Timeline

 

Completion of the dissertation primarily rests upon you, the doctoral student. However, research indicates that self-regulated learning strategies predict the elapsed time along the dissertation journey (Dunn & Rakes, 2015; Kelley & Salisbury-Glennon, 2016). One such strategy is the creation of a timeline. This cyclical process has the learner plan out a task, monitor their performance along major milestones, reflect on their progress, and then use the reflection to adjust the timeline. However, to be effective, this strategy needs to be personalized for each learner’s purpose (Zimmerman, 2002).

Using the attached template as a guide, you are to create such a timeline – a roadmap, if you will, along your dissertation journey. Incorporated within the timeline are major milestones. Build into the timeline goals for each milestone with specific dates. You may also want to include specific contact information as well as possible obstacles that may arise. This will be a tool you will bring to each consultation with your professor/chair. Most importantly, it is to be a useable point of reference along your dissertation journey.

References

Dunn, K., & Rakes, G. (2015). Exploring online graduate students’ responses to online self-regulation training. Journal of Interactive Online Learning, 13(4), 1–21.

Kelley, M., & Salisbury-Glennon, J. (2016). The Role of Self-regulation in Doctoral Students’ Status of All But Dissertation (ABD). Innovative Higher Education41(1), 87–100.

Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into Practice, 41(2), 64-70.

Assignment

Exercise 1: Using the data classification scheme in this chapter, identify and classify the information in your personal computer or personal digital assistant. Based on the potential for misuse or embarrassment, what information would be confidential, sensitive but unclassified, or for public release?

Exercise 2: Using the Internet, determine what applications are commercially available to enable secure remote access to a PC.

Exercise 3: Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

research paper

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.

Systems Architecture

 

When we talk about the IoT – the Internet of Things you can think of machine to machine communications where data is collection and communicated. Examples could be wearables, car interfaces with smartphone, home devices such as security systems, manufacturing machine communications, health care, transportation, etc.

Research IoT applications. Complete a 2-3-page paper with an abstract and conclusion in APA format (plus cover sheet and reference page) that discusses:

 Select an application of the technology and discuss the following:

·       The IoT platform

·       Data management and streaming

·       Application considerations with connectivity, gaps, handling interruptions, business, and industry requirements.

·       The IoT infrastructure

·       Security issues and methods for protection (include any security breach events for your application)

·       Any cloud solutions such as data storage, processing, analysis, and remote device management.

Specific questions or items to address:

Select an application of the technology and discuss the following:

·       The IoT platform

·       Data management and streaming

·       Application considerations with connectivity, gaps, handling interruptions, business, and industry requirements.

·       The IoT infrastructure

·       Security issues and methods for protection (include any security breach events for your application)

Any cloud solutions such as data storage, processing, analysis, and remote device management.

Threat modeling research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page. 
  • Need a UML diagram (not copied from internet)

ERM Startegy

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Report

Find the attachments for the following requirement

APA format, in-text citation( only Literature part), references include

6 pages

– Literature Review 

– Design decisions

-Key Factors Influencing Design

– Functional Design Decision

– Performance and maintenance Design Decisions