week14 Discussion

 

In your initial post, answer the following questions about IT Project Management. In addition to your course textbook (chapter 11), utilize the UC library for information and examples.

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Decision Making W2

 

Constructing Deductive and Inductive Arguments

Arguments consist of premises and conclusions. Premises are structured so as to lend support to conclusions. The kind of support that a premise lends to a conclusion allows us to distinguish between deductive and inductive arguments. This week, you will be constructing both kinds of arguments.

1.  In three premises each, construct one example of each following deductive argument form:

·  Modus ponens

·  Modus tollens

·  Hypothetical syllogism

·  Disjunctive syllogism

Make sure your arguments are deductively valid and that your examples are your own. Here are two examples of the general format that your arguments should take:

Modus ponens:

1.  If it is raining, then it is pouring.

2.  It is raining.

3.  Therefore, it is pouring.

Modus tollens:

1.  If Jack went to the grocery store, then he bought cookies.

2.  Jack did not buy cookies.

3.  Therefore, Jack did not go to the grocery store.

2.  After you construct the preceding deductive argument forms, construct a three premise syllogism. For example:

1.  All men are mortal.

2.  Socrates is a man.

3.  Therefore, Socrates is mortal.

3.  After you construct a three premise syllogism, construct one of each of the following inductive argument patterns:

·  Induction by enumeration

·  Reasoning by analogy

·  Statistical induction

·  Higher-level induction

Your examples of inductive argument patterns should not be expressed in premise form. Rather, they should be informally expressed in writing. You should have one paragraph for each pattern. Be as detailed as possible.

Finally, please remember to label your arguments. This makes it easier for them to be graded. Include your name, course section, and the date at the top of your assignment document.

View your assignment rubric.

discussion

1,      In the discussion forum, describe an instance where the California state government has taken some legislative action that has negatively influenced economic activity  on the internet in the state of California.  

2, Graded Assignment  :

 BBC DIGITAL MEDIA INITIATIVE REVISITED 

 tent

No submission
0points

Missed most of the parts/points of the assignment
1points

Did not answer three parts/points correctly.
2points

Did not answer two parts/points correctly.
3points

Did not answer one part/point correctly.
4points

Answered all questions correctly.
5points

Writing Skills

No submission
0points

Frequent errors.
1points

More than occasional errors.
2points

Occasional errors.
3points

Very few errors.
4points

Excellent – totally free of errors.
5points

Formatting Skills

No submission
0points

Frequent formatting errors.
1points

More than occasional formatting errors.
2points

Occasional formatting errors.
3points

Very few errors.
4points

Excellent – totally free of errors.
5points

References Supplied

No submission
0points

No references were supplied to support the assignment.
1points

Supplied a few references required to support the assignment.
2points

Supplied some references required to support the assignment.
3points

Supplied all but one reference required to support the assignment.
4points

Supplied every reference that was required to support the assignment.
5points

db4

 

From the Research Paper in Lesson 4 share the types of countermeasures you discovered.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Start a discussion thread and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

You must do this following:

1) Create a new thread. As indicated above,  discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting? 
  • What additional questions do you have after reading the posting? 
  • What clarification do you need regarding the posting? 
  • What differences or similarities do you see between your posting and other classmates’ postings?

Discussion 2-3 paragraphs

Determining Jurisdiction

John Miller is the information security and privacy officer of a local county-owned teaching hospital. He is new to his position and began his work by evaluating the existing security and privacy controls that are in place in the institution. He is also new to information security, having only recently graduated with a BS in information security with professional experience as an active-directory administrator for two years. This work with active directory created his interest in pursuing a position in the field of security. Because he has most experience in the area of account management, user creation and management, groups, roles and group policy, these are the areas where he began his work. He found literally hundreds of idle accounts indicating that users are created but are not properly discontinued when medical students, nursing students, and other employees move on and no longer need access to the data collected and stored by the hospital. This discovery inspired him to begin digging into other aspects of the security controls, and he found evidence of malware on the servers that house the data collected and stored for use by the hospitals clinical systems. His next discovery was the most alarming. The objective of the malware that had deeply infested the hospital systems was to package and transmit all available data to a remote host located in North Korea. John is clearly in over his head at this point and needs to act quickly to resolve this situation and stop the flow of personally identifiable health information to an unauthorized third party.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

  • What primary laws, regulations, or statutes have been violated by this lack of attention to controls, leading to this serious breach of security?
  • What channels of communication should John enlist to assist him in resolving this matter, and in what order should those communication sources be contacted?
  • What tools and any supporting resources are available to John to determine the breadth of the breach and the mitigations available to secure those assets?

