Capstone Assignment week2

Question 1: 400 words

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new inter organizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Minimum of two references and one of the references needs to be from Text book to be used: Reynolds, George W. Information Technology for Managers, 2nd edition.(2016). Cengage Learning. ISBN: 978-1-305-38983-0.

Cryptography Assignment

In this assignment you will examine the digital certificates of a google web site, find the certification path, and answer the questions below.

•  Open a Chrome browser and go to gmail.com.

•  Note that the url starts with https. This means that this is a secure communication.

•  Notice also the lock by the url. (Visit https://support.google.com/chrome/answer/95617?hl=en)

•  Click on the lock and the details.

•  View the certificate for the site and answer these questions:

•  Who is the certificate authority on this certificate?

•  Who is the certificate issued to?

•  What is the associated public key?

•  When does the certificate expire?

                                                            Find the Certification Path

•  Look at the path of the certification. Click on the immediate parent of google.com, Google Internet Authority G2.

•  View the certificate for Google Internet Authority G2 and answer these questions:

•  Who is the certificate authority on this certificate?

•  Who is the certificate issued to?

•  What is the associated public key?

•  When does the certificate expire?

•  Proceed with this until you view the certificates of all intermediate authorities and the root authority.

•  Try at least two other different website and follow the same steps mentioned above and answer the same questions again about each one of them!

week 8 discussion

 

Designing Effective Physical Security and Planning Procurements Effectively”  Please respond to one of the following:

  • Outline three  parameters that should be considered when designing and implementing physical security into the information protection scheme. Suggest two activities that could be performed to address these parameters and explain how.
  • Suggest three activities that could be performed to ensure that physical security plans are adequate. Describe two  measures that you could perform in order to evaluate the installed physical security.
  • Select what you believe to be the top three benefits of making a business and assurance case prior to proceeding with a procurement plan. Support your response with a rationale. Describe potential challenges that the procurement process may experience by not having a proper business and assurance case.
  • Recommend two  security practices that should be performed when administering procurement contracts and explain why you recommend them. Determine how these practices will ensure that subcontractors fully comply with the requirements of the contract within your recommendation.
  • Instructor Insight
  • Any current cybersecurity topic.

Research Report on comparative analysis of two programming languages Python and Go language

 

Research Report on comparative analysis of two programming languages Python and Go language

Must follow the guide and instructions PDF.

Research Report Guide:

  • The structure of the paper MUST follow the guide & instructions. Please find attached both documents.
  •  Include All sections
  1. Front Matter – Title page (with Running head), blank Approval page, Abstract, blank Acknowledgement page, Table of Contents, List of Figures  (if necessary), List of Tables (if necessary)
  2. Chapters 1 – 5
  3. Appendices (if necessary)
  4. References (as per APA)

APA Formatting Guidelines:

  1. In text citations
  2. References (with the hanging indents)
  3. Page numbers
  4. Font style and size
  5. Tables and Figures inclusion (must add sources as per APA)
  6. Headings and subheadings format

project’s attributes

 

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.

Blockchain IT Assignment

Blockchain Assignment:

Prepare a 3-5 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.

1 page in APA 6th Format Operational Excellence

1 page in APA 6th Format Operational Excellence with one scholarly (peer-reviewed) resource.

Writing should be on the below topics:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Internet Security/VPNs

 What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one? 

Big Data

The rising importance of big-data computing stems from advances in many different technologies.  Some of these include:

  • Sensors
  • Computer networks
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities
  • Data analysis algorithms

How does these technologies play a role in global computing and big data?

Minimum 300 words. Include intex citations and references.