Discussion: Roles and Responsibilities in IT

 

In this module, you are learning about various IT disciplines, roles, and responsibilities in the field, and the certifications and degrees that equip you for those roles. In this discussion, you will examine various IT roles to find one of interest to you. You will learn about the skills and technologies used in these roles and how they can be transferred to other IT disciplines.

For your initial post, use a website such as the Bureau of Labor and Statistics Occupational Outlook Handbook or CompTIA’s Cyberstates Interactive Map to determine your areas of interest in the IT field. Then, choose a job title or role in that area of interest. In your post, describe how this role is situated within the broader IT fields discussed in this unit, and define the responsibilities of the role.

In your responses to your peers, discuss the job title or role they chose. In your response, describe the tools, skills, and certifications your peer would need to be successful in the identified role. Additionally, describe at least one other role that these skills and certifications could be used in.

To complete this assignment, review the Discussion Rubric.

Organization that has leveraged Cloud Computing technologies DUE 09-19-2020 6 PM (TODAY)

Select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?  • Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. 

Requirements: The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 7-8 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Discussion

Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

Research Paper

 

Your final research paper assignment is to write a research paper that explains how Enterprise Risk Management (ERM) empowers organizations to both avoid loss and capitalize on opportunity. You must provide specific examples. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)

Paper MUST address: How Enterprise Risk Management (ERM) empowers organizations to both avoid loss and capitalize on opportunity. Yu must provide specific examples

Cited sources must directly support your paper (i.e. not incidental references)

At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Security Vulnerability Report

 

Assignment Content

  1. A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc. Typically, organizations categorize the report to focus on specific areas and highlight the level of risk per area. Based on the vulnerability report, organizations are able to plan appropriately for budgeting and resource improvements.

    Write a 2½- to 3 ½-page security vulnerability report in Microsoft Word based on the organization you chose in Week 1. An internal review of your organization was previously conducted and found the following vulnerabilities:

    • A formal Password Policy has not been developed that meets your organization’s regulatory requirements.
    • The organization only uses single factor authentication using weak passwords.
    • Vulnerability Severity: High
    • Impact: Threats could easily guess weak passwords allowing unauthorized access.
    • Software configuration management does not exist on your organization’s production servers.
    • There are different configurations on each server and no operating system patching schedule.
    • Vulnerability Severity: Moderate
    • Impact: With ad hoc configuration management, the organization could inadvertently or unintentionally make changes to the servers that could cause a self-imposed denial of service.
    • An Incident Response Plan has not been developed.
    • There is not a formal process for responding to a security incident.
    • Vulnerability Severity: High
    • Impact: In the event of a security incident, an ad hoc process could allow the security incident to get worse and spread throughout the network; the actual attack may not be recognized or handled in a timely manner giving the attacker more time to expand the attack.
    • Consider people, processes, and technology that can be exploited by the source of a threat.

      Include recommended countermeasures to mitigate the impacts and risks of the vulnerabilities.

      Format your citations according to APA guidelines.

Datamining Disussion:cluster of objects from a binary transaction data set.

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Please ensure to use APA7 for your references and citations as you support your initial post.

Initial posts are to be 250 words minimum and are due by Thursday.

Replies (2) are 150 words minimum and are due by Sunday.

Paper : Medical data analysis with data mining (decision support system)

I have attached the introduction and a few references for kick-starting this paper.

Paper or topic can deviate from the given introduction and also the title is flexible.

The paper should meet the following criteria,

5 pages with 1.0 line and paragraph spacing.

Should have level 1 and level 2 headings.

Good grammar.

Should not use any article rewriting tools.

No Plagiarism.

Operational Excellence

Research topic: Operational excellence and change management in the organization unit.

Topics to be covered: 

1. Introduction

2. Principles of operational excellence.

Requirements:

Provide 3 pages and Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Please note that APA format is REQUIRED.

Surveillance state

  1.  Write in essay format with coherent paragraphs, not in outline format.
  2. 1000 word research paper on Surveillance state with at least 3 sources.
  3. You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line. 
  4. There should be no lists – bulleted, numbered, or otherwise.