Exp19_PowerPoint_Ch01_ML1_Time_Management
Project 6: Global Approaches to Cybersecurity Step 8: Create Regional Fact Sheet on Identification and Implication of Cybersecurity Threats
Project 6: Global Approaches to Cybersecurity
Step 8: Create Regional Fact Sheet on Identification and Implication of Cybersecurity Threats
To illustrate the impact of cybersecurity threats, develop a one-page fact sheet using one of the regions from your matrix. Explain the cybersecurity threat experienced in one region, the evolution of the associated malware, the implications (e.g., economic, political, national security, etc.) of it to that region and how global cybersecurity policies might be used to counter the effects.
You will discuss six specific characteristics (purpose, size, attack method, attribution, etc.) of the malware and describe how these characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss what contributing factors may cause these characteristics to change, and how these characteristics may change over the next 10 years. How might these technologies be countered by global cybersecurity policy controls (do not describe technology controls) in the future? Support your position with policy, security practice, theories, principles, and recommendations based on your own thoughts, examples, and cited references.
week 3
Download The Attachment and Message Me Please for Detailed Instructions
Business intelligence- 28hr
Chapter 3 –discussion question #1-4 & exercise 12
Chapter 4 – discussion question #1-5 & Case pg. 243 The Target story answer the two case questions on page 244 integrating concepts and examples from that case.
The above assignments should be submitted in one-word document.
Include an APA cover page and a reference page.
WEEK 10
- Technical Paper: Proof of Concept (POC)
Your company is a 4-year-old startup called XYZ Software Enterprises. XYZ produces a point of sale system and was awarded a Proof of Concept (POC) to one of the largest and oldest restaurants in the industry (you know, the ones in the commercials all the time). The restaurant wants XYZ to prove that the software will do what the sales people said it could do.
Your Proof of Concept will include four parts:- Part 1: Gantt Chart.
- Part 2: Testing and User Acceptance Report.
- Part 3: Use Case Diagram.
- Part 4: Activity Diagram.
- Part 1: Gantt Chart
A Gantt Chart (see page 353, Figure 11-18 in your textbook) needs to be created for the entire process of the Proof of Concept. There is a two-month deadline from today to complete the POC.
Using Visio or Excel, create a Gantt Chart that includes all of the items listed below and adds five more tasks minimum from the concepts learned from the course: - The initial meeting—today.
- Should appear as the first line.
- Teams selected to participate in the project (1 week).
- Information gathering (add the information gathering methods you will use and how long each will take).
- System configurations based on information gathering methods (2 weeks).
- Create Activity Chart based on information gathering (information to create chart supplied).
- Create Use Case Diagram based on information gathering (information to create chart supplied).
- Show the finished configurations to the team and get feedback (1 day).
- Make changes based on feedback (3 days).
- Install the system in the test store (2 days).
- Train staff (1 day).
- Run a live test of POC (2 weeks).
- Note: The five or more additional tasks can be sub-tasks for information gathering methods as well some other sub-task or major task not in the initial list.
You may add items from the SDLC, specific item or items on testing, or any other concept you think should be part of the POC process learned in the course of this semester.
Note: Remember that events in a Gantt chart can happen at the same time as other events. Some items also cannot start until others are completed. Everything has an estimated time frame and it is displayed in the chart.
Part 2: Testing and User Acceptance Report
As part of the expected documentation in the POC, XYZ wants a report on Testing and User Acceptance.
Your manager is asking you to research the testing criteria they listed in the POC documents.
The POC document states that they are looking for the following: - System and Stress Testing.
- User Acceptance Testing (UAT).
- For both categories, research and report on the following:
- What these tests are.
- Why the industry leader would want these particular tests.
- The best ways, in detail, to accomplish the tests so that your company meets the criteria they are looking for.
- These items can be added to your Gantt Chart (Part 1).
Part 3: Use Case Diagram
The restaurant, as part of the information gathering, outlined a use case in a chart, which is below.
Your manager assigned you to create the Use Case Diagram using Visio, MS Word, or any other software. (See the diagrams on Page 84 and 85 of the textbook.)
- Paste the diagram into the created report.
- USE CASEACTOROrder FoodWaiter, Patron, ChefServe FoodWaiterCook FoodChefPay for foodWaiter, PatronEat FoodPatronPart 4: Activity Diagram
As a part of the information gathering process, a chart of items was provided by XYZ.
Your manager has asked that you use Visio, MS Word, or any other software with which you are familiar to create the Activity Diagram (see pages 138 Figure 5-5 and 139 Figure 5-6 in the textbook.) - Paste the diagram into the created report.
- POS SALES PROCESS Activity DiagramHost or Hostess seats patronServer takes drink orderServer opens order for table in POS systemServer places drink order in the POS systemSystem sends drink order to the BarBar makes drinksServer brings drinks to tableServer takes food orderServer adds food order in the POS systemOrder goes to kitchenChef and staff cook the orderFood Runner brings food to tableServer takes dessert orderServer adds dessert order to POSChef and Staff create dessertsFood Runner brings desserts to tableServer creates check in POSServer collects payment and enters it in POSServer adds tipped amount to POSServer closes table in POSAdditionally, you must do the following:
- Use at least 3 quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.
- This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
The specific course learning outcome associated with this assignment is: - Develop a proof of concept of a software system for a potential customer.
Cloud Compute
the following four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 7 (Jamsa, 2013).
Chapter 7 topics:
- Define collaboration. 50 words
- Define and describe cloud-based collaboration. 50 words
- The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why. 50 words
- List the questions one should consider when evaluating a cloud-based collaborative solution. 50 words
Note: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.
Technology
Create an analytical annotated bibliography of resources you will use for your project. These must include at least six scholarly resources.
Each annotation should:
- be at least 150 words
- offer a brief summary of the resource in your own words
- specifically explain briefly how the resource will be useful to your project.
part 2 planning effective IT Audit
This is a two (2) part assignment – you can submit them together or separately, but you must submit both parts for full credit.
After completing the Audit Plan Worksheet with the risks that you have discovered, answer the three points for the Critique of the worksheet. What are the risks that you determined and placed in the worksheet, what are they going to affect?
What are the control in place (research the Gail Industries Case Study) explain the audit strategy to verify the controls in place are working and are adequate for the job.
Review the controls and note any risks that you can see that are not covered by the control objectives.
Discussion
Discuss 500 words or more discuss why Security as a Service is a good investment.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Java Kiosk Change Calculator
Java Kiosk Change Calculator
A retail store is building a kiosk to enter sales and handle transactions. When
people use cash to pay for an item, the kiosk needs to tell the cashier how much
change should be given back to the customer.
You are developing a simple calculator
that will compute the right amount and most efficient denominations of change for a specific purchase.