Response to discussion 2 Info tech Strat Plan

Please write two posts for the documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides” (Ciampa 368-369).

You will create a PowerPoint presentation for a fictitious company regarding wireless security. Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to Tech Republic Article about Powerpoint (Links to an external site.) for proper use of developing presentations in PowerPoint. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

Penetration testing

 Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

Please write between 200 and 300 words
 

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

power point presentation Topic related to subject “Decision Mkg/Essent Bus Comm “

question 2. 

power point presentation Topic related to subject  “Decision Mkg/Essent Bus Comm “

Audit Report Presentation  (power point presentation)

what is audit report (audit report means opinion on whether a company’s 

financial statements comply with generally accepted accounting principles)

below i have attched , how to make audit report presentation.

please read every step and work on the power point presentation

 

power point presentation(total 150 points ).  Must and should cover below points 

Content            40 points

Quality of Content 60 points

Organization       15 points

Written Communication  15 points

Visual Aids          10 points

Presentation Style   10 points

Week 7 Assignment

 

Complete the following assignment in one MS word document:

Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 12:

Discussion question 1-3:

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Exercise 1,12,16:

1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

12. Research the role of chatbots in helping patients with dementia.

16. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

Chapter 13:

Discussion question 1-4:

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

Exercise 3, 4, 6:

3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

intro to datamining

This written assignment will demonstrate the student’s ability to apply the theory of datamining to the manufacturing industries.

The fields of data science and mining are applicable to nearly all industries. This is especially the case with the manufacturing field. In this area, the different areas of the manufacturing process provide ample areas to collect the data. Within each step of the manufacturing process, there are also more opportunities to collect data. This provides a mountain of the data to review, clean, and analyze.

Assignments

Please pick a manufacturing industry (e.g. auto, steel, or book making) and apply data mining to an individual step in the process. Please also address decision tree classifiers as part of the research paper.

Requirements

There are two portions for this part of the residency. You will create a research paper and presentation.

Provide a 1,000 word or 4 pages double spaced research paper.

Use proper APA formatting. Do not plagiarize. Cite other people’s work; they have put much effort into getting their work published and deserve to be recognized.

Demonstrate your understanding of how this would be applied to your choice of industry and step, along with the presentation.

Also, prepare a presentation based on your research paper.