Project 1: Executive Summary

Hide Assignment InformationInstructions

This week, you will submit the one- to two-page executive summary that you started last week. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

Be sure to cite any sources you use.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.

When you are finished, click “add a file” to upload your work, then click the Submit button.

EH week13 p13

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please reference and follow the attachments and needed 2 pages words. Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

Question – Access control

Discuss the the threats and vulnerabilities to Access Control and what business must do to be protected. 

500 words.

APA style needed 

2-3 References must.

Need Response to below discussion-cloud IT

Please provide the responses to below discussions in 75 to 100 words for each discussion

Post1#

 

Federated architecture in cloud systems is also referred to as the Cloud Federation Architecture. It is a system that provides an intercloud service where heterogeneous cloud gets capacitated to interoperate. All the clouds participating ‘adopt unique techniques to describe the different services obtained from their platforms’ (Liu, Zhang, Song, & Letaief, 2020). Users, on the other hand, are enabled to use the created mechanism or system to benefit from the common as well as available services within the cloud, this being after the conclusive application of the federation’s architecture within the interface. There are specialist service brokers whose mandate is to provide a platform for translating services between and amongst the interfaces, thus providing the necessary updates for its successful operations.

Cloud federation architecture applies brokerages, including the most common, typical objective request broker architecture (Liu et al., 2020). Others that have gained notoriety in the market amongst consumers include the Object Request Broker, which acts as middleware, especially after introducing the XML. It is now possible to apply similar technologies in processing similar languages while avoiding unnecessary translations. Brokers play a core role in the cloud federation, ‘whereas other service providers such as the CPSs facilitate the broker-to-broker communications’ (Liu et al., 2020). Such a function can be matched with those offered under the federation resources and have to be operated using a user command just as it is done while considering the SLAs parties. It is incumbent upon the brokers to identify the unique ways cloud services and resources ca. n be applied before gathering information seamlessly and smoothly. Service pricing information is another crucial benefit that can be gained from brokerage services.

For cloud federation architecture to function correctly as designed, the engaging parties, as well as those that are interested, need to ‘subscribe for the FLA services’ (Wu, He, & Chen, 2020). This service guarantees particular interconnections, laws, and rules of operation, which also dictates the unique roles and responsibilities of the parties. Only acceptable behaviors are allowed leading to more significant financial gains. There are administrative penalties, however, following violations of the laid down protocols, which equally encourages smaller parties to subscribe and unsubscribe at will. All the pros and cons of cloud federation architecture, however, serve to ensure that the system as developed promotes interoperability, collaboration, and cooperation.

Research on the intercloud services reveals a growing interest and concern for the use of cloud federations. Some of the factors that have been cited for this ever-increasing urge include its power-efficiency, cost-effectiveness, and even the dynamism associated with it when it comes to sharing and disseminating information, services, and resources (Wu et al., 2020). It is required of the members in a federation to sign up for the Sign Service-Level Agreements, which is depended upon for continued availability as well as QoS. Other things to consider include defining the marketing system based on the costs of utilities, determine the geographic dispersion that will dictate how resources are distributed. Equally important is that it will eliminate any likely problems within the network ass that would interrupt normal services or alter access to services through delays. 

Post#2

 

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. Those users might be customers (customer identity management) or employees (employee identity management). The core objective of IAM systems is one digital identity per individual. Once that digital identity has been established, it must be maintained, modified and monitored throughout each user’s access lifecycle. Identity and management technologies include but aren’t limited to password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.

“An Identity and Access Management (IAM) framework manages these different slices of your profile, including your memberships, groups and organizations, roles, resources, resource-level roles, risk, history, status, and so on” (Scheidel, 2010). IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations. 

“Unlike manual new-user access and subsequent modification controls, the primary benefit of centralized and automated IAM controls is the enforcement of organizational security policies at the point of use” (George, Aldhizer, Paul & Dale, 2008). Specifically, security policies are enforced through the real-time monitoring of employee and third-party access and use of sensitive data across multiple enterprise resource planning (ERP) databases in numerous locations. Additional benefits of centralized and automated IAM controls include improved operational efficiency, increased userproductivity, enhanced internal audit efficiency, and improved compliance with federal privacy laws and regulations.