Response 1 reply

The SLA management system mechanism speaks to a scope of financially accessible cloud administration items that give highlights relating to the organization, collection, storage, reporting and runtime notification of SLA data.

A SLA administration framework sending will for the most part incorporate a storehouse used to store and recover collected SLA information in light of pre-characterized measurements and revealing parameters. It will additionally depend on at least one SLA screen systems to gather the SLA information that would then be able to be made accessible in close realtime to use and organization gateways to give continuous input in regards to dynamic cloud administrations.

Why it is important in cloud infrastructure management?

An SLA serves as both the blueprint and warranty for cloud computing. The SLA monitor mechanism is used to specifically observing the runtime performance of cloud service to ensure that they are fulfilling the contractual Quality of service(QoS) requirements that are published in SLA. The data collected by SLA monitor is processed by SLA management system to be aggregated into SLA reporting metrics.

Convert SLAz to help overall business outcome : Even though the cloud computing market in world is growing considerably, very few Small Medium Business(SMB) companies have the IT maturity to take an infrastructure-based SLA and map it to business outcomes. Organizations should opt for SLAs that best suit the business requirements, instead of going in for strigent. If the organization decides on a stricter SLA infrastructure level, then the cost will have to borne by the company itself. Clod SLA monitoring becomes logical and partical when focus is on a prudent business-transaction-level SLA(Number if hits on the website, database  transaction etc) and not just the infrastructure level SLA( response time, latency and availability).

                                                                        Reference

Mandar, K. (2011). 6 cloud SLA monitoring tips for better service delivery. Computer weekly. Retrieved from https://www.computerweekly.com/tip/6-cloud-SLA-monitoring-tips-for-better-service-delivery

Thomas, T. (2011). Service Level Agreements in the cloud : who care? . wired. Retrieved from https://www.wired.com/insights/2011/12/service-level-agreements-in-the-cloud-who-cares

