Executive Program Practical Connection Assignment

Course Name : InfoTech Import in Strat Plan 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Research paper & ppt

select any topic related to `disaster recovery related to cyber` 

• Table of Content 

 • A background about the company leading into the current problem there are facing 

• Problem statement- This should be a clear statement of the specific problem  

• Research objective  

• Limitation of Study…  what impacted the group to perform a complete research? 

• Literature reviews write a summary about three to 5 articles that pertains to your research. 

• Research Design/Methodology that was used……must be able to provide supporting information on why this was the best approach.  

• Findings 

• Recommendation & Conclusion

15 page paper

And also ppt related to research

Discussion 2

Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs.  This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text. 

Textbook Name — Information Technology and Organizational Learning text.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Introduction to Systems Thinking

 For this assignment, complete the following: Choose a system in your own life. In one paragraph, describe the purpose of this system and describe how it meets the definition of a system. For your chosen system: identify its parts, define their relationships to each other, and describe any feedback loops present in the system. Using Microsoft Visio, construct a model of this system. 

Answer the questions below in 2-3 pages

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1, Business analytics logical data flow, from your textbook. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

The Role of Privacy in the Workplace

Conduct research via the internet and provide a brief yet detailed paper on Privacy in the Workplace. You may select a position as to whether you believe there should be Privacy in the Workplace, or that employees do not have the right to privacy at work. Things to take into consideration are outlined below:

 ·  What are the laws and regulations that impact privacy in the workplace?

 ·  Why would an employer want to monitor the activities of its employees?

 ·  What benefits / drawbacks are associated with monitoring employees?

 ·  What could an organization use to ensure that all employees are well aware of their rights and responsibilities with regard to privacy?

 ·  What type of monitoring systems are used in the workplace today?

For this assignment, submit a 5-6-page paper answering these questions as succinctly and completely as possible. 

Paper should conform to APA style. 

The page total does NOT include the title page or the reference page(s). 

Do not include an abstract of table of contents.

You should have a minimum of 4 references, none of which can be Wikipedia or Techopedia.

Your paper should be more of a narrative, and not just a series of bullet lists

AUtomated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code.

 
For this assignment, My task is to scan the WebGoat source code using the VCG SAST tool and verify the findings within the code. In particular, you will be be using VisualCodeGrepper, which is an open-source SAST tool running on Windows. It supports multiple programming languages(C++, C#, VB, PHP, Java, and PL/SQL).. Prepare a simple report based on OWASP Findings Report Guide, and submit the report in a PDF format   There should be a section summarizing all the findings by:

  1. Risk level
  2. OWASP Top 10 Threats

To install VCG and run your scans, follow these instructions:

  1. Download WebGoat 8.0 from GitHub in a zip format.
  2. Extract the zip file into a directory.
  3. Download VCG from the project page.
  4. Install VCG on a Windows machine. Consider the system requirements on the project page.