HW

First homework :

MLA STYLE 

MY MAJOR IS COMPUTER ENGINEERING SO YOU CAN DO THE HOMEWORK 

Your Future Career: Data, Information, Hardware and Software

Section I

Describe the data and information utilized in your future career. You may visit with anyone you know that is currently working in your future career. You can also search for credible websites and don’t forget to take a look at electronic scholarly journal articles. 

 

  1. Briefly summarize your future career. 
  2. Summarize (describe) the data, aka “facts”, that are collected and input into a computer system.
  3. Summarize (describe) the information, aka “output” (processed data).

 

Reminder: information is processed data (information is data that is endowed with relevance and importance, where data are the mere facts).

Section II

Summarize the type of hardware and software you will likely use (personally) in your future career. 

For example:

  • Laptop?
  • Desktop?
  • Smartphone?
  • Tablet?
  • Input devices?
  • Output devices?
  • What are you required to carry with you?
  • What are you required to have in your car? 
  • What are you required to have at home? 
  • Other technology? 

Also include the names of common software applications used in your future career and their purpose.  

Formatting (and other important directions):

  • A minimum of 250 words per section (titles, page numbers, your name, etc. do not count towards the minimum number of words) 
  • Use MS Word
  • Use Times New Roman font, 12 pt. and 1″ inch margins (top, bottom, left and right)
  • Use single spacing
  • Insert a page break between sections
  • Cite your credible resources using APA format

 

Second homework :

Assignment #6: Choosing Technology to Meet a Need

Identify a need where technology can help (school, work, hobby, etc.).

Go shopping (online) – don’t buy anything, you’re just looking around!

Add hardware and software to the shopping cart that you feel will meet the need(s) you have identified.

Describe, in your own words, why you believe the hardware and software in your shopping cart will meet your need(s).

You should address why the processor, primary storage (RAM / Memory), secondary storage (e.g., hard drive, optical drive, flash memory, etc.) and video (or other output devices) will meet the identified need. 

Describe why you selected the apps/application/software, along with any other deciding factor (e.g., input devices, size, weight, etc.).

In summary, your paper is to have three sections:

Section 1:  A paragraph stating your need. 

Section 2:  A copy of your shopping cart (don’t worry about formatting, I should be able to decipher it).

Section 3:  In your words, state why you believe the hardware and software you have chosen in section (2) will meet the need you identified in section (1). Be sure to include any additional factors you included as part of your decision (e.g., input devices, size, weight, etc.).

Formatting (and other important directions):

  • A minimum of 100 words for section (1)
  • A minimum of 250 words for section (3)
  • Note: titles, page numbers, your name, etc. do not count towards the minimum number of words requirement 
  • Use MS Word
  • Use Times New Roman font, 12 pt. and 1″ inch margins (top, bottom, left and right)
  • Use single spacing
  • Insert a page break between sections
  • Submit via MoodleISU

Websites that can help in this assignment:

Dell and Apple provide discounts to faculty, students and staff. Here is a link to ISU’s Purchasing Computer Pricing page.

http://www.isu.edu/purchase/ComputerPricing.shtml

You may choose “personal purchases” from either Apple or Dell or choose any other vendor/manufacturer (from this site or any other of your choosing).

The following are some links that should be helpful when choosing a processor, memory, hard drive, video, and optical drives (regardless of manufacturer).  Look for “help me choose” or similar link for each of the configurable items. You should be matching your choice on any configurable item to your needs.  Be sure to look at the “recommendation” links on the following sites or on any “help me choose” link.

Processor: http://www.dell.com/learn/us/en/19/help-me-choose/hmc-processor-lt-anav?

Memory: http://content.dell.com/us/en/home/d/help-me-choose/hmc-memory-consumer-anav.aspx

Hard Drive: http://content.dell.com/us/en/home/d/help-me-choose/hmc-hdd-desktop-consumer.aspx

SSD Hard Drives (Crucial Technology): http://www.crucial.com/usa/en/storage-ssd-buying-guide

SSD Hard Drives (Intel): http://www.intel.com/content/www/us/en/solid-state-drives/ssd-help-me-choose.html

Video: http://content.dell.com/us/en/home/d/help-me-choose/hmc-video-card-anav.aspx

Optical: http://content.dell.com/us/en/home/d/help-me-choose/hmc-optical-drives.aspx

How much storage capacity do I need? 

Assignment 1: Organizations – Business Process Redesign at the Small Business Administration

In a November 30, 2001 report to congressional requesters, the General Accounting Office (GAO) outlined the need for a thorough evaluation of the potential use of the software before developing and contracting for the loan monitoring system, the SBA needed. The SBA agreed to do so (see http://www.gao.gov/new.items/d02188.pdf).