Research project

  INFORMATION GOVERNANCE SEMESTER PROJECT – PHASE I Introduction to the Company: Security Transport Professionals Incorporated (STP), has its home office located in Lexington, Kentucky and in addition has more than 3,000 employees located in each of its branch offices located in Houston, Texas and San Diego, California. STP is primarily a nationwide freight hauler. Its customer are comprised of major market retailers particularly in the medical and pharmaceutical industry, the federal government, and several state governments. STP operates a fleet of trucks and private cargo planes that it uses to move “goods” belonging to its customers from one destination to another across the continental United States. Its fleet of truck carriers are located in Lexington, Kentucky with it planes located in Louisville, Kentucky. STP carries and transports highly controlled, narcotics and scheduled prescription drugs, toxic, radioactive, nuclear, and top secret materials from one facility belonging to its customer to another. The method of transport depends on the type of cargo being hauled. In addition to hauling/forwarding its customers products/goods, STP is required from time to time to store its customer goods for brief periods of time. Two years ago STP began contracting with a number of subcontractors hereafter referred to as either “limited joint partners (LJPs)” or “independent subcontractor alliances (ISAs)” for the purpose of expanding its freight forwarding, storage, and delivery service. Due to the confidential nature of the freight that it transports, STP vets its employees, as well as any subcontractors (LJPs and ISAs) that it engages. STP’s business objectives and goals include the confidential, safe and secure movement of its customer goods, from the customer/distributor to its client, or from one of its customer’s locations to another of the customer’s locations in a timely and efficient manner using costeffective methods. Alternatively, STP may transfer this responsibility to one of its limited joint partners (LJPs) or independent subcontractor alliances (ISAs), if it is more cost-effective and the income differential is within acceptable limits. There are 3 LJPs with which STP had entered into contracts.  LJPs are corporate organizations in the same industry that offer essentially the same services as STP, and who are generally competitors of STP. However, when the job requires resources that exceed those of STP or its competitor, the two will enter into an agreement to jointly undertake the contract together, and will together provide the same full range of services, with both entering into the same contract or joint venture with the customer. Independent subcontractor alliances (ISAs) differ from Limited Joint Partners (LJPs) in that a ISA is not a direct competitor of STP. Rather, the ISA is a company that offers a subset of services to STP, or contracts with STP to provide it with necessary resources to perform the particular job at hand. For example, an ISA may be a warehousing company that provides only storage facilities for STP. Alternatively, an ISA may be a company that is engaged in service and repairs for STP’s trucks and planes, and/or provide sterilization and cleaning services for STP’s trucks and planes upon completion of a job, where STP had transported hazardous or toxic materials, requiring specific types of sterilization or cleaning services for its transport vehicles. There are other types of ISA that STP engages and contracts with. With regard to ISAs, STP is the only organization that will contract with its customer or who will be identified to the customer. It will then enter into its own separate subcontractor contract with its ISA, and the ISA is not identified to STP’s customer. There is no definitive number of ISAs that contract with STP. The specific ISAs used (if any) will vary depending on the geographic location or area of the country involved and the availability and cost of the ISA available to service the area. STP is also under pressure from several of its competitors in the industry. The competitive market is driving STP to improve its routes, delivery methods, fleet vehicles, and other facets of its business to increase profits (a strategic goal) and to reduce costs. The company realizes that its information technology infrastructure has been neglected for some time and that many operating locations are running on outdated hardware and software. On several occasions last year, STP suffered no less than four network compromises through one of its LJP Internet sites that led to the disclosure of sensitive and strategic information on contracts and mergers. The chief information officer (CIO) made a strategic presentation to the board of directors and executive management to first assess the aging infrastructure and then, develop a multi-year  phased approach to have all sites (except for LJP and ISA) on the same hardware and software platforms. Information about the assessment indicates that the current state core infrastructure (switches, routers, firewalls, servers, and so on) must be capable of withstanding 10-15% growth every year for the next seven years with a three-to-four-year phased technology refresh cycle. There is a hodgepodge of servers, switches, routers, and internal hardware firewalls. Nearly all of the infrastructure is woefully out-of-date in terms of patches and upgrades. This operational neglect has unduly increased the risk to the network, in terms of confidentiality, integrity, and availability. Since this will be a multi-year technology upgrade project, something must be done to reduce STP’s exposure to vulnerabilities to increase the overall security profile and reduce the risk profile. Now that the funding has been approved for the infrastructure assessment, the CIO has decided that it might be a good idea to implement an Information Governance Program into the organization, assuming he can sell the corporation on its benefits. To that end, the CIO has hired you as IG Project Manager to assist in initial preparatory stages. STP Job Roles: In addition to the CIO, below is a list of individuals at STP to whom you have been introduced. The CIO has informed you that you can call upon any or all of the individuals who hold these job roles/titles for assistance and may name any of them to be on your project team. You may also call upon any of the heads of the various business units for assistance, as well as a designated contact person for each of STP’s LJPs and ISAs. ▪ Chief Executive Officer (CEO)* ▪ Chief Information Officer (CIO)* ▪ Chief Financial Officer (CFO)* ▪ Executive VP of Marketing* ▪ VP of Human Resources ▪ In-house Counsel ▪ In-house Financial Analyst and Risk Manager ▪ Senior Records Manager ▪ Senior IT Manager ▪ IT Security Expert ▪ Overland Transport Manager  ▪ Airway Transport Manager ▪ Overland Transport Manager ▪ Airway Transport Manager ▪ Southern Region General Manager (Houston, Florida) ▪ Western Region General Manager (San Diego, California) ▪ Information Security Specialist * This individual is also a member of STP’s Board of Directors INSTRUCTIONS: While it should go without stating, information related to each of STP’s customers and the products that you are transporting for them is highly sensitive, and in some cases top secret. You want to make sure that any IG Program that STP ultimately implements will allow STP to retain all of the information about its customers, the product transported, and the particular haul that it is required to keep pursuant to federal and state law. You want to insure STP that the proper information will be retained that it might need for purposes of litigation and e-discovery. At the same time, you don’t want STP to keep unnecessary information for extended periods of time, thereby increasing the cost and time involved with processing and retention. 1. First, select and list 10 individuals to serve on your IG project team. Explain why you selected the team members that you did. 2. Conduct the necessary research for each of STP’s state of home office (Kentucky), and for the state of each of its primary hubs (Texas and California), that will allow you to (a) educate yourself and your team members on the mandatory information retention requirements and privacy consideration for each of the three states, and (b) be able to intelligently discuss the legal and regulatory requirements with in-house counsel. You will want to conduct internet research on this and may also want to review Appendix B in your text book. Do not ignore this area of the project. 3. Ultimately, your team will be required to create a “risk profile” and risk analysis, that will describe the set of risks facing STP in achieving its business objectives while protecting its information and that of its customers, LJPs and ISAs, and which will allow STP to assess the likelihood these risks hold and their potential impact, if materialized, and in addition will permit STP to identify risk mitigating factors to be implemented. You need to brainstorm in order to present the information to your team members that will facilitate the creation of a risk profile and analysis. To that end, create a top-10 list of the greatest risks to information that STP will face, ranking your list in order from highest or greatest risk to lowest, for each risk identified, state whether you believe the risk could be assumed, transferred or mitigated in full or in part. Also, for each risk identified identify the individual, title or business unit that the team member will want to contact in order to obtain additional information about the fundamental activity that will assist your team in fully completing the risk profile and analysis.  

