Discussion 1

IT innovation has been a key component of organizational operations and strategy. For years, many business leaders did not see IT as vital to business, which resulted in missed opportunities to grow, and in some cases, sustain the business. Evaluate the role of IT solutions in an organization with which you are familiar. Explain how the business is using IT as a solution for the organization’s operations and strategy. Distinguish among hardware components, operating systems, programming languages, programs, and applications being used by the organization. Identify the solutions already in place and any areas where the business is not using IT. Describe the perceived impact the lack of IT has on the business both internally and externally.  Provide examples from any of the required resources to support your answers.

Your post must be a minimum of 250 words.

MS 2

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Answer should follow below instructions

——————————————————–

You will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the project. The entire task should be a minimum of 6 pages with 10 peer reviewed scholarly articles and formatted to APA 7 style.

Note:

Below are some examples for formatting your bibliography.

· https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

· https://guides.library.cornell.edu/annotatedbibliography

· https://sites.umgc.edu/library/libhow/bibliography_tutorial.cfm

· https://columbiacollege-ca.libguides.com/mla/annot_bib 

Here are some resources to complete a literature review:

· https://uscupstate.libguides.com/c.php?g=627058&p=4389968

· https://www.youtube.com/watch?v=-ny_EUJXHHs 

· https://umb.libguides.com/litreview

· https://writingcenter.unc.edu/tips-and-tools/literature-reviews/

· https://writingcenter.ashford.edu/writing-literature-review

Paper

 

1. The Physical Model was based on the idea that people did not really understand the work involved in the digital forensics world or how to treat it in court. With all the crime dramas on television, the average juror may now think that everything can be resolved in 60 minutes and is based on perfect DNA physical evidence and the digital “smoking gun” always found on the criminal’s computer.  

How would you tailor your approach and reporting to address the fact that the jury may now think that without 100% conclusive evidence, the person should not be found guilty?  Please avoid discussions about the presumption of innocence or a position that circumstantial evidence is never sufficient to find someone guilty.  This discussion is for you to consider how you would convince someone that your circumstantial evidence is sufficient and how to counter the idea that perfect evidence is always available.

Your word count should be between 250-300 Words

2.  Here is a case regarding computer forgery and how digital forensics was able to prove the underlying file was indeed forged.  https://nakedsecurity.sophos.com/2019/01/17/telltale-font-scuppers-bankruptcy-trust-claim/  

Basically, the document claimed to be created (and a printed copy signed and dated as proof, at a time before the fonts used in the document were available.

For this discussion, write 200-250 words on your opinion of this case.  Can you think of other digital artifacts that could be used to prove that a computer file is not what it claims to be?

Denial of Service Attack 2.0

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    3000 words 

emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

discussion

 

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

Reply post

For this week’s discussion, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide the class with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. Remember to also reply to at least two of your classmate’s posts on this questions and include all in one single thread.

computer science

 

c++ program

Part A

use any web site and provide number of Dentists using the following format:

area codes included:

909

714

949

310

818

for each area code get 4 doctors to include the following data:

License number up to 5 digits

Name (last, first )

Specialities (General, surgeon)

Distance

write a menu to allow the user to search for

    Enter 1 to search by area code

     Enter 2 search by distance

   Enter 3 search by speciality

Store data in a text file called “indata.txt”

store the result in a text file “outfile.txt”

Read data from text file

Write a function to search by area code, when the user enter the area code, such as 909, all Dentists with area code 909 will come up ( all data).

Write another function to search by distance ( in this function display all the data and smallest distance with data belong to smallest distance)

Write a search function to look for dentist with specialty ( if the user searches for surgeon), all dentists  with surgeon specialty and its all data including, license number ,names, distance show up

Last function search by license number.

Write a function to display the result(s)

Use Binary search  as a backbone search Function

R studio ggplot question

Please follow the screenshots to finish the steps that are reqiured to clean the data and then create the ggplots. Then put the code in the HW5_Template.