In July 2004, Inc.com reported that … monitoring system that can help it oversee a portfolio of $45 billion in loans. Now it needs to lay out exactly how it is going to use it, says Senator Olympia Snowe, chair of the Senate Committee on Small Business and Entrepreneurship. In 2003, the Small Business Administration (SBA) awarded a contract to Dun & Bradstreet to provide the agency with a loan monitoring service to help it assess and manage risk associated with its borrowers and lenders. The GAO reviewed the service, at Senator Snowe’s request, and reported that the service was on par with those used by private sector lenders, but that the SBA did not have policies in place to use it to fulfill the agency’s needs. Snowe pushed the SBA to develop those policies.

SBA’s new Disaster Credit Management System (DCMS) was launched in November 2004 and faced its first critical test in the fall of 2005, when the nation was hit with some major hurricanes in 2005, including Katrina, the costliest hurricane with an estimated cost of $35 billion. SBA was (and still is) swamped with loan applications as is the Small Business Administration Disaster Credit Management System Support.

In July 2006, GAO issued a report evaluating the following:

  • Factors affecting SBA’s ability to provide timely disaster assistance
  • Actions SBA took after the disasters to improve its response to disaster victims (see Report GAO-06-860 at http://www.gao.gov/new.items/d06860.pdf)

Use the above links, the material in the textbook, Argosy University online databases, and the Web to address the following questions:

  1. What was wrong with the existing loan management system and why did SBA decide to replace it in 2004?
  2. In what other ways could the agency use information systems to improve the process of loan application, approval, and maintenance?
  3. Go to the SRA, Inc. Web site (http://www.sra.com/) and identify the features of the company’s software used by SBA (http://phx.corporate-ir.net/phoenix.zhtml?c=131092&p=irol-newsArticle&ID=616444&highlight=)What other features should SBA think of using?

Your response should be a 2–3 page Microsoft Word document, double spaced, and in 12 point Times New Roman or New Courier font. All written assignments and responses should follow APA rules for attributing sources. Be sure to cite the references you used.

risk assessment ..no turn it in issues

Technical Paper: Risk Assessment

Due Week 10 and worth 160 points

Technical Paper Diagram

 

Global Finance, Inc. Network Diagram

Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth.

 

GFI’s network has historically been fairly stable, and the company has not experienced many full scale network outages. GFI has hired three (3) network engineers to keep up with the network growth, as well as the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.

 

The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

  1. Describe the company network, interconnection, and communication environment.
  2. Assess risk based on the GFI, Inc. network diagram scenario. Note:Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.
    1. Defend your assumptions where pertinent information from the scenario isn’t available.
    2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
    3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.
  4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Note: The graphically depicted solution is not included in the required page length.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

 

  • Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures.
  • Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.
  • Explain access control methods and attacks.
  • Describe the details and the importance of application security models and their implementation from a management perspective.
  • Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks.
  • Use technology and information resources to research issues in security management.
  • Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Homework

Discuss one (1) project where you used a problem-solving approach to address what turned out to be common-cause variation, or where you used a process improvement approach to deal with a special cause.

If you do not have a personal experience that echoes either of these situations, you may use Internet to search for a case that reflects either of these situations.

Examples:

·                     one’s personal investment strategy since 2008

·                     reducing waiting times at the local hospital or emergency room

·                     reducing difficulties trying to connect to a Wi-Fi Internet provider

 Answer the following questions in the space provided below:

1.     Describe the experience in the project.

2.     What were the solutions used to address the problem?

3.     Was the case you described a special-cause or common-cause?

4.     Do you feel the solution or approach used appropriate for the cause?

5.     What would you do if you could do it again?

6.     What conclusions can you draw from the problem-solving or process-improvement techniques?

7.      

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment. In your original work, you may use aspects of existing processes from either your current or a former place of employment. However, you must remove any and all identifying information that would enable someone to discern the organization(s) that you have used.

Assignment

Imagine that you own a small, local clothing store along the Jersey Shore boardwalk and decide that you want to engage in e-Commerce.

 

Write a 4-5 page paper on the following:

 

    Identify the advantages and disadvantages of taking your small business online by performing a SWOT analysis. Include 2-4 items in each category.

    Because the Internet connects computers all over the world, any business that engages in e-Commerce instantly becomes an international business. The key issues that any company faces when it conducts international commerce include trust, culture, language, government, and infrastructure. Explain how you would address each of these issues.

