Need a project report and presentation

  

Using the internet, search for an enterprise company (i.e Amazon) that you feel follows this enterprise architecture and consider the implications of each function represented. For each function in this diagram, define the purpose and interaction with other function, give examples. Define and discuss credible attack surfaces for each function, if any. Does the function include interactions with third party systems? If so, should they be trusted at the same level as the internal systems. Discuss threat agents and what targets may be of interest.  

Conceptual Sample Enterprise Architecture (attached diagram): Representations of the business functions and their interrelationships.

Project Report:

  

•Report should be no less than 10 pages of content. 

•You need to include outside sources and properly cite and reference your sources. 

•You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. 

•In addition to the 10 pages of content, you will want a title page and a reference sheet. 

•Please ensure to use the proper APA citations.

Report format:

Title Page

Introduction of Company and brief background (Establish date, Location, what makes this company an enterprise, etc.)

Company Architecture (What exactly does this company do…)

Company Functions (define each function that relates to the company)

Function Integration (how/if the functions integrate with other functions)

Discuss Credible Attack Surfaces for the functions 

Discuss interactions with 3rd party systems and trust levels

Discuss Threat agents and targets

Your thoughts/improvements/gaps, etc.

Conclusion

References

attached-presentation format

Ethics – Discussion Post Due 10/18/20 by 5PM Eastern Time

Please answer the below and submit in a word document. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be 130 to 160 words and double-spaced. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words.

1)  Stepping back a little, International Labor and Employment Issues can be a very sticky area.  The question will arise EVERY time.  “Human Treatment vs. Better Profits.”  I am looking forward to seeing how this group will approach this very sensitive necessarily important issue.  When the topic of International Business is raised the issue of employment treatment and over all labor issues must be addressed.  It can be done openly and with an intent of good will or it can be addressed as it has many times in the past as a “letter-of-the-law” issue managed by the “locals” with graft and disdain as the guiding parameters.

2) Some authors have stated that “…compliance with the law is a fundamental component of responsible management” (Baron).  International Businesses must act responsibly in all respects as they do have social and moral responsibilities.  Business management must not only have the appearance of legal compliance, but must actually be in compliance with all laws.  This not only includes the obvious criminal but also a full host of international consequences caused to territorial, environmental, antitrust, securities and other applicable international legal issues. What’s your thought on this?

Baron, D.P. (2013) Business and Its Environment, Seventh Edition. Upper Saddle River, NJ; Prentice Hall.

3) Looking at how companies domestic or multinational (MNC’s) handle the benefits and disadvantages of using employees, independent contractors, foreign sales representatives, and distributors.  Do you think these findings can be considered a model for how  companies should handle these types of issue or is there room for improvement in some areas?

Basic power point

Hello, I am currently working on a power point slide show, but I am having problems , with what is ask of me. If more pics are needed or information, I can provide. 

Thank you very much 

paper5

Research a company or organization and their Cyber Security Plan to address these below issues. 

1 Technologies- What might be the effects of not using encryption on network or Internet traffic? 

2 Create a plan for the implementation of secure (encrypted) e-mail in an organization.

3 Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

  

* Describe the company, their Cyber Security Plan, and the issues in your group paper while including recommendations to improve issues.

*The paper must be at least 10 pages plus the cover and reference pages and be in APA format. Must have 5 academic sources.  Academic sources do not include wikis, message boards, support forums, etc. Do not copy and paste   large blocks of text from your sources!  As with any research project, make sure to take a position, defend with works cited, and conclude.

I need this research paper in 15 hours from now. 

Total I need 10 pages includes above 3 topics excludes cover pages and reference pages.

you will need cover all those 3 topics in the paper.

I need a PPT also with 10 slides excludes reference and cover slide…

*****Deadline 10 hours from now  *******

Information Security Roles and Responsibilities

This is associated with the Twitter hack of 2020 and is a continued assurance plan to mitigate weakness while outlining the key roles of leaders and their responsibilities. See Below and Attached.

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information. 

graded assignment

Using a web browser,search for”incident response template”.Look through the first five results and choose one for further investigation.Take a look at it and determine if you think it would be useful to an organization creating a CSIRT.why or why not?

QUANTITATIVE Journal Article Review

 Subject: Infer Stats in Decision-Making (DSRT-734)

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is Cyber Security.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  Must be original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Paper examine the influences and effects of computer networks on the world around us

In this assignment, you are to examine the influences and effects of computer networks on the world around us. You can pick almost any area: Social effects (how we talk or interact), Business (how we market, advertise, buy, and sell items), Criminal (how people try to break the law) or Legal (new laws which are needed because of computer networks), or another area. Please pick one area so that you can concentrate on it. If you can’t think of a topic – please let me know. 

Pick an article or topic that you can write 5-7 pages on (cover page or references pages DO NOT count). Summarize and describe what the situation before computer networks (you can go back as far as you’d like) and what it is like now (after or during the impact of computer networks). Describe any possible further effects that could still happen (or where you think the area will go or what would be really cool if it happened). THIS IS ABOUT YOUR OPINIONS, NOT JUST A LOT OF REFERENCES ABOUT WHAT OTHERS THINK. 

You are to hand in: the paper (of course) and any references that you use (URLs are preferred). If you cannot submit a URL, then a hard copy must be turned in. 

NOTE: Term paper rules apply. Quoted material must be footnoted. References are required, but there should only be a few – this is to be your own ideas. You will be graded on the level of detail that you get to in describing the background, the impact and future effects of networks on the subject that you pick. If you have any questions about what constitutes plagiarism, please contact me immediately. You don’t have to have any references, but you should have one or more which back up your history or current disposition of the area. Any questions, please ask!