Create a CAD model of a product/component of your choice using any advanced CAD software, preferably CATIA. (the model itself is worth 40% of the grade)

Create a CAD model of a product/component of your choice using any advanced CAD software, preferably CATIA. (the model itself is worth 40% of the grade) Then identify and explain 5 distinct ways in which CAD/CAM has been used/can be used to improve the design and manufacture of chosen product/component. Finally, research and demonstrate how the application of CAD/CAM in the chosen product’s design process provides a good return of investment.
Note – Will be worth discussing Topology Optimisation and Generative Design tools.

Identify the project stakeholders. Stakeholders include all employees, volunteers, customers, investors and shareholders.

Cybersecurity Topic Guide.

Capstone Project Name: Securing IoT Devices within a Complex Enterprise.

Project Topic: IoT Security

Summary of the problem: The issue of IoT device security is large, and increasing as more business and organizations utilize IoT devices for automation of tasks, security and everything inbetween within an organization. The organization used will be fictitious, but will present an issue that is common within companies and future organizations as IoT usage expands.

Outline of technology-supported security solution: The proposed security solution will involve specific security devices, administrative policies and configured logical controls, in order to provide a solution that present a solid defense-in-depth approach.

Context: Explain why the situation or question would benefit from your security solution. The benefit would mainly be a decrease in risk of current and future IoT devices and platforms, as well as more employee training/awareness, more robust policies, more effective technical and logical controls, as well as a reduction in the overall attack surface.

Stakeholders: Identify the project stakeholders. Stakeholders include all employees, volunteers, customers, investors and shareholders.

Project Plan: Describe the project plan, scope, goals, and objectives. The project plan is to implement several security measures in a defense-in-depth approach. The scope includes all widely available security appliances on the market, IoT devices that are commonly used within organizations and companies, as well as best practice/regulatory requirements. The goal is to ensure that risk of exploitation of IoT devices within an organization is lowered, while ensuring a hardened cyber defense. The objectives include describing what IoT devices are, how they are typically used, how they will be used in this specific case, the processes and features of each kind of device, security hardening solutions, administrative/policy solutions and continuous monitoring capabilities.

Methodology: Outline the project approach. The approach will involve utilizing research gathered on IoT devices that are being currently used and any/all future planned IoT devices, as well as best practices regarding their secure use. The approach for administrative and logical changes to the organization will involve best practices and regulatory requirements for the organization, per NIST, SOX, GDPR and other regulations, as relevant.

Implementation Plan: Identify the project phases. The phases are as follows: Identify the organization and provide background information, Identify IoT devices currently in use and include any future planned IoT devices, identify all risks and issues, propose all mitigation solutions with justification, propose administrative changes and provide continuous monitoring solutions.

Project Outcomes: List the key anticipated project outcomes and deliverables in  500 words or less. The key deliverable for the project is to ensure the organization has a solid plan for ensuring that the attack vector related to any current and future planned IoT devices is minimized effectively. The outcomes involve ensuring efficient security appliances are proposed, with several other administrative and logical solutions to ensure successful risk mitigation throughout the entire process. The other outcome is to ensure employees receive training and awareness on threats related to these devices and organization as a whole.

What are the cyber vulnerabilities do you feel are most likely to be utilized by cybercriminals?

Within your essay, answer and provide critical commentary on the following questions:

What are the cyber vulnerabilities do you feel are most likely to be utilized by cybercriminals?

What group or organization do you think is the biggest cyber threat?

In a world of limited financial resources, who will — and should — pay for closing the security holes in cyberspace?

Utilize outside course material and sources.

Identify existing security vulnerabilities that may be exploited during cyber-attacks on network systems.

Final Project Proposal Form.

Aim: The main objective of the study is to investigate various systems of monitoring networks that can be implemented in business enterprises to mitigate security threats from cyber-attacks. The study will provide recommendations on the most viable network framework proposal suitable for monitoring network systems.

Objectives:

  1. Identify existing security vulnerabilities that may be exploited during cyber-attacks on network systems.
  2. Evaluate the recommended solution effective to offer protection to enterprise network security using a developed prototype for monitoring networks. The flexibility of the system is key to incorporating other elements like systems of database storage.
  • Develop a customised network security protocol to mitigate and monitor threats posed to the network system of the enterprise to control any existing risks.
  1. Establish well-documented policies outlining the authorized personnel with the mandate of operating the network resources to avoid unnecessary breaches of the enterprise network security protocols.

Rationale:

Currently, the technological world is experiencing rapid changes due to innovative processes. Therefore, cybersecurity is increasingly becoming a key area of concern due to the constant cyber-attacks on network systems. This study seeks to investigate enterprise network systems to identify effective ways of monitoring these systems. The project is aimed at establishing solutions to improving the performance of network systems against failure posed by security threats.

Facilities required:

  1. Anti-virus software: Any potential viruses can be identified and eliminated by the software when network administrators scan enterprise network systems in a bid to keep systems free from security attacks.
  2. Server: The server acts as the storage unit for network resources such as files, software applications of security configuration, as well as databases. Serve is used as a primary tool to maintain confidentiality by restricting personnel to protect the network and improve its performance.
  • Firewall: This tool is useful in monitoring and identifying any potential network threats. Therefore, it should be installed with proper configurations to maintain its functionality against possible network attacks.
  1. Ethernet cables: This equipment is used in the network connection between computers and servers. The cables ensure the workability of networks and information transfer.
  2. Operating system: Network monitoring systems are incorporated in various operating systems such as Linux and Windows. The operating system is configured to work effectively by enabling the proposed solution to function and protect the network systems efficiently.
  3. Intrusion detection system: The system works in conjunction with the network monitoring system to maintain a threat-free environment within networks.

How do the virtual environments map memory, interrupts, process, assign CPU Resources, etc to those on the host OS?

Complete a short paper (9-10 pages, with appropriate references) on Virtual Machine Environments. Some operating systems can run other operating systems as guests or as “virtual machines”. Examples include Solaris Zones and IBM mainframe LPARs on large systems and VMWare, Hyper-V, WINE and Lindows on smaller systems. How is this accomplished? How do the virtual environments map memory, interrupts, process, assign CPU Resources, etc to those on the host OS? How do guest instructions get translated from the guest to the host? How do Raw Device Mappings, virtual memory (paging) work from host to guest?

Please focus the paper on VMWare ESX / ESXi, VMWare Workstation and Hyper-V.

. What might have been done differently? Was the research method adequate? How could the project have been more successful?

Requirements for Report

Report Structure There is no such thing as a typical report structure. It will vary depending on the project. However, the following structure is provided as a general guide. If it does not seem relevant to your particular project then adapt the suggested chapter headings.

Page 1: Title Page – including the title of the project, the name of the author, the date, the word count and the statement specified below under report details.

Page 2: Abstract – One page that summarises the report and the main findings or results.

Page 3: Table of Contents – including page numbers of each chapter heading and each appendix. Chapter 1: Introduction – the topic, the background, why the topic is relevant or of interest to you, what you hoped to achieve, the aims and objectives of the project.

Chapter 2: Literature Review and Context – the setting of the project in the context of other relevant work or theories or results. How this setting influenced the project.

Chapter 3: Research/Development Method – the overall approach and rationale. Why the project was tackled in the chosen way, and why other ways were ruled out.

Chapter 4: Data/Findings/Designs – the project outcome. This might be data collected and tabulated or the design of a program, or whatever outcome was obtained.

Chapter 5: Analysis/Evaluation/Testing – assessing or testing the project outcome. If the project is of type 2 are the results plausible? If the project is of type 3 or 4 then any computer code should be tested using a range of inputs.

Chapter 6: Conclusions/Recommendations – as a result of the project. The project does not need to have a positive conclusion. For example, it might prove that some system was not effective or successful. You should indicate to what extent your objectives have been achieved.