    Businesses that operate on the Web must comply with the same laws and regulations that govern the operations of all businesses, but they face 2 additional complicating factors as they try to comply with the law. First, the Web extends a company’s reach beyond traditional boundaries. Second, the Web increases the speed and efficiency of business communications. Explain how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

    Law enforcement agencies have difficulty combating many types of online crime. Describe 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

Your assignment must:

 

    Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

    Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

    Identify the basic elements of the technology infrastructure used to conduct electronic business.

    Explain the basic communications and network concepts used in electronic commerce and the basic functioning of the Internet and the World Wide Web.

    Describe the critical legal and ethical issues related to electronic commerce.

 

    Use technology and information resources to research issues in fundamentals of e-business.

    Write clearly and concisely about fundamentals of e-business using proper writing mechanics.

 

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.

 

 

Points: 200

 

 

Assignment 1: Starting a Business Online, Part 1

 

Criteria

 

 

 

 

Unacceptable

Below 60% F

 

 

Meets Minimum Expectations

60-69% D

 

 

 

 

Fair

70-79% C

 

 

 

 

Proficient

80-89% B

 

 

 

 

Exemplary

90-100% A

 

1. Identify the advantages and disadvantages of taking your small business online by performing a SWOT analysis. Include 2-4 items in each category.

Weight: 25%

 

 

Did not submit or incompletely identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; did not include 2-4 items in each category.

 

 

Insufficiently identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; insufficiently included1- 2 items in each category.

 

 

 Partially identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; partially included 1-4 items in each category.

 

 

Satisfactorily identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; satisfactorily included 2-4 items in each category.

 

 

Thoroughly identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; thoroughly included 2-4 items in each category.

 

2. Explain how you would address each of the international commerce issues.

Weight: 25%

 

 

Did not submit or incompletely explained how you will address each of the international commerce issues.

 

 

Insufficiently explained how you will address each of the international commerce issues.

 

 

Partially explained how you will address each of the international commerce issues.

 

 

Satisfactorily explained how you will address each of the international commerce issues.

 

 

Thoroughly explained how you will address each of the international commerce issues.

 

3. Explain how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

Weight: 20%

 

 

Did not submit or incompletely explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Insufficiently explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Partially explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Satisfactorily explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Thoroughly explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

4. Describe 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

Weight: 20%

 

 

Did not submit or incompletely described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Insufficiently described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Partially described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Satisfactorily described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Thoroughly described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

5. Clarity and writing mechanics

Weight: 10%

 

 

More than 8 errors present

 

 

7-8 errors present

 

 

5-6 errors present

 

 

3-4 errors present

 

 

0-2 errors present

MGMT440-1603B-02

You met with your department manager, a few of the stakeholders, and the sponsor last week to review the list of possible risks. They accepted most of your risks and agreed that the next step was the assessment. There was some confusion, however, over how that step should be completed. Apparently, a prior project manager did a poor job with risk assessment and felt that it was an unnecessary activity. This resulted in the project encountering several risks and always being in fire-fighting mode. Several of the stakeholders (who were impacted most by this mode) want a much more formal approach taken to risk assessment (as does the CEO).

Assignment Guidelines:

You have scheduled a risk assessment meeting for later this week. Create a pre read document for the meeting participants that will walk them through how you will run the meeting and what they should prepare in advance.

In your 3–4 page document, be sure to address the following:

  • Who will you involve? (number of people, roles, and project responsibilities)
  • How will you manage the group?
  • What is your process for assessing the risks? What techniques will you use?
  • Where will you start?

In preparation for the meeting and to help you focus on the upcoming task, review your list of risks. Practice the various techniques you will use by assessing at least 15 of your risks. Create a grid for this activity. Use a qualitative method to identify the high-priority and low-priority risks. Provide a rationale for your responses. Then, using a semi-quantitative method, create a risk score and probability/impact matrix for the remaining risks. The columns should be organized as follows:

  • Risk event
  • Probability
  • Rationale for probability
  • Impact
  • Rationale for impact
  • Next steps (describe what you need to do with this risk event next: nothing, further analysis, or determine actions)

Your submitted assignment (140points) must include the following:

  • A 3–4 page typed pre read document
  • A grid assessing the risks you had outlined in Unit 1 formatted to the requirements listed above

MIS 567 Research paper Outline For Madam-professor

 

MIS567 Research Project Final Paper Assignment: Topic Selection (ungraded, but required)

Review and research the possible topic choices. Choose your research paper topic and upload it via the Week 2 Dropbox titled “Topic Selection.” Your topic choice will be reviewed, and you will receive feedback and/or approval of your topic choice. You do not have to select one of the listed topics. If there is a healthcare information technology topic that you would like to write about that is not listed, let the instructor know. The appropriateness of the topic will be evaluated against the TCO(s) your paper is intended to address.

