Excel Analysis Asiignment

I have uploaded the rubric please read it.

2.I have uploaded the excel anlysis instructions as well so please read them.

2.I have uploded the required data points to solve and complete the following :

Your Deliverable:

· Write up your findings in a Word Document with Executive Summary (no more than 900) that answers your boss’ questions. Use screen clippings of the analysis you did in Excel as evidence to support your conclusions (75%).

· Also submit your Excel workbook that shows your calculations, charts, figures, tables, etc. (25%).

· At this point, you should be very comfortable with some of the analytical tools within Excel, and this is an opportunity to show that. Be sure to follow the guidelines set in the BA 325 Information Literacy Assessment Rubric (You may use any font size/style/paragraph spacing/line spacing that you are comfortable with).

Strategic Management and Strategic Competitiveness

Strategic Management and Strategic Competitiveness


Choose one public corporation in an industry with which you are familiar. Research the company on its own website, the public filings on the Securities and Exchange Commission EDGAR database, the University’s online databases, the Nexis Uni database, and any other sources you can find. The annual report will often provide insights that can help address some of these questions.


Write a four- to six-page paper in which you do the following:

  • Assess how globalization and technology changes have impacted the corporation you researched.
  • Apply the industrial organization model and the resource-based model to determine how your corporation could earn above-average returns.
  • Assess how the vision statement and mission statement of the corporation influence its overall success.
  • Evaluate how each category of stakeholder impacts the overall success of this corporation.
  • Go to Basic Search: Strayer University Online Library and locate at least three quality references. Note: Wikipedia and similar Websites do not quality as academic resources.

Use the Assignment 1 Template [DOCX] to ensure that your assignment meets the above requirements.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcome associated with this assignment is the following:

  •  Determine the impact of globalization and technology changes, strategic models, vision and mission statements, and stakeholders on a corporation’s success.

Grading for this assignment will be based on answer qua

Discussion On Successful Organizations

Throughout the term you have explored an examined numerous topics around management and leadership.  Successful organizations require an environment of support, sustainability, and life-long learning.  As an emerging leader share two lessons learned and how you will implement them within your current role and organization.

Cloud Migration

You are a systems engineer contracted to move The Grass is Greener, Inc. (GIG, Inc.) from their on-premises data center to the cloud. GIG, Inc. is a large landscaping company that has outgrown their current IT structure. They have a strong online presence that provides 50% of their new customer traffic and the convenient online payment section for customers. Both of these front-ends are connected to a back-end database that houses critical data that includes inventory, scheduling, pricing history, and personal identifiable information of their customers. Below are the company’s requirements:

  • The company has a webserver and database that they definitely want to move to the cloud. The system will need to be accessed from different offices as well as in the field.
  • Secure network connectivity to the environment is a must.
  • They also have a file server that they are considering migrating based on long-term costs.
  • The company keeps files for a period of 5 years for compliance reasons.
  • Company management is very concerned about increased technology costs.
  • Last year, the company lost several thousand records due to a hard drive failure. They would like to ensure that any solution provided takes into account redundancy and reliability.

Create a 2- to 3-page summary that discusses the benefits and concerns of moving to a cloud environment. Ensure you include this information in your summary:

  • Costs
  • Technology
  • High level design options (IaaS, SaaS and PaaS)
  • Security
  • Reliability

Linux Training Guide


<You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a tutorial that will demonstrate how to install Linux and provide an overview of several common commands, as listed below.>

<The recommended format is to provide screenshots incorporated within the written narrative. No sources are required for this phase of the project; however, the screenshots must all be your own. Screenshots from external sources are not permitted.>

<Provide the reader with an introduction that includes what you intend to cover in the training guide.>


Part 1

<Use any hypervisor of your choice to install Linux. Many hypervisors are available, including Oracle’s VirtualBox, an open source (free) virtualization product. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. Ask your Professor for access to VMware.>

<NOTE: It is not necessary to include screenshots of installing the hypervisor software.>

<Walk the technician through an install of the distro, using appropriate screenshots for the major steps. You should include at least 3 screenshots (e.g., disk partitioning, time zone selection, creating the default account) of your installation accompanied by a brief explanation of what you did.>

Example screenshot

<Example Distro Homepage Screenshot>

<After downloading, how will you ensure the file has not been tampered with prior to use?>

A screenshot of a cell phone  Description automatically generated

<Example Distro Install in progress Screenshot>

…and so on. 

<The last step in part 1 should show the final distro desktop>


Part 2

<Demonstrate command-line operations that will provide the following information. Ensure you provide clear screenshots to show the results of each command you run:>

<Ensure all Linux commands are displayed in lowercase and explain acronyms on first use, (e.g., Secure Shell (SSH)).

· The manual page for a given command.

· The current directory.

· Display a listing of files in a directory and common file attributes. The display should list the most recent files last.

· Create a file, then copy it to a different directory. Create a second file and move it to a different directory. Remove the first file, as well as the copy you created.

· Create a text file, then use an editor to modify the content. Then display the content of the modified file.

· Show running processes on the system. Demonstrate how to search for a specific process.

· Forcibly stop a running process.

· View the system logs. Determine what logging system is in place. Display the configuration for the logging system.

· View the state for the logging daemon.

· Backup the file used for local name resolution.


