EH FP

In 750 words

What is the Internet of Things (IoT) and how can we secure it? What are the Challenges?  

Address the below points
1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

DSBDA W 1 D

 In this week’s reading, the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics. 

Information Technology and Organizational Learning Assignment:

Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

digital transformation leaders in regard to artificial intelligence (AI)

 

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

C language, CS.

 A postfix expression is an expression in which each operator follows its operands. Table 13.4 shows several examples of postfix expressions. The grouping marks under each expression should help you visualize the operands for each operator. The more familiar infix expression corresponding to each postfix expression is also shown. The advantage of the postfix form is that there is no need to group subexpressions in parentheses or to consider operator precedence. The grouping marks in Table 13.4 are only for our convenience and are not required. You may have used pocket calculators that require the entry of expressions in postfix form. Use an adaptation of your stack library from Project 3 to write a program that simulates the operation of a calculator by scanning an integer expression in postfix form and displaying its result. Your program should push each integer operand onto the stack. When an operator is encountered, the top two operands are popped, the operation is performed on its operands, and the result is pushed back onto the stack. The final result should be the only value remaining on the stack when the end of the expression is reached. 

Security Policy Plan

 

This is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

 

Write a 3–5 page paper in which you:

  • Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
  • Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  • Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  • Determine the security testing methodology you would use to facilitate the assessment of technical controls.
Section 2

Complete the following:

  • Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
    • Tasks, subtasks, resources, and predecessors.
    • An outline of the planning, analysis, design, and implementation phases.
    • The use of cybersecurity in the information systems development life cycle.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

Discussion

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

cloud computing

  

Project overview

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.

This project will be completed in a series of steps, in which you will explore cloud technologies and cloud architecture and how they can be used in the organization.

Your presentation with audio narration will educate the executives on cloud computing and its benefits (and drawbacks) to the company. To complete your analysis, you will need to cover the following:

  • description      of cloud computing
  • basic      capabilities of the cloud
  • advantages      and disadvantages of cloud computing
  • analysis      of economic implications
  • IT      business needs
  • SWOT      analysis

There are six steps in this project. In your final narrated PowerPoint presentation, you will be assessed on your ability to convey your understanding of cloud computing and how it can be used to benefit your organization, explaining the advantages and disadvantages of cloud computing and providing a detailed business analysis covering financial considerations, business requirements, and an analysis of threats and opportunities.

Step 1: Describe Cloud Computing

Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.

Step 2: Research Advantages and Disadvantages of Cloud Computing

Now that you have defined important terms and summarized the basic capabilities of the cloud, it is time to explore the advantages and disadvantages of cloud computing.

Currently, BallotOnline is running at full capacity and needs to expand its IT infrastructure to accommodate its growing needs. Instead of expanding current on-premise IT infrastructure by building or acquiring a new data center, Sophia has suggested that the cloud may be more efficient and cost-effective than adding more traditional physical data center space.

This information that you research will be useful in your final presentation in the last step.

When you have completed the research, move to the next step, where you will consider the budgetary aspects of a move to the cloud and the implications for the organization.

Step 3: Analyze Economic Implications

Now that you have weighed the benefits and drawbacks of cloud computing, it’s time to take a close look at the economic implications of a move to the cloud. All organizations (for-profit, nonprofit, or government) have finite budgets. Management must allocate these financial assets appropriately so that the leaders can make sound business decisions and meet the objectives of the organization.

Information technology (IT) is a key strategic function to help support the objectives of an organization. Businesses first used information systems to replace paper-based methods of helping management perform these functions, and that use continues today. Managers must be able to understand different IT models to make the best financial investment decisions for the organization.

The financial requirements for the cloud computing model are different than the financial requirements for an on-premise model. Cloud computing shifts budgets to a pure operating expense model, whereas the traditional on-premise computing model requires both capital and operating expense allocations.

Several free calculators to help estimate the cost of cloud services exist on the web, including the AWS Total Cost of Ownership (TCO) Calculator and Azure TCO Calculator. Alternatively, you may find other calculators to estimate your cloud cost. Most cloud providers have their own cloud cost estimator tools. If the calculator that you selected does not show on-premise data, then you can recalculate using one of the other calculators that do provide this data.

For your economic analysis, enter the information from BallotOnline’s IT Budget and Infrastructure Summary into your chosen calculator to estimate TCO for the current physical IT infrastructure configuration. Then estimate TCO for a comparable configuration in the cloud to estimate the potential cost savings.

Write the summary of the economic implications, showing the savings and how you arrived at them, and upload it to the dropbox below.

Step 4: Define the IT Business Requirements

After considering the economic aspects of the cloud, the next logical step is to narrow the particular requirements of cloud computing for the organization. It is important that your presentation works toward building a business case for cloud computing.

Your presentation must address BallotOnline’s business requirements and critical IT requirements related to data storage. Make sure you classify the requirements into functional (behavior) and nonfunctional, as per the requirements definition link.

Step 5: Prepare a SWOT Analysis

In this step, you will apply the information gathered in the business analysis to assess the benefits and possible drawbacks of adopting cloud infrastructure for BallotOnline.

Take Note

What Is a SWOT Analysis?

Description: SWOT analysis acronym stands for Strength, Weaknesses, Opportunities, and Threats.

Your supervisor, Sophia, recommends that you include a SWOT analysis in your presentation, since the BallotOnline company executives will want you to go over both the advantages and disadvantages of cloud adoption and any important internal and external factors that may influence the success of the project.

Prepare a Presentation on Benefits and Possible Drawbacks of Adopting Cloud Infrastructure

In this step, you will prepare your presentation for the BallotOnline executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.