Possible Paper Topics

Assignment: You have been asked by the executive committee of your healthcare facility to write a report on the strategic implications of information technology for your firm in the next three years. The executive committee has identified a number of potential research topics.

For your convenience, below is a list of possible topics for you to consider. If you have any questions, do not hesitate to ask. If there is not a topic listed here that you would like to research and write about, contact your instructor so that the appropriateness (TCO[s] related, broad enough, etc.) of your topic can be assessed.

  • Electronic health record
  • Computer-based patient record (CPR)
  • E-health
  • E-commerce in healthcare
  • Implementing telemedicine
  • Clinical quality management
  • The use of personal digital assistants in healthcare

Corporate Applications

  • Clinical information systems
  • Enterprise systems in the healthcare setting
  • Clinical decision support systems
  • Expert systems
  • Artificial intelligence applications in healthcare
  • Implementing healthcare information systems
  • The use of the Internet in healthcare
  • Executive support systems
  • Transaction processing systems
  • Knowledge management systems
  • Groupware
  • Intranets

Research Paper Outline (Due Week 3)

Back to Top

Once you begin your research, you will need to create an outline describing how your paper will be presented. Your outline should include (but not be limited to) the following:

  1. Abstract
  2. Purpose of the Report
  3. Background of the Topic
  4. Discussion of Current Issues
  5. Recommendations based on research
  6. Attachments

Submit your outline in the Week 3 Dropbox titled “Outline.”

Week 3 due March 23—Research Project Draft Outline: Please post your outline for your final paper in the (graded) Final Paper Dropbox titled “Outline”.  (See grading rubric in Doc Sharing)  Again, do not forget the APA requirements.  The body of the paper should be your outline, in indented form or sentence-form, the purpose of which is to organize the information you are beginning to find in your research.  In-text citations are not required at this step (except for direct quotations).  Your reference section will include your initial references and any additional references you have used in developing the outline.

 

plus size evening dresses

When we leave our university, the students will take some photos to leave the good memory, it is also a pretty scenery, then next we will have a brief description about the university graduation dresses.

The graduation dresses are becoming very popular in the European, at first the students who pass the exam would wear the evening dresses uk, they could wear the dresses like this to attend the graduation party, this is the ceremony at that time, then if you want to get more knowledge about other, you could pass the exam step by step.

At first time, people would wear the long grown to attend the plus size evening dresses, then at times, it will be very cold, they could wear the long dresses, and dress is the same as the missionaries, colors are brown and black, so the next graduation dresses are like that, when we are going to leave the university, we could wear the evening wear, in some big ceremony, we have to wear the graduation dresses.

Next the colors are becoming more and more, there is not only the black and gray, the different level will have different graduation dresses, at that time, the styles of dresses are becoming more and more, headscarves and robes are separated, it is no longer attached to the wear on the head, it has become a single decoration, some times later, the hat is popular, people put the scarf as a shawl from back to droop, by this time had bachelor’s hat, round and square, or there are decorated on the middle of the hat, hat with tassel, now appears more delicate.

With the development of society, our beauty has changed, the semi formal dresses have also changed with the development of society, from the fabric and colors, we could feel that the style of the graduation dresses are becoming more and more, the shape of the hat is changing, some people have suggested to the shape of the hat to make the shape of a book, so more symbolic, scroll breath.

Network Security Plan document shell

 

Note: The selected organization must have a need for network security as part of its operations. Therefore, you may feel free to identify a hypothetical organization that meets the requirements. Any necessary assumptions may be made to fulfill the requirements of the organization selection.

 

The project deliverables are the following:

Submission of the proposed organization to the instructor for approval

Network Security Plan document shell

Use Word

Title Page

Course number and name

Project name

Student name

Date

Table of Contents (TOC)

Auto generated TOC

Separate page

Maximum of 3 levels deep

Before submitting your project, update the fields of the TOC so it is up-to-date.

Section Headings (Create each heading on a new page with TBD as the content, except for sections listed under New Content).

Project Outline

Overview of Network and Existing Security

Provide an overview of the existing network architecture, including the following:

·         Description of the network

·         The topology

·         Protocols allowed

·         Connectivity methods

·         Network equipment

·         Number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

·         A summary of the current security devices in use on the network

Risk Assessment Section

Conduct an inventory of devices within the chosen organization’s network using appropriate tools.

Provide a summary of the number of desktops, laptops, network printers, and servers.

·         Identify key assets.

·         Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Create a subsection that will identify and describe the risks within the environment.

·         Do not forget natural disasters.

·         Include the likelihood that the risk could occur.