Chapter 7: Review/Reflections – this is often missed out by students but is very important. It is an opportunity to, firstly, review on a personal level what you have achieved, how you achieved it, what took the most time, the problems faced, the way in which they were overcome, etc. Secondly, it is an opportunity to reflect on the project with the benefit of hindsight. What might have been done differently? Was the research method adequate? How could the project have been more successful? Examiners like to see evidence of learning and mature reflection

Chapter 8: References – all references should be cited in the body of the report. A typical reference in the report might take the form, “Donar and Kebab (1996) suggest that high cholesterol levels do not lead to heart disease….” or “empirical eating studies show that…. (Donar and Kebab, 1996)”. The full title of the article or book or web page in which Donar and Kebab make these assertions is then given in the list of references. Where possible, use an article or a book rather than a web page. The idea of references is not just to substantiate statements and arguments but also to make it possible for other people to find the references. Normally, for a book, you should list author(s), title, publisher, date of publication, relevant page number(s). It can be difficult to locate the relevant part of a book if the page numbers are omitted. For an article list author(s), title of article, name of journal, volume and issue number, date, and page numbers of the article. For a web page give the URL and the date on which the page was consulted. In the academic world references are regarded as very important and poor referencing will certainly detract from the project report. Do not under any circumstances quote from a source without making it clear that you are quoting. Any quote must be accompanied by an appropriate reference.

Chapter 9: Bibliography – list any relevant literature that has not been cited in the report. (It is not a very well-kept secret that examiners tend to think that anything in a bibliography has not in fact been read by the student. Of course this is a monstrous slur but nevertheless do not waste too much time on the bibliography. Concentrate on the references!)

Chapter 10: Appendices – these are not obligatory. Only put in relevant items not already in the body of the report. These might include a questionnaire used to gather information, a list of the people interviewed and their companies, transcripts of interviews, detailed data, program listings, test results, etc. Any appendix should be referred to in the main part of the report and not just stuck at the end of the report without explanation. It is very important that an examiner can find evidence for the claims you make in your report. The appendices are the place to put such evidence without cluttering up the main part of the report. Sample projects, completed by previous students are available in the library, short- term loans section and on the departmental intranet.

Report Details Reports should be between about 7,000 and 10,000 words (excluding appendices), with an absolute maximum of 12,000 words. There is no stipulated minimum length. Reports must be word processed and printed on A4 paper. The pages (other than the title page) should be numbered. Italics may be used for emphasis. All quotations must be in quotation marks and fully referenced. Figures and tables should be inserted close to the part of the text where they are discussed.

The first page should be a title page, the second an abstract of the project (maximum one page) and the third a contents page. The title page should contain the title of the project, the name of the author, the date and a count of the number of words (excluding the Appendices). At the bottom of the title page place either

Include files and images

I have included in zip file images that you should include in the report.

My GitHub account to the project is here: https://github.com/marcellio4/Portfolio

Under test folder you will find ValidationTest.php file that includes PHPUnit testing. Please include the line of codes to prove that I have used one of the methods for test the application. The whole set up is following MVC design (Model view Controller) but not explicit MVC framework that are up there such Laravel or Symphony.

Project you will find here: https://mzacharias.co.uk

Under skills page you will find data visualization that is created dynamically and is using framework D3.js The inspiration I get from this page https://bl.ocks.org/dahis39/f28369f0b17b456ac2f1fa9b937c5002

I’m using Bootstrap 4 for templates design website.

Database that I’m using is innoDB MySQL.

I have not created any UML diagrams but I will need them to be include as well.

In my github/portfolio under classes you will find which classes are related to each other. Some hands up Validation is super classes of Login.

I have include another file where you will find problems that occurs during development and my project proposal file that you can find out a bit more about the project.

The basic idea was create login and administrative page where I can manage different fields such About me, skills and project page to be display. You will find in zip file lots of useful screenshot that I have took. It is representation of my own portfolio.

 Specifically, what positive behavior are you anticipating to achieve that is currently an EI Interference?

