power point

This is the last Capstone and I want you to sell yourself. Take your Resume you created to make a presentation on why you are the best candidate for the JOB  we FAKE applied for in week two. 

Here is an example of the assignment:  How to Do A PowerPoint.pptx download

Requirements:

10 slides

1 Picture of Yourself

4 Animations

4 Transition effects

1 image from online each slide

1 creative design

* Suggestion: Do this assignment in the PowerPoint Office 365 app as it is up to date and has the best side- suggestions to make your presentation beautiful* 

As always call or text if you need me.

Requirements

  

Requirements for Phase 1

Your Project Plan must consist of two sections: Problem Analysis, and Preliminary Design. All sections and subsections must be clearly identified with appropriate headers.

Problem Analysis: Include the following subsections:

What are the required outputs?

What are the necessary inputs?

How will you obtain the required outputs from the given inputs?

A preliminary list of variables your program will use, specifying the name, usage, and data type of each variable. Present this information in the form of a table. This preliminary list must include all variables associated with inputs or outputs and any temporary variables that you can identify at this point. (Note: In your final design, you will probably identify additional variables.)

Describe the necessary formulas.

Provide a sample calculation.

Preliminary Design: Provide a preliminary design for the program. Include the following sub sections.

Identify and describe the fundamental tasks needed to solve the problem so you can use a modular design.

Provide a hierarchy chart shown the structure of the program.

An explanation of where and how you plan to use each of (1) conditional statements (2) repetition (loops), (3) arrays, and (4) functions. You must plan for at least one of each.

 

Note: For meeting the functions requirement, using one or more of the library functions described in the Pseudocode Demo is permitted and in fact recommended. You need not write code for a user-defined function.

PROBLEM ANALYSIS needs to include: In depth Problem Analysis. 

How scorecards and organizational structure influence performance level ?

Explain how to balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization? 

 one -page in length 

 

Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

 one -page in length

Managing an IT Infrastructure Audit

Week 10 Assignment – Managing an IT Infrastructure Audit

Overview

This assignment consists of four distinct elements: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four sections as separate files. Name each file as indicated in the instructions below.Make any assumptions needed for the completion of this assignment, and base your work on the following scenario:

You are an information security manager for a large national retailer and are directly responsible for the planning and oversight of IT audits. At the request of the board of directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit and, consequently the overall success of the systems implemented in the organization.

You must develop a policy for conducting IT audits and develop a project plan for conducting two-week IT audits.In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the United States.
  • They use a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1,000 desktops and approximately 500 organization-owned laptops at the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to search upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.
  • They process an average of 67.2 credit card transactions per hour, every day, at each location, and via their corporate website.

Instructions

Section 1: Internal IT Audit Policy.

Write a 3–4 page paper in which you:

  1. Develop an internal IT audit policy, which includes at a minimum: 
    • Overview.
    • Scope.
    • Goals and objectives.
    • Compliance with applicable laws and regulations.
    • Management oversight and responsibility.
    • Areas covered in the IT audits.
    • Frequency of the audits.
  2. Use at least two quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.
Section 2: Management Plan.

Write a 4–6 page paper in which you:

  1. Explain the management plan for conducting IT audits, including: 
    • Risk management.
    • System software and applications.
    • Wireless networking.
    • Cloud computing.
    • Virtualization.
    • Cybersecurity and privacy.
    • BCP and DRP.
    • Network security.
  2. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.
Section 3: Project Plan.

Use Microsoft Project or an open source alternative such as Open Project to:

  1. Develop a project plan that includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for a two-week audit. 
    • Risk management.
    • System software and applications.
    • Wireless networking.
    • Cloud computing.
    • Virtualization.
    • Cybersecurity and privacy.
    • Network security.
Section 4: Disaster Recovery Plan.

Write a 5–7 page paper in which you:

  1. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization. 
    • The organization must have no data loss.
    • The organization must have immediate access to organizational data in the event of a disaster.
    • The organization must have critical systems operational within 48 hours.
  2. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.
  3. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Develop an internal IT audit policy, a management and project plan for conducting IT audits, and a disaster recovery plan (DRP).

Problem 8- Legal

Question I – Bobby Bigmouth is sued for slander by his boss.  Bobby argues that he cannot be sued for slander because he did not publish any statement.  He argues that his alleged slanderous comment was not published because he just made the comment to a co-worker about his boss rather than making that statement to a reporter to be published.  Is Bobby’s argument correct?

Question II – During an episode of Sports Center, one of the anchors misread the teleprompter and said LeBron James was closing his school for at risk youth.  In reality, LeBron James was expanding his school.  This statement by the anchor was a slip of the tongue and corrected in the next episode.  Would LeBron’s defamation suit against Sports Center and the anchor be successful?  Why or why not?

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

scheduler of a computer system

     

This Assignment is an implementation of a small simulation program. It is a simulation of a process scheduler of a computer system. This simulated scheduler is a very small, simplified version, which reflects some of the basic operations of a typical process scheduler. 

To successfully finish the program, you are expected to:
know how to define and use a user-defined comparator

knowhow to use Java’s PriorityQueue.
know how to write a small simulation program. 

Cybersecurity Strategy, Law, and Policy Team Assignment

 

Group Project #2 MUST have 20 external scholarly citations within the submission.

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member’s assignment grade.

As a group, use the Cybersecurity Strategy, Law, and Policy Team Assignment Resources to write your paper, which should cover the following topics:

 Part 5: Cybersecurity Technologies

  • The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.
    • What would be your recommendation for how the NSS should incorporate this technology to the public?
    • Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman’s terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.

Part 6: Ethics in Cybersecurity

  • Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional. 
    • What are the ethically significant harms that may result from mass surveillance (including by government and corporations)? 
    • What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning.