Please go through the Assignment question completely before providing the answer
Business Strategy
Importance of Business Strategy
W12:A
Text:
Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond
Chapter 12
· Creating your own template, answer study questions 1 – 10.
· When you have completed the assignment, submit in Blackboard by the due date stated in the syllabus
Week 3 Assignment- data mining
Please see the attachment and answer the questions listed there about the Chapter 2 of your textbook.
– Write your answers to a Word file and upload here
– You do not have to follow APA format but please add you name, a title and any references.
Application Implementation
Create a 2- to 3-page document (to submit in Blackboard) to support the Appliance Warehouse Service Plan that includes the following:
· Testing Plan: Create a testing plan to manage the systems through QA standards. Include a testing plan for each part of the new service you’ve identified, such as, scheduling, invoicing, and reporting. For each part identified, include in your testing plan an action to be tested, along with an expected outcome.
· Implementation Plan: Indicate whether you will use parallel, direct, phased, or pilot changeover strategies. Explain your reasoning. For Implementation recommendations, refer to section 11.9, “Installation,” in Ch. 11 of Systems Analysis and Design.
· Training Plan: Indicate what a training plan would include for affected employees, such as appointment setters, technicians, management, and the parts department. Include a plan for all employees (or specific departments) affected by the new system implementation.
SIM will soon be ready for deployment! Carlie Davis wants you outline SIM’s testing plan, changeover strategy, and training plan. Also, agile is also being considered as a new project management technique at Appliance Warehouse. You know that improper training, testing, and deployment have ruined projects in the past. As you put forth your best effort, you consult the resource library and various emails from Carlie.
Hi Kevin,
Our lead developer was recently certified in Scrum, one of the agile methodologies, and would like to try to manage this project using scrum.
In order for her to do this, she needs us to rewrite the requirements list you previously created as user stories. Just to remind you, a user story looks like this:
As a < type of user >, I want < feature > so that I can < functionality >.
For example: As a taxi driver, I want directions so that I can quickly get to my next customer.
Please rewrite all of your requirements as user stories and I will pass it on to our development team.
Carlie
Hi Kevin,
The developers have requested to view your testing plan for SIM. Can you give me a sample of the tests you are planning to run? Show me examples of the unit tests, integration tests, and system tests.
Also, have you developed the training plan? Who are you planning to train and what functionality are you planning to teach the different classes of users?
It’s all starting to come together now!
Carlie
Hi Kevin,
As we near the end of the development stage for SIM, I have implementation questions. How do you plan on rolling out the new SIM system? Which technique did you decide to use? Why do you think this the best technique? Please explain the rationale for your choices.
Carlie
Cloud computing and digital forensics – Week 6
Week 6 Discussion: (500 words)
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Week Six Assignment: (300 words)
Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.
Use your own words and do not copy the work of another student.
Project7
Scenario
Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management. You must provide rationale for your choices by explaining how each control makes the environment more secure.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Arial, size 12, double-space
§ Citation Style: Follow your school’s preferred style guide
§ Length: 2 to 4 pages
Discussion1
Assume you are a security professional for an educational institution with 10 servers. Researchers on campus push a lot of traffic over the network, which slows performance at times. You also have a limited budget. You are evaluating both stand-alone and embedded firewalls in preparation of a purchase. A stand-alone firewall filters traffic before it reaches your servers, while an embedded firewall would be implemented on each server.
Answer the following question(s):
Which type of firewall would you choose? Why?
Discussion2
The process of reaching security goals is a continual process that requires specific direction. An organization’s success at complying with its internal security policy and external security regulations depends, in part, on clearly stated goals.
Answer the following question(s):
- What are two potential consequences to an organization that does not have clearly stated goals? Why?
Week 7
Week 7 Assignment
—> Word doc “Week7 questions.doc” is attached for this
Complete the following assignment in one MS word document:
Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16
Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
chapter 13: pdf attached
chapter 12: lecture video
https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824829?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27zoom_0%25287%2529.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201006T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20201006%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=c42d1be195a371680f6a182a5ed5fd7b55b59b73cc45f27663f3a7d39d7f181f
Week 7: Discussion 1
Create a discussion thread (with your name) and answer the following question:
Discussion 1 (Chapter 12): Examine Alexa’s skill in ordering drinks from Starbucks.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Week 7: Discussion 2
Create a discussion thread (with your name) and answer the following question:
Discussion 2 (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Response Required Discussion cloud
Please read the below discussion posts and provide response in 75 to 100 words
Post#1
Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance of IT auditing and especially cloud computing auditing is an essential effort to ensure the proper functioning processes of an the organization’s IT systems, management, operations, and related processes, to avoid fraudulent, in order to have comprehensive and accurate financial view of their business” (Moghadasi, 2018).
The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).
The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).
The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).
Post#2
Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.
The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control. The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.
The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.
The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.
Time article
Read this Time article and view the video explaining how Russian trolls spread fake news. Discuss in 500 words whether the government should regulate Facebook more closely.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.