Request for Proposal

 

Assignment Content

  1. This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. As a Senior IT Project Manager, your responsibilities may include proficiently working with a variety of technologies, conduct meetings with stakeholders, create and forecast budgets, and design project plans.

    The CFO of your chosen organization wants the organization to purchase and integrate six new web servers. The CIO envisions more business travelers using the Web to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed.

    Research information about your chosen organization to complete this week’s assignment.

    Create a 3- to 5-page (does not include title or reference pages) Request for Proposal (RFP) in Microsoft® Word for the CIO, which will minimize procurement related risks for this project. The RFP should contain the following components: 

    • Purpose of the RFP
    • Organization’s background as it applies to the use of the request for new web servers
    • Analysis of procurement risks
    • Methods for managing procurement risks
    • Basic requirements for the current and new hardware and software
    • Software and hardware environment 
    • Statement of work/Requirements and schedule information 
    • Process for evaluating the RFP 
    • Include APA-formatted citations when necessary.

ERM strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found, and discuss how – if possible – organizations can use ERM as a strategy. It is perfectly acceptable if you deem ERM cannot be used as a strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project 1: Executive Summary

Hide Assignment InformationInstructions

This week, you will submit the one- to two-page executive summary that you started last week. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

Be sure to cite any sources you use.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.

When you are finished, click “add a file” to upload your work, then click the Submit button.

HackerView Vulnerability Assessment

 Prepare answers according to the questions given in this week’s homework document.  The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment”  I have attached a sample assignment as a guide and a pdf that need to be followed. 

I have to submit this assignment on 11/5 2020 at 11:00 pm EST

SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.

CC W 9 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 10  (Jamsa, 2013).Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
  • Create a DRP for a company with which you are familiar.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Digital Footprint: Privacy

Description: 

In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual property rights, security, and censorship. As a global citizen, you need to be aware of these issues and how they impact your life.

Discussion Point:

  • Privacy, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
  • How does the electronic environment impact one’s right to privacy?
  • What is the issue? Tell us about it as if we know nothing on the topic.
  • What are the pros and cons of the issue?
  • Why is the issue important?
  • How might the issue impact your life?

Minimum 300 words

EH week8 DB

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism