Practical Connection

I need a Practical connection document that shows a connection to my coursework here and my job role . The subjects are Cloud Computing, Operational Excellence, Business Intelligence, Physical Security, and Networking.

Analyzing and Visualizing Data

https://owl.purdue.edu/owl/general_writing/visual_rhetoric/data_visualization/index.html

and

https://owl.purdue.edu/owl/general_writing/visual_rhetoric/data_visualization/activity.html

Review the 2 links above.

Respond with an example of your choice that illustrates the 3Es of visualization (effective, ethical, and efficient) as outlined in the materials. Include the graphic in your response.

Explain the reasons for your choice. Also discuss other options you discarded. Your original analysis must be substantive and represent at least 50% of your response.

Note:  Please perform your own research and refrain from copying visualizations from sites where the author has already chosen a visualization and discussed it from this perspective. 

Discussion 4- Strategy Applied in Project Mngt

Assigned Readings:

Chapter. 7 Managing Risk

Chapter. 8 Scheduling Resources and Costs

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. You have been assigned to a project risk team of five members. Because this is the first time your organization has formally set up a risk team for a project, it is hoped that your team will develop a process that can be used on all future projects. Your first team meeting is next Monday morning. Each team member has been asked to prepare for the meeting by developing, in as much detail as possible, an outline that describes how you believe the team should proceed in handling project risks. Each team member will hand out their proposed outline at the beginning of the meeting. Your outline should include but not be limited to the following information:
    • Team objectives.
    • Process for handling risk events.
    • Team activities.
    • Team outputs.

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

Communicating Technology Concepts to Business Professionals

 Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; the attendees use IT to perform their jobs on a daily basis.

For this 10 minute presentation, you should focus upon meeting the information needs of the attendees from the internal (business) organizations which are supported by the IT department. You should also anticipate questions which your audience might ask during the 10 minute Question & Answer period which follows your presentation. (When you write your peer critiques for this week — ask and then answer at least one question that you believe the audience is likely to ask.)

Choose one of the following articles to present to the attendees.

1. Selecting the Right Cloud Operating Model: Privacy and Data Security in the Cloud

2. Understanding Managed Services (focus on the benefits of Managed IT Services)

3. Shadow IT: Mitigating Security Risks

After reading the article, prepare a set of slides (talking points) with speaker notes in which you highlight key information about the article and why Padgett-Beale employees should “care” about the topic. Make the presentation relevant for Padgett-Beale by integrating information about its business operations (use the company profile, the weekly descriptions, and other readings in this course). At least one of your slides should address cybersecurity issues and concerns that arise in the context of your chosen article (use the CSCU textbook’s material and other course readings to help you identify these issues and concerns). 

You should have a title slide, a slide containing the article title & publication information, content slides, and a summary slide — 8 to 12 slides total. At the end of the presentation, include a Q&A slide followed by “backup” slide which has additional resources that the audience can consult for more information.

Each slide must have speaker notes (at least one paragraph). Watch out for jargon! Write in business appropriate language and/or plain English but do not speak down to your audience.

Assignment

 

Week Eleven Assignment

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper:Cyber security and the internet of things

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. DOI:  https://doi.org/10.13052/jcsm2245-1439.414

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf

Chapters 5, 9, and 10 in the course textbook 

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Physical Security and Threats

Word count: 300+ words

Chapters 5, 9, and 10 in the course textbook 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

  

Research Paper:Cyber security and the internet of things

Number of pages: 3+

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3+ pages, using your own words, by addressing the following:

· What did the authors investigate, and in general how did they do so?

· Identify the hypothesis or question being tested

· Summarize the overall article.

· Identify the conclusions of the authors

· Indicate whether or not you think the data support their conclusions/hypothesis

· Consider alternative explanations for the results

· Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)

· The relevance or importance of the study

· The appropriateness of the experimental design

When you write your evaluation, be brief and concise. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process. 

Your paper should meet the following requirements:

· 3+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

  

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents. 

1min css questions

 

Assume you have created an array of pets: 

var mypets = new Array();

mypets[0] = “dog”;

mypets[1] = “cat”;

mypets[2] = “goldfish”;

Write a JavaScript code to answer the following questions:

  1. a)Add a for loop to print out the array 
  2. b)Write a fragment of code to insert a new pet named ‘turtle’to the end of mypets array .
  3. c)Write a fragment of code to removes the pet named ‘turtle’ from mypets array 

SE942 week 1 dis

Week 1

Write about a project that you accomplished. Explain what needed to be done, how it got done, who worked on the project, how long did it take, how much it cost, and what were the risks involved in the project.  

Comments to 2 classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality learning environment through which you improve your knowledge and understanding of the subject matter.