Data Center Security

Write about Data Center Security in 700 Words  double spaced paper, written in APA format, showing sources and a bibliography  and also prepare PPT consisting of 10-12 slides about Data Center Security

Implementation

This week, you will continue building the components of your business requirements document for Hollywood Organic Co-op. In the previous weeks, you have identified the types of data, standards, and policies required for a new EDMS. This week, you determine how to electronically move data around in an EDMS and determine the physical and environmental security requirements.

Write a 2- to 3-page evaluation of the implementation of physical and environmental controls for the new EDMS. Include the following:

How to control access to a document at each stage of its life cycle

How to move documents within the organization as team members contribute to document creation, review, approval, publication, and disposition

Physical and environmental security controls that must be implemented to protect the data and systems for Hollywood Organic Co-op’s five locations, including for the identification, authentication, and restriction of users to authorized functions and data.

Format citations according to APA guidelines.

Errors Failures and Risks

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

 

Required Readings

From A Gift of Fire by Sara Baase and Timothy M. Henry:

Chapter 8 – Errors, Failures, and Risk

different roles that people play in the design, development, and use of information systems.

This week we discuss each of the different roles that people play in the design, development, and use of information systems.  Please also explain the importance of where the information systems function is placed and the various types of users of information systems.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. Fo

 

Financial engineering problem…

Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. For the first option the stock price is 50, the strike price is 51, the volatility is 28% per annum, and the time to maturity is 9 months. For the second option the stock price is 20, the strike price is 19, and the volatility is 25% per annum, and the time to maturity is 1 year. Neither stock pays a dividend. The risk-free rate is 6% per annum, and the correlation between stock price returns is 0.4.

1. Using C/C++ or Java or Matlab to calculate the 10-day 99% Monte Carlo Simulation based VaR for the portfolio. Set the number of simulation to 5000.

2. What else data is required to calculate the 10-day 99% Historical based VaR for the portfolio?

Digital Forensics Tools and Tech – New England

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

reflection paper-Cloud computing

Provide a reflection of at least 300 words that summarizes what you feel are the most important or interesting concepts you have learned so far in this cloud computing course. would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had

(syllabus till now: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a (1 page with in next 3 hours)

APA format.

Dissertation Topics , Due date 26th September

Discuss the below dissertation topics and brief introduction to the literature review as well as develop a PPT 

Dissertation  Topics

1.)  Information Systems

2.)  Database

 

Develop a PPT. on the following:

What is your problem statement: What problems are you solving.

What are your gaps?

What is your theory?

What are your research questions ?

Note:  Minimum 4 pages  or 1300 words not including title and reference page  and  PPT need 5-6 slides . References should be taken from peer revived