Security Architecture Plan

Identify and select appropriate technologies to protect against the risks that were identified, and provide an explanation as to why the technology was chosen.

Describe where you plan to place these technologies within the network and why.

·         The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify any security controls that need to be implemented to assist in mitigating risks.

Mitigate all of the risks that were identified during the assessment phase.

Security Policies

·         Identify what written polices need to be created for your organization.

·         For each policy, you will address how you plan to monitor the policy.

·         For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

·         For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

·         The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward. You will create an Incident Response section of 2–3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task’s deliverables:

Incident Response Section

Identify the process of how your organization will identify an incident.

Identify the process for classifying the incident.

·         What are the criteria for each classification within the organization?

Identify what the response will be for each classification identified.

Identify a general plan to recover from the incident.

Identify a process for evaluating the incident response plan after each incident has been mitigated.

Implementation Plan

·         Develop a plan to implement the security controls and policies that you identified in previous sections.

·         Develop a plan to implement new security devices and modify existing security devices that are required to monitor the network and the polices that were created or updated.

·         Describe how these controls, policies, and security devices have addressed the key security areas of confidentiality, integrity, authentication, authorization, and nonrepudiation cryptographic services.

Network Security Plan

·         Revise the entire document, and make any necessary changes and improvements.

·         Ensure that the final version is sufficiently detailed to allow the organization to confidently move forward with the implementation of the security controls and devices based upon your recommendations.

·         Previous instructor feedback should be addressed with appropriate changes.

Network Security Plan

 

This course has been composed of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a network security plan. The full Key Assignment should include the following tasks:

 

Overview of Network and Existing Security

Select an organization as the target for the analysis.

Provide an overview of the organization’s existing network architecture.

The overview will include description of the network, the topology, protocols allowed, connectivity methods and network equipment, number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

Provide a summary of the current security devices currently in use on the network.

List the type of device, the vendor, and give a brief description of how the device is used.

Risk Assessment

Conduct an inventory of the devices within your network. Provide a summary of the number of desktops, laptops, network printers, and servers.

Identify key assets

Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Identify and describe the risks within your environment.

Do not forget natural disasters.

Determine the likelihood that the risk could occur.

Identify the tools and methodology that you would use to conduct the risk assessment.

Security Architecture Plan

Based upon the risk assessment and your analysis, create an action plan to mitigate the risks that you have identified.

Identify and select appropriate technologies to protect the network and the organization’s information, and explain why you chose each technology.

Describe where you plan to place these technologies in the network, and explain why.

The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify security controls that need to be implemented to assist in mitigating risks.

Security Policies

Create the Key Assignment first draft for peer review.

Continue the development of the plan.

Create a fourth section in the plan to list all of the policies you would have for your organization and a brief description of what each policy will contain.

Each policy will address how you plan to monitor the policy and what the appropriate punishments should be for violators.

Provide a timetable for when these policies should be reviewed and updated.

Continue development of the Network Security Plan with an Incident Response Plan of 2–3 pages.

Include the actions that need to occur when an incident is in progress.

Include how your organization will identify and classify incidents, what the response will be, and the plan to recover.

Implementation and Incident Response

Analyze previous submissions, and make changes as necessary to the final paper.

Submit a detailed implementation plan of 4–5 pages that will describe your proposed solution for the implementation of the Network Security Plan for the organization.

This is the last and final section of the Key Assignment and should bring together all aspects of the implementation in one cohesive paper.

Revise the previous sections so that the entire plan flows and has a strong introduction and conclusion.

 

 

Assignment 4::Project Deliverable 4: Analytics, Interfaces, and Cloud Technology

 

Project Deliverable 4: Analytics, Interfaces, and Cloud Technology

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Large companies have been using the power of business analytics for quite a while now. Your company desires to get in on the action; company executives believe that using advanced data analysis will enable the company to make smarter decisions and improve business performance. Business analytics gives companies the ability to look at past realizations and performance as well as set up new expectations and performance goals. Analytics-as-a-Service is a new delivery model that uses cloud technology to provide business insights without enormous infrastructure enhancements. The executive team has heard great things about analytics and cloud technology but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly awaiting your forward-thinking viewpoint. 

Section 1: Design Document

1.     Write a four to six (4-6) page design document in which you:      

 

·         Support the need for the use of analytics and cloud technology within this company.

·         Create a workflow diagram to illustrate how analytics and cloud technology could align with the company’s business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

·         Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

·         Give one (1) recommendation for solution providers that could help your company secure a firm advantage by using analytics and cloud technology. 

Your assignment must follow these formatting requirements:

·         Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

·         Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

·         Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.