Discussion 8

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 8  (Jamsa, 2013). Chapter 8 topics:

  • Define and describe virtualization.
  • Defend the following statement: Virtualization is not a new concept within computer science.
  • Describe the various types of virtualization.
  • List the pros and cons of virtualization.
  • Discuss the attributes of applications that are not well suited for virtualization.
  • List reasons why companies should virtualize.
  • List the benefits of blade servers.
  • Define and describe the hypervisor.
  • Define and describe green computing.
  • Describe the concept of the desktop on-demand, and include the benefits of such a system.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Wk 4 – Comparing a Security Strategic Plan to a Security Policy and Aligning to Security Controls

2 Part Assignment 

Assignment Content

  1. The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.

    Part 1
    Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.

    Part 2
    Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.

    Review the controls from this week’s reading, CIS Controls V7.1.

    Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.

    Cite all sources using APA guidelines.

    Submit your assignment.

cmsc 335 final project

 In addition, a zip file is included that includes several Oracle Java files that use different types of Swing components as well as threads. I recommend going through the reading and the examples to become familiar before attempting the final project. Assignment Details As a new engineer for a traffic congestion mitigation company, you have been tasked with developing a Java Swing GUI that displays time, traffic signals and other information for traffic analysts. The final GUI design is up to you but should include viewing ports/panels to display the following components of the simulation: 

Organization leader and decision making

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Structured External Assignment 2

  

SEC 235 – Structured External Assignment

Students will research one of the Security Tech Topics below and create a Power Point presentation that will be presented to the class. You are to examine past, present, and future trends of this topic. This project is worth 100 points. This is to be submitted via Canvas by the end of Week 7. Please refer to the Structured External Assignment Rubric for grading guidelines. Listed below are the minimum requirements for the project:

Power Point Presentation:

  • At least 15-20 slides of text      (No more than 25 slides of text or points will be deducted!!!) Use      transitions, backgrounds, etc. Presentation can be animated.
  • Title      Slide (does not count as a slide of text!)
  • References      slide (does not count as a slide of text!)
  • Presentation      must be relevant to the topic. Cite      past, current, and present directions the technology has taken or will      take.
  • Graphics      and/or music, video should be included.
  • Cite      whenever necessary, using APA citation styles; no paraphrasing or      plagiarism.
  • Online      sites may be used, with the exception of “Wikipedia” and other like sites.
  • Use      good judgment when selecting information from websites (reliability)
  • Books,      magazines, articles, etc should also be used
  • Get Creative!

Topics to choose from:

  

Peer-to-Peer / File   Sharing / BitTorrent

Biometrics

 

Smartcards

Voice over IP   (VoIP) Networks

 

Internet3 / Web 3.0

Cloud Computing

 

Virtualization

WiMax

 

Packet Sniffers,   Network & Protocol Analyzers

Public &   Private Key Infrastructure

 

Ethics of Network   Monitoring in the Workplace

Intrusion Detection   & Intrusion Prevention Systems