Organizational Risk Assessment

 

In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:

  1. Describe when some controls cannot be implemented (such as on a personal laptop).
  2. Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
  3. Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
  4. Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Risk Assessment Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

Technical Writing

My major is computer science. And this assignment needs to be completed within 12 hours. Please read the description carefully as it carries a big part of my assignment.

 

This assignment allows you to practice translating engineering concepts for different audiences and requires you to think about how we use language to convey ideas. Choose a topic that you are familiar with from your major and practice adapting your writing for three audiences:

  1. Nonexperts: these readers should include anyone who is not an expert in your own field: high-school students, college students, the general public, even people with advanced non-technical degrees. (Do not write for audiences younger than high-school students.)
  2. Experts / peers: as the phrase indicates, this audience should include people with a very similar technical background as yours, which means you can assume they have some familiarity with your subject, but you should still obviously ensure you’re not omitting important details.
  3. Executives / administrators: this audience should include people high up within an organization who are likely more interested in “big picture” ideas: e.g., developing the concepts you discuss into marketable/sellable products or devoting research funding to a new lab or degree program. These readers could also include, e.g., people who actually do have an engineering or scientific background but who have not practiced actual hands-on engineering in many years (because they have moved into administration).

Each of the three descriptions should be about 1 page, double-spaced. So the length of the entire paper will be ~3 pages double-spaced.

The assignment comes from a series in Wired magazine Links to an external site.in which an expert explains a high-level concept to five audiences: a child, a teenager, an undergraduate student majoring in the same subject, a graduate student, and a colleague. We will watch at least one of the Wired videos as part of this module, and you should note well the strategies the expert uses to translate the topic to his audience.

Cloud computing

 Using a Word Document, write a Report of no more than 2 pages that summarizes the main concepts discussed in the paper. 

ITCO425U3IP

 

Assignment Details

Assignment Description

The next important step in the process of systems integration is to evaluate your options. It is always recommended that you compare at least three potential options to make the best decision. Based on what you determined as the best evaluation method during this week’s Discussion Board, you will apply this evaluation method to the three potential system integration options that you are considering.

Assignment Guidelines

For this week’s assignment, you will be providing detail on 3 potential options for pursuing the system integration project, the evaluation method you will use to compare each, and the overall quality assurance considerations that must be met.

  • New Content (Week 3) 
    • Enterprise System Integration Analysis
      • Refine and describe in detail the list of quality assurance considerations that you determined in the Discussion Board to be ranked highest.
      • Thoroughly describe 3 potential options that you are considering for moving forward with the Systems Integration Project.
    • Systems Integration Approach Evaluation and Selection
      • Select and describe in detail the evaluation method that you plan to use to compare the 3 options.
      • Design a table or matrix to perform your evaluation comparison. The evaluation criteria should include quality objectives and organizational capabilities and considerations and should use some type of weighted priority scheme for ranking.
      • Fill in the table and use ranking criteria to determine which is the best option for you to proceed with for the system integration project.
      • Summarize by discussing which is the best option based on the results from the previous step.
  • Make sure that the document is in APA format.

PowerPoint_3G_Remodels

 

PowerPoint_3G_Remodels

 

PowerPoint_3G_Remodels

#PowerPoint 3G Remodels

Project Description:

In the following project, you will format a presentation that describes backyard remodels.

Open   the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.

Change the Colors for the   presentation to Paper.

On Slide 1, format the   background with the Stationery texture, and then change the Transparency to   30%.

Select Slides 2 through 4, and   then apply a Solid fill to the  background of the selected slides-in the fifth   column, the third  color.

On Slide 2, hide the background   graphics.

On Slide 2, insert a Table with   2 columns and 4 rows. Apply table  style Medium Style 3-Accent 1, and then   type the information below in  the inserted table.
 

  Row 1, Col 1: Improvement Type; Col 2: Components
   Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
   Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
   Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines

Change the Font Size of all of   the table text to 28. Resize the  table height to 5.8″, and then   distribute the table rows. Align   the  table text so that it is centered horizontally and vertically within the    cells.

In the table, change the Font   Size of the first row of text to 32.  Apply a Round style Cell Bevel to the   first row. Note, depending on  your version of PowerPoint, this may be called   Circle.

On Slide 3, animate the picture   using the Wipe entrance animation  starting After Previous. Change the   Duration to 01.00. Apply the Split  entrance animation to the bulleted list   placeholder, and then change  the Effect Options to Vertical Out.

On Slide 4, insert a Clustered   Column chart. In the worksheet, beginning in cell B1, type the following   data.
 

  In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
   In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
   In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
   In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
   In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850

Apply Chart Style 8 to the   chart, and then remove the Chart Title  element. Apply the Wipe entrance   animation to the chart and change the  Effect Options to By Series.

On Slide 5, format the   background using solid fill color Dark  Green, Background 2 and hide the   background graphics. (depending upon  your version of Office, the color may be   named Dark Green, Text 2).  From your downloaded project files, insert the   video p03G_Video1.mp4.

Change the Video Height to 5 and use the Align Center and   Align Middle options to position the video. Apply the Simple Frame, Black   video style.

On the Playback tab, change the   Video Options to Start the video  Automatically. Trim the video so that the   End Time is 00:07 and then  compress the media to Low Quality. (Mac users, the   Compress Media  feature is not available on a Mac).

On Slide 6, hide the background   graphics, and then format the slide  background by inserting a picture from   your downloaded grader files-p03G_Backyard.jpg.   Set the Transparency to 0%

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, and a Footer  with the text 3G_Remodels
   Display the document properties. As the Tags, type backyard   remodels 

Access control strategies

Access Control Strategies

Introduction

In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The specific course learning outcome associated with this assignment is:

  • Determine an access control strategy based on existing documents.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Scenario

Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI’s coding development projects often encompass classified information and personally identifiable information (PII).

Instructions

Write a 2- to 4-page paper in which you:

  • Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
  • Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
  • Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
  • Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
  • Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.​​​​​​ 
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.

501 discussion 7

You are required to submit a 1,000-word, double-spaced 

Question 

What is an Intranet? What is an Extranet? The differences between these two proprietary networks.

You will use your textbook, the university digital library and online resources with proper citations.

Your paper must have three parts:

  1. Review of source(s)
  2. Opinion and commentary
  3. Citations

Information Technology

 

Question 2: Functional Area Business Application

Describe the functions and objectives of ONE functional area business application (e.g., software system) that is in your organization and explain its value to the organization. Include at least two reference in APA format