*ASJ SUPPORT FOR LOGINS*
My Ebooks

 

M3. Discussion-Thinking About Emotions

M3 Leadership Adapting Styles

https://www.youtube.com/watch?v=vkadAhDnPYk

 

Listen and take notes on the following video.  Thinking about your personal EI leadership style, how have you learned new ways to think about the integration of emotional and thinking (EI) that leads to higher leader performance.  Give examples. 150 words I length

M4.2 Conditions of Worth Results

Please complete the “Conditions of Worth” assessment located on (page 107) of your course book. Then total your results (page 108); and read about the Releasers from the condition (page 108-110). Conditions of Worth Template .

Next place your totaled results in the attached slide template and place your top 3 (highest scored totals) to the right of your results in the slide.  Be sure to place the releaser words that you read in this assignment for your given 3 categories.

please include analysis of findings/ interference and provide improvement actions

M5. Personal EI Reflectiveness

Looking for the roots of where your primary ‘interferences’ where they were shaped and then reinforced up to today.

There are 4 activities in this assignment You will use words and pictures to describe the shaping events and your responses.  At the conclusion, you will have greater insight into tapping the roots of your interferences and rethinking the events in new contextual meaning that will ‘unravel’ the binding forces of your interferences.

My Timeline:

My Lost History:

My Interference Roots:

Rewriting My Story:

  1. Refer to your EI Sparrow and Knight (2009) book (pages 171-172) “Your Timeline and Lost History”.
  2. Create 4 slides; labeled 1) “My Timeline”; 2) My Lost History”; 3) “My Interference Roots”; and 4) “Rewriting My Story”
  3. Slide 1:   Create Your Time Line (refer to page 171) for more details.
  4. Slide 2:   Identify Your Lost History (refer to page 172) for more details.
  5. Slide 3:   From slide 1&2 activity, do you see themes in your shaping of your interferences throughout your lifetime?  Describe them; can you identify the root (where it began; and the sub-roots of where the interference was reinforced?)  Capture these thoughts on slide 3
  6. Slide 4:   Now think about what you have identified as ‘interference roots’ from slide 3.  Create words and pictures of how you can rewrite your story themes from the past that build you up; versus create those conditions of worth shaping messages.  Now place that content in the slide 4.
  7. Submit these slides with a cover page

M6. Discussion 6: 21 Days EI Commitment

  1. Prior to start your 21-Days EI Change Activity, it is important from an EI perspective to set your “EI Commitment Goals”.  Specifically, what positive behavior are you anticipating to achieve that is currently an EI Interference?
  2. Refer to your Conditions of Worth Assessment findings (top 3 EI Interferences) that you identified; you will be picking one to work on improving for 21 days.  Therefore, you will write your commitment statement toward ONE of your top 3 EI Interference.
  3. Download the 21-days Change Plan Template attachment.  Complete the first portion of the 21-days plan by “Writing Your Commitment Statement” for higher EI; and then evaluate your current and anticipated behavior you wish to achieve.
  4. Submit ONLY all of the paper (even though there are 21-days of other activities listed in tables below your section).  This will form the basis of your next 3-weeks work for improving your EI competencies.

M6. WK 1 EI Change Activity

Submit EI 21-Days Template; with Commit Statement Added and current and goal behavior you desire.

This week you will submit the SAME document; except you have added the Wk1 EI Change Activities (Complete each Day’s Block and Answer ALL Questions for Each Day).

M7. WK 2 EI Change Activity

Please be sure you are submitting your accumulated content (e.g., commitment statement, current behavior/goal behavior, Wk1, Wk2).

Continue Wk2 daily journaling of EI activities, answering all questions for each day.

 

M8. WK 3 EI Change Activity + Summary

Please be sure you are submitting your accumulated content (e.g., commitment statement, current behavior/goal behavior, Wk1, Wk2, Wk3 AND SUMMARY ANALYSIS PAGE.

Be sure to submit your final paper with EI experience analysis (after Wk3) in the SAME document

M6 Colin Powell and Leadership

Please access and review Colin Powell’s 13 Leadership Qualities (Links to an external site.)

Then thinking about what EI scales you have studied in this course content, write your own 13 EI Leadership Qualities (drawing upon the Sparrow and Knight scales for higher EI performance).  Put in your own words!