reply dr 4

The essential specialized abilities required by the staff of a CSIRT group have been isolated into two classes whether low maintenance or full time:

1. Specialized Foundation Skills

2. Occurrence Handling abilities

Thought the low maintenance staff would be brought in just when required they should at present have every one of the aptitudes excepting the week after week working or timing definitions that a full clock would have. Specialized establishment abilities require a fundamental comprehension of the basic advancements utilized by the CSIRT and the voting demographic, just as comprehension of issues that influence that group or voting public. Such issues may include:

• The sort of episode action that is being accounted for or seen by the network

• The manner by which CSIRT administrations are being given (the dimension and profundity of specialized help gave to the body electorate)

• The reactions that are fitting for the group (e.g., what strategies and systems or other regulations must be considered or pursued while undertaking the reaction)

• The dimension of power the CSIRT has in taking particular activities while applying specialized solutions to an occurrence answered to the CSIRT

The specialized abilities would incorporate knowing about the accompanying:

§  Security Principles

§  Security Vulnerabilities/Weaknesses

§  The Internet

§  Dangers including PC security chance examination

§  The different system conventions set up

§  CSIRT staff individuals need a fundamental comprehension of the basic system applications and administrations that the group and the voting public use (DNS, NFS, SSH, and so on.)

§  Ideas of system security and have the capacity to perceive defenseless focuses in system arrangements.

§  Comprehend security issues at a host level for the different sorts of working frameworks (UNIX, Windows, or some other operation e rating frameworks utilized by the group or body electorate).

§  Malevolent Code (Viruses, Worms, Trojan Horse programs)

§  Some colleagues would need PC programming skills (Java, C#, Python, and so on)

The elements that would impact their choices are:

1. How adaptable would the functioning hours be as they have another activity close by to do.

2. What amount would they be paid for

3. Employer stability being a section clock

Essay Question

 

Chapter 3 presented the approach Mars, Incorporated used to implement ERM, and chapter 5 presented the University of California Health System’s ERM development. In what ways are the two organization’s approaches to ERM similar? How do they differ? Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.  

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe in what ways the two organization’s approaches to ERM are similar. Also, explain how they differ. Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.

Chapter 5:

https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5262739?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27W1_Lecture_Part2.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190706T160121Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190706%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=0ef9de99e4106eb856e5613fb48da24a6fa0c0ad7ff69b7bd9553cc6441a5fe4

Chapter 3:

https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5262738?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27W1_Lecture_Part1%25281%2529.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190706T160133Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190706%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=cf80811422d683ed8bafd6263d0db4cbbfd06569ac9ab86695d51e244bc0e550 

DQ 2 Week 7


I need this assignment done & done CORRECTLY as the assignment states in it’s directions.  If you can complete this assignment, do it correctly AND FOR THE PRICE I POSTED IT FOR, then let me know ASAP.  I need this done from the info that is posted in this assignment.

 

Post your code as an OOP example. Please pay attention here because structured programming and OOP are very different. This week we are learning about Object Oriented Programming, post pseudocode or code examples showing attributes, methods and classes. Some students will have a Java class in the future so please start writing Java examples 🙂

 

The info that you need to complete this assignment is below:

 

Table table = Database.open(new File(“MyDB.db”)).getTable(“MyTable”); // this line opens the database file and gets the table from it named “MyTable”

// Now for each row of the table, iterate thru all the rows and show the content.

for(Row row : table) 

{

System.out.println(“Column ‘a’ has value: ” + row.get(“a”));

}

 File myFile = new File( “MyFile.txt” ); // create a file object that points to the location of the file.

    if (myFile.exists() && myFile.length() != 0)  // check to see if file exists or not

        

        {

            BufferedReader in = new BufferedReader(new FileReader( myFile )); // create a reader object that will help in reading the data from file.

            String lastName, firstName, phoneNumber;

            // read the data line by line

   firstName = in.readLine(); 

            lastName = in.readLine();

            phoneNumber = in.readLine();

        }