Week 4 discussion

 

Create one discussion thread and answer the following questions:

(Chapter 5): How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.

(Chapter 6): How is the management of network security similar and different between on-perm and cloud environments? Give some examples.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

OE W 7 A

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage?

(Information Technology and Organizational Learning)

The above submission should be one -page in length and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

Organ Leader and Decision Making

 

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always cultural issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Ghostware

It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies. By understanding the process, a security professional can better ensure that only software built to acceptable standards is installed and maintained on systems under their purview.

Using an Internet search engine, identify three sources of unintended software that could be installed on a user’s machine.

In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal. Then, share your personal experience related to what happens when software has negative, unintended side effects from unanticipated installation. Who is to blame, the software developer or user? It might be perfectly okay legally when there is no malice aforethought, but how would you explain this when humans are considered as God’s image bearer? How would you relate it to human value and dignity?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Discussion 12

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 12-13  

(Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

cryptocurrencies

Prepare a 3 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-page essay, you must include an APA-style title page and reference page.

Web Development Web Accessibility one page paragraph

 You should be REPORTING EVIDENCE and EXAMPLES from what you read. 

Find, Read, and Share – THREE related sources of information

Report – Three things about the topic that you want to remember forever

  1. Identify the topic for this week. The title of this discussion board thread lists topics as well as you should reflect on what was covered during class.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Cloud Computing

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.