IT Proposal-Final Project 8-10 pages. MUST BE A+ WORK.

 

IT Proposal

For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.

As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario. 

Scenario

ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations. 

Include the following information in your IT Proposal.

  • Analyze the current information system in place at ABC Corp and its role in the current challenges identified.  
    • Describe the challenge(s) presented in the scenario and the impact of the challenge(s) to the organization. Include any potential data security issues that could occur as a result of the current information system.
  • Create an information system for implementation at ABC Corp that will solve the identified challenges.
    • Explain how the proposed information system solution will solve the problems.  Support your statements using the textbook and/or other credible sources.
    • Evaluate your proposed system and explain why the proposed solution is the best approach including issues of scalability, streamlining of operations, and cost effectiveness. Support your statements using the textbook and/or other credible sources.
    • Explain how the proposed information system solution will ensure data quality and security. Support your statements using the textbook and/or other credible sources.
  • Distinguish among the hardware components, operating systems, programming languages, programs, and applications your proposed solution will contain. 
    • Create a high-level diagram of the major elements that are required for implementing the solution.
  • Evaluate the systems development life cycle (SDLC) process as it relates to your proposed solution, and describe how you would implement it in the development.
    • Determine the approach you will use for implementing your proposed solution, by revising the SDLC diagram you created in Week Four.  Include the revised diagram in your proposal.

The IT Proposal

  • Must be eight to ten double-spaced pages (2,400 to 3,000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must use at least four credible industry sources, in addition to the course text. 
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style.

    **THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER

IT-project management wk2 discussion

 

Detail two methods you would use to collect and analyze network traffic.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other (at least two) students.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

Cybersecurity Program

 

USING ALL PREVIOUS ASSIGMENTS (INCLUDED), students will present a comprehensive  Cybersecurity Program that reports on the final state of their enterprise.

Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion. .

APA style is not required, but solid academic writing is expected.

This  assignment uses a rubric. Please review the rubric prior to beginning  the assignment to become familiar with the expectations for successful  completion.

You are not required to submit to turnitin.

This assignment serves to benchmark competencies: 

4.1:  Develop cybersecurity program aligned with business needs, regulations,  and compliance standards to enhance an organization’s security posture.

4.2:  Determine appropriate business strategies to ensure business  sustainability, availability, and reliability and articulate these needs  to relevant stakeholders.

4.4: Interpret risk  assessments, gap analysis, and current cybersecurity trends to formulate  a cybersecurity governance strategy that establishes mitigation plans  for future challenges to achieve security objectives.

Cybersecurity Planning

1.)In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.

2.)For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. 

At the end of your report, please include a LINK to the policy you have reviewed.

4p

Deliverables 

§  1st  –  Scope of Work (discussion post) – step 1  Need ASAP

·  Crucial concerns worksheet step 2-4

·  Policy Alignment Report –  step 5-7

·  MDM Policy Framework – step 8-10  (2-3 pages)

·  *MDM Policy Presentation*   Instructions separate sheet.

Security Architecture and Design

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two reference.

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

Cloud Computing and Digital Forensics

1.) Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the   Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

Stand alone quotes will not count toward the 3 required quotes.

2.) Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay of 300 words describing that case and how it relates to this week’s topic.

discussion

 

Discussion Conflict with Teams

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Pairs Assignment

How to create a program Pairs that prompts user to enter two numbers (double) and then prints the addition, subtraction, multiplication, and division of the two numbers in Java (IntelliJ).