Signature Assignment: Create a Project Plan Draft

 

Assignment Content

  1. A project plan outlines recommended approaches to the use of the network, database management system, software, and cloud service technologies. Because industry best practices dictate transparency in terms of selection criteria and their importance to a specific project, a project plan draft should also include the criteria by which the recommended approaches were selected, along with the benefits to the project that each is expected to deliver.

    For this assignment, you will draft a project plan for the project proposal you outlined in Week 1 (and that you updated earlier this week based on instructor feedback).

    Download the Project Plan Draft.

    Using the Project Plan Draft template, outline your project plan for the business scenario that was approved by your instructor last week. Add lines to each table as needed. Your project plan will include:

    • Network technology recommendation(s)
    • Database management system recommendation(s)
    • Appropriate software application recommendation(s)
    • Cloud service recommendation(s)

Vulnerability Process and Assessment Memo

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Lesson 5:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Data Preparation

 Data Preparation
Add the following new columns to the right end of the Excel spreadsheet, and populate them with
computed data by applying appropriate formulas, based on the following information.

 

Final Research Paper

 

Topic:

Cyber security in New Space: Analysis of threats, key enabling technologies and challenges.

INSTRUCTIONS: Please follow the Research paper instructions and guidelines attachments below, Without the right format report will not be considered(15 Pages)

Cyber security Assignment (150 to 250 words, not more than that) – should deliver in next 2 hrs

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates. 

Select one of these compromises and explain how it could be avoided.

“The answer should be around 150 to 250 words, not more than that.” – should deliver in next 2 hrs

Mobile Apps, Platforms based questions

Required: APA format paper, Atleast 4 to 5 Latest References, (Excluding Title and References)500 words +.

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • 1. Besides cost, why should mobile app developers target the Android platform?
  • 2. Why is Android competition to itself?
  • 3. Describe key ingredients needed to create mobile applications on the iOS platform. 

Assignment

 Writing Assignment: 

  • Find an article of interest to you. It can be a magazine or newspaper article. Try to utilize the library website to find an article. 
  • Actively read and annotate the article; submit a file of your annotations (.jpeg, PDF, etc.) 
  • write a 1 page summary and review of the article – consider these guidelines:

Summaries should be no less than 200 words; do not plagiarize; use minimal quotes; paraphrase more often Critique the article: Is it reputable? How would it be useful to you if you were researching that topic?
Include an APA reference (bibliography entry) These should be thoroughly proofread to look for grammatical mistakes.  Submit the written assignment and annotated article.  

Activity 2- Executing the Project

One of the tools and techniques used in executing is the acquistion of “Virtual Teams”. We will utilize this tool in the simulation next week.  But as a pre-cursor to next week’s simulation activity, write a 1-page document explaining the importance, value, and positive impact the acquisition of “Virtual Teams” can have on a project team’s resource pool.

  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources  from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.
  • Approach the assignment from the perspective of a project management of a company.

Text

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Creating an Effective Disaster Recovery Plan

 

Discuss how a proper disaster recovery plan should be created. For this discussion, point out all the key elements of a disaster recovery plan and how these elements should be implemented.

Respond to two peers.   Compare and contrast their disaster recovery plans with yours.  Expound on key differences and similiarities. 

discussion-2

Many believe that complete security is infeasible. Therefore, we are left with incomplete security. Generally, the greater the security, the greater the cost. Discuss how one should weigh the benefits and associated costs of security