Part 3

<This portion of the training guide helps determine your submission is unique. Thus, you must include the specific screenshot as seen below or your project will not be accepted.>

<Open a command line and type in the following commands (without the quotes) :>

“echo CMIT391”
“echo <your name here>” (Replace your name here with your name)

example of final screenshot

<Example Final Screenshot>


<Provide a conclusion of at least a paragraph summarizing why using Linux is beneficial for employees, management, and the organization as a whole>.



<These example citations use IEEE style. Ask your instructor for clarification on the style to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ Encryption. [Accessed December 1, 2019].

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed December 6, 2019].

[3] Canonical Ltd. “Download Ubuntu Desktop,” Ubuntu Downloads, 2019 [Online]. Available: https://ubuntu.com/download/desktop. [Accessed Sept. 23, 2019].

Cyber Security Application Portfolio


Southampton Solent University

Coursework Assessment Brief

Assessment Details


Unit Title: Cyber Security Application
Unit Code: COM713
Unit Leader: Andy Farnell
Level: 7
Assessment Title: Cyber Security Application Portfolio
Assessment Number: 1
Assessment Type: Portfolio
Restrictions on Time/Word Count: 3000 words
Consequence of not meeting time/word count limit: There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.
Individual/Group: Individual
Assessment Weighting: 100%
Issue Date: 21st January 2020
Hand In Date: 26th May 2020
Planned Feedback Date: 24th June 2020
Mode of Submission: on-line
Number of copies to be submitted: 1
Anonymous Marking


This assessment will be marked anonymously

Assessment Task


As a motive to writing your portfolio imagine a context, like a company or organisation you work for, for example consider the following scenario (you can pick another if you like as a frameork for your system security portfolio):


Oppression Watch is a rights organisation supplying legal advice, counselling and information to a vulnerable group. Having many political enemies, foreign and domestic, online  and offline, the organisation is a high exposure target.


As a member of the software security and privacy task force you are to audit and make recommendations for the transformation of their systems, policies and processes.


Alternatively you may choose your own fictional organisation with complex digital security needs.




You are to consider the areas of:


  • Data storage, integrity, privacy, compliance.
  • Secure communication for both organisational staff and clients
  • System hardening, including servers, offices, and mobile devices
  • Personnel and operational security



Your portfolio should include an understanding and appreciation of a range techniques related to the principles and technologies of cyber security in practical application. In particular you should demonstrate awareness of:


  • Threat and vulnerability modelling, risk prioritisation
  • Anticipation of emerging threats
  • Access control, authorisation
  • Defensive system design principles, in depth and breadth
  • Scope, lifecycle, maintenance and sustainability
  • Technologies, options for technical implementation
  • Encryption for communications and storage
  • Policies , monitoring, response plans
  • Cost, roles, skills and human resources
  • Trade-offs, compromises and push-backs




A 3000 word concise technical report will for the basis of your portfolio, and it may include screenshots, terminal logs, tables, lists, flow diagrams, or any other appropriate graphics or formulae summarising key techniques and considerations. Emphasise the practical execution of auditing and hardening tasks and comment on difficulties or lessons learned.



COVID-19 mitigations:



Due to the inaccessibility of the labs and the fact that not everyone has access to

virtual machine technology you may either choose to create portfolio material on your own using a terminal emulator, or to submit referenced exerpts of quality HOTO guides (for example StackExchange) to illustrate what you would do. Citations must be given.

Assessment criteria

Your submission will be assessed against the following criteria:


Criteria Below threshold Grade D Grade C Grade B Grade A
Security Engineering principles Little or no evidence of security thinking. Contradictory, dangerous or misunderstood technique. Weak security engineering with partial understanding of some key issues. Viable security thinking with understanding in most key areas. Fair understanding of risks and mitigations. Good security thinking with some flair for grasping complex risk concepts and some defences. Broad and deep understanding, holistic integrated approach, pragmatic   and balanced. Evidence of complexity thinking. Informed by best practice and relevant policy. Insightful understanding of current and emerging threats.
Technologies Implementation Configuration No technological basis for implementing the process is shown. Unrealistic implementation or poor choices of technologies. Misconfiguration or misunderstandings of tools.

No substantial plan.

A plausible set of tools and technologies with proper description of their set-up and use. Some treatment of planning and test. Extensive set of technical measures and ideas to deal with multiple threats. Evidence of research and understanding of the resources needed to deploy. A textbook deployment of state-of-the-art solution. Comprehensive, well researched proposal, with milestones, test criteria, depth, redundancy,

cost and skill-set needs.

Presentation and communication of ideas Incoherent, unreadable report without structure, substantial content or references. Poorly structured and written report, lacking strong communicative skills, no use of visual or tabulated data, few or no references, or poor quality research sources. An adequate report that communicates the key ideas in an effective and concise way. References given as evidence of research reading. Appropriate sourcing. A good report that concisely but extensively deals with significant scope. Well researched, argued points. Good use of visuals and structure. Great referencing from well chosen high quality sources. An excellent report with well written, well informed  compelling arguments, concise and nicely structured. Clever use of compact visual devices. High quality, up to date research with excellent referencing.






Learning Outcomes


This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions


Students are reminded that:


  • If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;
  • If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;
  • If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.




Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not ‘fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.


A summary of guidance notes for students is given below:





Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.


Procedures relating to student academic misconduct are given below:






Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.


The Ethics Policy is contained within Section 2S of the Academic Handbook:




Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.


Policy:           http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf



Guidance for online submission through Solent Online Learning (SOL)