“Implementing centralized authentication is a great method when there are too many users and servers, although this itself needs a good amount of time to implement and maintain. Thus, depending on operational benefits, you can give a thought” (Vora, & Pruteanu, 2017). Many organizations should consider automating the following five IAM processes and related controls: password changes or resets, new-user access, subsequent modifications to existing user access, termination of user access, and third-party access. While the benefits of deploying a robust IAM solution are clear, the cost and complexity of implementation can derail even the most well-intentioned organization. However, when enterprises consider the cost of a potential security breach or study the inefficiencies inherent to the manual provisioning and de-provisioning of access to corporate resources, the imperative is clear. In addition, enterprises can ensure security by deploying solutions with strong multifactor authentication, while eliminating user frustration by delivering seamless access to cloud-based applications. 

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. Those users might be customers (customer identity management) or employees (employee identity management). The core objective of IAM systems is one digital identity per individual. Once that digital identity has been established, it must be maintained, modified and monitored throughout each user’s access lifecycle. Identity and management technologies include but aren’t limited to password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.

“An Identity and Access Management (IAM) framework manages these different slices of your profile, including your memberships, groups and organizations, roles, resources, resource-level roles, risk, history, status, and so on” (Scheidel, 2010). IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations. 

“Unlike manual new-user access and subsequent modification controls, the primary benefit of centralized and automated IAM controls is the enforcement of organizational security policies at the point of use” (George, Aldhizer, Paul & Dale, 2008). Specifically, security policies are enforced through the real-time monitoring of employee and third-party access and use of sensitive data across multiple enterprise resource planning (ERP) databases in numerous locations. Additional benefits of centralized and automated IAM controls include improved operational efficiency, increased userproductivity, enhanced internal audit efficiency, and improved compliance with federal privacy laws and regulations.

“Implementing centralized authentication is a great method when there are too many users and servers, although this itself needs a good amount of time to implement and maintain. Thus, depending on operational benefits, you can give a thought” (Vora, & Pruteanu, 2017). Many organizations should consider automating the following five IAM processes and related controls: password changes or resets, new-user access, subsequent modifications to existing user access, termination of user access, and third-party access. While the benefits of deploying a robust IAM solution are clear, the cost and complexity of implementation can derail even the most well-intentioned organization. However, when enterprises consider the cost of a potential security breach or study the inefficiencies inherent to the manual provisioning and de-provisioning of access to corporate resources, the imperative is clear. In addition, enterprises can ensure security by deploying solutions with strong multifactor authentication, while eliminating user frustration by delivering seamless access to cloud-based applications.

FTK IMAGER LITE

Prepare an investigative report of the forensics data capture conducted using the tool FTK imager lite. 

The paper should provide the following information: 

· Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis

· Step-by-step description you used to gather data for analysis

· Report on the information that was obtainable from the device

· Graphics evidence that you conducted the forensics data gathering and analysis

The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

   No Plagiarism 

· APA Format required

· 5 pages without References.

Assignment

 

Assignment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this Cloud Computing course have been applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge and knowledge could be applied to an employment opportunity in your field of study.

Requirements

Provide a 500 word (or 2 pages double spaced) minimum reflection

Use of Proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course and how they will be used at your current or future employer.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

quicksort algorithm

 (1) Please generate an array with 11 elements, which is the best case at the first iteration of QUICKSORT algorithm and then is the worst case for both subarrays at the second iteration of QUICKSORT algorithm. The last element is used as Pivot.

 (2) Please explain your answer is the worst case and the best case for the first and second iterations.

  2. Please sort the input array [9 -9 15 35 -1 14 20 7] using QUICKSORT algorithm to output an increasing order array. The last element is used as Pivot (please show detailed steps for full credits)  

Support and Software Deployment

Please respond to the following:

  • Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?

disaster recovery

Select a topic related to “Disaster Recovery in Cyber field”  and write a research 15 page paper consists of

• Table of Content  

• A background about the company leading into the current problem there are facing 

• Problem statement- This should be a clear statement of the specific problem  

• Research objective  

• Limitation of Study…  what impacted the group to perform a complete research? 

• Literature reviews write a summary about three to 5 articles that pertains to your research. 

• Research Design/Methodology that was used……must be able to provide supporting information on why this was the best approach.  

• Findings 

• Recommendation & Conclusion

15 page research paper

And need PPT for same paper

Study Questions and Essays

APA format, strictly plagarism free. Attached required two textbooks

Assignment 1 – Discussion (1 page)

Discussion: This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic

Assignment 2 – Study questions (3 pages)

Chapter 7 – study questions 1-10, Exercise 2 (Information Systems for Business and Beyond)
Chapter 8- study questions 1-10, Exercise 2 (Information Systems for Business and Beyond)

Assignment 3 – Essay (1 page)

Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact knowledge creation, culture, and strategy. Why are these important concepts to understand within an organization? (Information Technology and Organizational Learning)