IMPACT OF IT -8(b)

 

Find a recent article that relates to a software that has malfunctioned and caused either serious injury, death, or loss of revenue. Summarize the article and discuss whether you believe this will impact the adoption of this type of technology.

Post your reply by Wednesday at midnight. Your response should be at least 250 words and appropriately cite your resources.

Reading summary

Summarize the video lectures:

1. https://youtu.be/wySXLRTxAGQ?list=PLtBw6njQRU-rwp5__7C0oIVt26ZgjG9NI

2. https://www.youtube.com/watch?v=nZfaHIxDD5w&list=PLtBw6njQRU-rwp5__7C0oIVt26ZgjG9NI&index=27

Research a company or organization and their Cyber Security Plan to address 3-5 specific issues from the following list.

Research a company or organization and their Cyber Security Plan to address 3-5 specific issues from the following list. 

  1. Technologies- What might be the effects of not using encryption on network or Internet traffic? 
  2. Create a plan for the implementation of secure (encrypted) e-mail in an organization.
  3. Evaluate biometric controls: You want to install a biometric access control outside of a restricted room in your facility. You are considering a retina pattern system and a voice recognition system.
  4. Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.
  5. Identify countermeasures to minimize company information exposure on social networking sites. What are the steps or countermeasures you would recommend minimizing the level of information exposure? Passwords and Social Networking: Compare and contrast password strength versus a password manager.
  6. Evaluate port scanning countermeasures- You are evaluating port scanning countermeasures to help prevent an attacker from acquiring information about your network. The options you are considering are the deny-all approach, firewall testing, and security awareness.
  7. Analyze a set of security risks and determine the appropriate physical, technical, and administrative controls to protect against those risks.
  8. develop a plan for a business that needs to upgrade its video surveillance system. Research the various types of cameras, viewing, and recording equipment available, and develop a detailed plan for camera placement, image retention, and monitoring.
  9. Develop a disaster recovery plan.
  10. Develop cyber security awareness program  

Describe the company, their Cyber Security Plan, and the issues in your group paper while including recommendations to improve issues.The paper must be at least 12 pages plus the cover and reference pages and be in APA format. Each group must have 5 academic sources.  Academic sources do not include wikis, message boards, support forums, etc. Do not copy and paste large blocks of text from your sources!  As with any research project, make sure to take a position, defend with works cited, and conclude.

What industries can AI drastically improve?

There have been a lot of studies on how to predict the manner in which people will react or respond in certain scenarios. This week’s article (attached) discusses how AI improves industries that may not seem to be ideal candidates. Can you identify other industries or use cases where AI would be beneficial and could save money and/or increase efficiency? 

Network security

  1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently?
  2. What policies govern your behavior currently, in school, work, or in other    organizations? Are those policies enforced/followed? Why or why not?

System/Software Development Life Cycle (SDLC) model and methodology Review System/Software Development Life Cycle (SDLC) model and methodology then show how this model can be use in web design. Be sure to define the SDLC model and methodology and identif

 System/Software Development Life Cycle (SDLC) model and methodology

Review System/Software Development Life Cycle (SDLC) model and methodology then show how this model can be use in web design. Be sure to define the SDLC model and methodology and identify which SDLC step is associated with each project component.

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool.

Website Creation in .html

You have been asked by the CIO of your organization (Innovative Knowledge, Inc.) to create a new website. The document you create should contain sufficient documenta-tion and template webpages as outlined below. Your templates and supporting docu-mentation are to be delivered to the CTO so that she may direct her staff to build the dynamic website for your organization. Your documentation must include sufficient details so that the VP of networking may begin building the appropriate servers.

Innovative Knowledge is a new organization designed to offer instructional services and documentation to educational institutions for a fee. You realize that doing a good job will bring about a promotion to the VP level of the organization. You realize you will need to perform independent detailed research in order to provide the quality documents neces-sary to impress both the CIO and CTO.

The Final Report is a combination of 4 module assignments and a final report that combines your project to be presented to the CIO and CTO. 

o Assignment 1(Due Date: End of Week 1, March 20): Landing Page – This cen-tral webpage provides the viewer with a two-paragraph summary of the services you offer and linkages to all subsequent web pages. Please provide a screen shot of your landing page and explain in detail what you have done. (100 points)

o Assignment 2(Due Date: End of Week 1, March 27): Service Pages – This page discusses the different services Innovative Knowledge provides (100 points). A link to each of the following pages is required:

• Instructional services for grades 1 through 4.

▪ Instructional services for grades 5 through 8.

▪ Instructional services for grades 9 through 12.

▪ Instructional services for colleges freshman.

▪ Instructional services for colleges sophomore.

▪ Instructional services for colleges junior.

▪ Instructional services for colleges senior.

o Assignment 3(Due Date: End of Week 1, April 3): Materials Pages – This page discusses the different materials Innovative Knowledge provides (100 points). A link to each of the following pages is required:

▪ Instructional materials for grades 1 through 4

▪ Instructional materials for grades 5 through 8

▪ Instructional materials for grades 9 through 12

▪ Instructional materials for college freshman

▪ Instructional materials for college sophomore

▪ Instructional materials for college junior

▪ Instructional materials for college senior

o Assignment 4(Due Date: End of Week 1, April 10): Network proposal providing a detailed network map and supporting documentation that will provide web pages and database access (servers) (100 points).

o Final Research Report(Due Date: End of Week 1, April 24): Should include best practices for building websites. Provide information on which best practices you used during the process. Indicate which ones you should have applied but didn’t. (300 points)

The final research report must be have an introduction, cover page, contents and references supporting evidence (citations from peer-reviewed sources).

This is not an individual assignment. Each student should create their own design. Similar designs will not get any points and will be returned to the students with a zero grade.

3D Printing Stage 1 Assignment

The Case Study presents Mark’s 3D printing business and explains how he wants to expand his operation with more IT infrastructure and additional employees. He has asked you to help him better understand what he currently has and what he will need to create the business he envisions. You realize that although he already has several hardware and network components in use, he really does not have any idea how to expand into a larger operation. You decide to begin with what he has, what his requirements are, and what components he will need to meet his requirements.