Create a list of
features that explain the fundamental differences between Windows and Linux.·Create a set of
guidelines for choosing an operating system for different kinds of users and
application specific uses.Please
select a project from the following list to work towards over the next 10
weeks:List
of projects:·Build
an IT infrastructure for a small company that provides consulting services·Create
a network for a home that also has an office·Build
an IT infrastructure for the administration of a small private school·Construct
a network for a small libraryFor
your task, provide responses to the following in a Word document and submit
them: Select a projectExplain why you selected this
projectBased on your project
selection, explain what requirements and restrictions would be encounteredExplain how you would go about
constructing this project using an engineering approach
discusssion board
Week 4
discussion deals with security controls available for Operating systems
and more specifically it deals with HID ...
discusssion board
Week 4
discussion deals with security controls available for Operating systems
and more specifically it deals with HIDS and AVs. Based on your research, what are some of the most common issues with
deployment of HIDS in an organization with 1000s of computers?As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
9 pages
Wbs For A Wedding
Wedding day is the most important day in one’s life, thus this day should be celebrated to create the best feeling possi ...
Wbs For A Wedding
Wedding day is the most important day in one’s life, thus this day should be celebrated to create the best feeling possible. During this time, it is ...
IT 252 SNHU Efficient and Successful Methods in IT Presentation
As a team, discuss ground rules that will guide your work together throughout the course. This discussion should include s ...
IT 252 SNHU Efficient and Successful Methods in IT Presentation
As a team, discuss ground rules that will guide your work together throughout the course. This discussion should include substantial input from all members of the team and all ground rules should be approved by all team members.The ground rules should define the standard operating procedures for the team as well as the expectations of the team members. This is also the discussion topic to address common sources of conflict to prevent issues in advance.Teams should conclude their discussions with a summary post that includes 10–15 ground rules related to the subjects of timeliness, responsibilities, individual conduct, and conflict prevention. The summary post should also determine what collaboration tools and resources the group will use to complete its collaborative assignments throughout the course.To complete this assignment, review the Ground Rules Discussion Rubric document.http://www.npd-solutions.com/groundrules.htmlhttp://blog.timedoctor.com/2010/12/03/the-8-best-c...PART 2 : For the second milestone of your final project, develop a presentation explaining the advantages and challenges of geographically dispersed teams, keeping in mind the MBT scenario posed in the Final Project Guidelines and Rubric document. Be sure to discuss the mechanisms and strategies used to mitigate limiting factors. An important consideration of this exercise is the effect of team size on lines of communication in such teams. You should also include examples identified from personal experiences or identified through research. To complete this assignment, review the Presentation Guidelines and Rubric document.Rubric will be sent to you.
Earn money selling
your Study Documents