I’m looking for the final project of the course CIS 304: Auditing IT Infrastructures for Compliance called Project: Addressing a New Business’s Compliance Responsibilities
BI_Assignment_1
Complete the following assignment in one MS word document:
Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
Discussion question #1:
Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources
Exercise 9:
Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.
Exercise 15:
Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?
Articlee writing
please review ONE of the following films and tell how that film represents a contribution to the field of CyberLaw.
War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013)
2. The minimum word count shall be not less than 1000 words.
APA format
Eassy(550 Words) APA format – 3 references
Write an essay of at least 550 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format.
Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles.
Excel Work for tomorrow!!!
- Complete: In the Lab #2 exercise for this module on page EX110
- If it says “If requested by instructor”, it IS REQUESTED
- DO NOT print if it asks you to
- IGNORE step #13
Please read Module 3 of MS Excel in your book.
Complete the tutorial and submit it.It is important that you understand what you are learning.
- Complete: IN THE LAB #2 (Ex 181)
- If it says “if requested by instructor”
- It is requested, complete the step
Any files you may need will be found in the COURSE DOCUMENTS section
If there are NO formulas, your assignment will be returned.
Business Intelligence paper 1
Graded Assignment: Knowledge and Skills Paper
Paper Section 1: Reflection and Literature Review
Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 1 and 2. This section of the paper should be a minimum of two pages.
Paper Section 2: Applied Learning Exercises
In this section of the professional paper, apply what you have learned from chapters 1 and 2 to descriptively address and answer the problems below. Important Note: Dot not type the actual written problems within the paper itself.
- Search the Internet for material regarding the work of managers and the role analytics play. What kind of references to consulting firms, academic departments and programs do you find? What major areas are represented? Select five sites that cover one area and report your findings.
- Most companies and organizations have downloadable demos or trial versions of their software products on the Web so that you can copy and try them out on your own computer. Others have online demos. Find one that provides decision support, try it out, and write a short report about it. Include details about the intended purpose of the software, how it works, and how it supports decision making.
- Comment on Simon’s (1977) philosophy that managerial decision making is synonymous with the whole process of management. Does this make sense? Explain. Use a real-world example in your explanation.
Important Note: There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.
Paper Section 3: Conclusions
After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward. This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.
Paper Section 4: APA Reference Page
The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.
Paper Review and Preparation to submit for Grading
Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!!
Important Reminder: Assessment of discussion boards and other writing assignments account for 75% of overall grading and below are how grades will be assessed for this discussion board:
Analysis: Impact of Mobile Computing on Businesses
Find 2-3 recent peer reviewed articles that closely relate to Impact of Mobile Computing on Businesses and write a brief analysis using 750 words. An analysis is not rehashing what was already stated in the article, Add value by sharing your experiences, thoughts and opinions.
Discussion
analyze the structure of advanced encryption standards and why it makes it so strong
short answer
- JavaScript has numerous ways of maintaining session state information, including query strings, hidden form fields, and cookies. Discuss the method you believe to be the most secure. Include in your response an example of how these methods can be exploited.
- Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
3 Assignments
Question 1:
Topic: Select a major organization that was located in the Hurricane Katrina disaster area. Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.
Assignment should follow all APA rules and include a min. of (1) citation/reference.
2 Pages(excluding intro and references).
Question 2:
Scenario
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 pages(excluding references and intro)
Self-Assessment Checklist
§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.
I followed the submission guidelines
Question 3:
Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
§ To protect servers from attack, each server should authenticate connections based on the source computer and user.
Tasks
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 pages (Excluding intro and References)
Self-Assessment Checklist
§ I addressed all issues required for the summary report.
§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.
§ I followed the submission guidelines.