Please go through the attached documents completely before providing the answer
OLDM W 7 D
1.Discuss what performance management is and how it influences effective teams.
2.Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
3.Note at least two organizational capabilities and compare and contrast each.
Assignment on Reflective Assessment (Subject- Analyzing N Visualizing Data)
d
Write a short paper discussing the application of this course to your work environment. Address the questions listed below in your paper:
· Introduction
· How will you apply the skills acquired from this course to your job?
· How will this course assist you in your professional or/and academic development?
· If the skills acquired in this course will not directly apply to your job environment, in what other ways are you hoping to apply them to your personal or academic portfolio?
· Conclusion
Your research paper should be at least 1 page (Minimum 400 words), double-spaced, have at least 2 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format).
Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
APA citation format is required.
Project and Discussion
Q1.) Operation security Individual project
Department of Defense (DoD) Ready
Purpose
This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.
Learning Objectives and Outcomes
You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.
Required Source Information and Tools
Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.
The following tools and resources will be needed to complete this project:
- Course textbook
- Internet access
- DoD instructions or directives
http://www.dtic.mil/whs/directives/ - Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf and http://www.rmf.org/images/stories/rmf_documents/850001_2014.pdf
- Department of Defense Information Security Program
http://www.fas.org/irp/doddir/dod/5200-1r/ - Department of Defense Internet Services and Internet-Based Capabilities
http://www.dtic.mil/whs/directives/corres/pdf/855001p.pdf - Department of Defense Proposes New Information Security Requirements for Contractors:
http://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-of-defense-proposes-new-information-security-requirements-for-contractors/ - School/public library (optional)
Deliverables
Scenario
You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.
This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.
Your firm’s computing environment includes the following:
- 12 servers running Microsoft Server 2012 R2, providing the following:
- Active Directory (AD)
- Domain Name System (DNS)
- Dynamic Host Configuration Protocol (DHCP)
- Enterprise Resource Planning (ERP) application (Oracle)
- A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
- Microsoft Exchange Server for e-mail
- Symantec e-mail filter
- Websense for Internet use
- Two Linux servers running Apache Server to host your Web site
- 390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader
Tasks
You should:
- Create policies that are DoD compliant for the organization’s IT infrastructure.
- Develop a list of compliance laws required for DoD contracts.
- List controls placed on domains in the IT infrastructure.
- List required standards for all devices, categorized by IT domain.
- Develop a deployment plan for implementation of these polices, standards, and controls.
- List all applicable DoD frameworks in the final delivery document.
- Write a professional report that includes all of the above content-related items.
Submission Requirements
- Format: Microsoft Word
- Citation Style: APA
- Length: 5 pages
Q2.) Cryptography Discussion
Write 500 words that respond to the following questions:
- Read the (Yahoo Data Leak Article from csoonline.com) online article at https://www.csoonline.com/article/3123496/security/yahoo-s-compromised-records-likely-hidden-within-encrypted-traffic-vendor-says.html
- Write a 400-600 words summary about what did you understand from it.
Please note:
- Be in APA format including your references.
- Be 500 words long (not including title and references).
- Do not re-state the questions.
- Include two sources (i.e. two references).
Q3.) Operation Security Discussion
Assignment Requirements
Participate in a discussion on the importance of separation of duties for personnel. Discuss examples of roles you would separate and why. For example, an administrator has full administrative server login access, and a network technician has limited administrative access but can view system login details. Payroll has access to employee financial records, but only payroll managers can approve raises.
Computer Science
Find and review a scholarly article related to Graph-Based Clustering and summarize it.
Make sure to follow all APA guidelines and watch the similarity score.
No Plagiarism
No content spinning.
Minimum 2 pages
All references must be included in APA format
Presentation
Make a presentation on project stakeholder management including below topics.
•Identifying stakeholders
•Planning stakeholder engagement
•Managing stakeholder engagement
•Monitoring stakeholder engagement
Applications and recommendations on Information technology project management topic
Data management paper
This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.
Data Science and Big Data Literature Review Test
Data Science and Big Data Literature Review Test
Submit Assignment
- Due Sep 17 by 11:59pm
- Points 11
- Submitting a file upload
- Available after Sep 1 at 12am
Data Science Literature Review Test
INF 160 Introduction to Data Science
About the test:
- Total points: 100 (carries 11% of the final grade)
- Each question worth 20 points
- Must answer all question to achieve a maximum of 20 points each
- Each answer must contain a minimum of 300 words.
- Submit responses as a word document in Canvas Assignment page.
Questions:
- Define data science and big data in your own words. Why data science and big data matters?
- Write down some applications of data science/big data in the real world.
- What are the five “V”s of big data? Explain those. What is the process of data science research/project?
- What are some challenges of big data research? Explain those.
- How do you intend to prepare yourself as a data scientist? Explain some areas of data science you will use in your foreseeable professional life as a data scientist.
Helpful Articles:
- Wikipedia entry on Data Science: https://en.wikipedia.org/wiki/Data_science (Links to an external site.)
- Data Scientist_ The Sexiest Job of the 21st Century.pdf from (https://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century (Links to an external site.))
- Popularity of Data Science Software: http://r4stats.com/articles/popularity/ (Links to an external site.)
- Data Science Core Knowledge and Skills: http://datasciences.org/ (Links to an external site.)
- Big Data Analytics and Capabilities: https://www.researchgate.net/profile/Ilias_Pappas/publication/318449845_Big_data_analytics_capabilities_a_systematic_literature_review_and_research_agenda/links/596bea2fa6fdcc18ea7927d0/Big-data-analytics-capabilities-a-systematic-literature-review-and-research-agenda.pdf (Links to an external site.)
- Big Data: The Age of Big Data.pdf
- Big Data Impacts: SPECIAL_ISSUE_BUSINESS_INTELLIGENCE_RESE.pdf
- Big Data Challenges: Critical Questions for Big Data.pdf
- Big Data Analytics: Big_Data_Analytics.pdf
discussion
“Social Media and Behavior Interaction” Please respond to the following:
- Interacting and communicating with other people is part of daily life. This includes face-to-face conversations, conversations over the phone or other mobile devices, and conversations through social media. Read the article titled, “Is social media ruining our kids’ social skills?” Provide your opinion on the effect that texting and social media (i.e., Twitter, Snap Chat, Facebook, etc.) are having on individuals’ abilities to articulate a face-to-face conversation. Support your opinion with one (1) example from your personal experience or an incident in the media.
- Emotional interaction is a behavioral reaction that is reflected by an individual’s feeling when interacting with technology. Examine the effect that the visceral design of a laptop has on an individual’s behavioral response compared to the effect that the visceral design of a smartphone has.
Forensics
1.Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. (300 words)
Chapter 7 ppt
2. Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. (300 words)
Chapter 8 ppt