Develop a Computer/Internet Security Policy

 Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Your paper should meet the following requirements:

Be approximately four pages in length and four references.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

final project

 this is one page for the ticketing system project – due in a couple days

1. Apply industry standards to the implementation and support of network systems and computer devices.

2. Demonstrate the principles of information technology security.

3. Use information systems for the collection, organization, and delivery of data.

4. Express relevant information to technical and nontechnical audiences.

5. Design secure network infrastructures for physical and virtual environments.

6. Create information technology solutions based on business needs or requirements.

Please answer the following questions with supporting examples and full explanations.

  1. For each of the learning objectives, provide an analysis of how the course supported each objective.
  2. Explain how the material learned in this course, based upon the objectives, will be applicable to professional application.

Risk Assessment Paper

15 pages 

All of the main instructions are attached to the additional materials section. Just to make sure there is a Table of Content Executive Summary and Reference section along with citations in APA format. 

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

kindly bid carefully, i will not revise my budget once assigned

task I

 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Task 2′

Submit a Word document that addresses each of the following:

  • Chapter 10
    • Define and describe business continuity.
    • Define and describe disaster recovery.
    • Discuss pros and cons of cloud-based backup operations.
    • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
    • Create a DRP for a company with which you are familiar.
  • Chapter 11
    • Define software architecture.
    • Define and describe SOA.
    • Compare and contrast a web page and a web service.
    • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
    • Discuss what it means for a web service to be interoperable.
  • Chapter 12
    • Discuss key items that should be included in an SLA.
    • Define predictive analytics and discuss how an IT manager might use such analytics.
    • Discuss how an IT manager might use load testing on a site.
    • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
    • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.
  • Chapter 13
    • List and describe common system requirements one should consider before moving an application to the cloud.
    • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
    • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
    • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
    • List and describe budget considerations one should evaluate before moving an application to the cloud.
    • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
    • Define and describe cloud bursting.

Research paper – Organisation leader and decision making

 This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

Cloud_computing_week5

 Discussion TopicDefine and describe a SAN vs. NAS. Name one applicable purpose of each and why

 Paper:

Write a paper on cloud-based data storage. The following are the items to discuss in the paper:

  • Describe how cloud-based data storage works.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines

Paper on Sql Injection

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

RSA Applications

 

You have taken courses in the key encryption created by Rivest, Shamir, and Adelman (RSA) and have identified that many of the associated applications that they offer could benefit the corporation in cryptography.  You have been asked to present your recommendation for an RSA application to the Board of Directors to consider purchasing at least two of their associated applications, and you know that you must present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 15 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation