Operational Excellence – Paper

ITS 631 Paper #1 (Chapters 1 – 5 Bourgeois)    Niccole Hyatt, PhD Professor

100 Points Possible  Open Textbook and Resources

Individual Effort Only!

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. How can they be overcome? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? What are the disadvantages? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

5 Pages 

find two different recent (within 2 years) articles

  • Using search engines find two different recent (within 2 years) articles involving data mining. Describe the role of “data mining” in the story using your own words.

Be sure to list both of your references in correct APA format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph.

Initial posts need to be 250 words.

2 Replies need to be 150 words.

country Presentation to the Board of Directors

 

Assignment Content

  1. Based on readings in Rising Powers, Global Governance, and Global Ethics and related discussions, choose 1 of the countries or regions from the book into which your company might wish to expand. 

    Develop a 1-to 2-page table using either Microsoft Word, PowerPoint, or Excel that accurately compares your U.S.-based company’s ethics, based on classical ethical theory as well as its ethical stance on privacy, protection of intellectual property, and protection of PII to those within your country of choice. The column headings are “U.S.-based Company” and “Country of Choice.” The row headings are “Classical Ethical Theory,” “Privacy,” “Protection of Intellectual Property,” and “Protection of PII.”

    Create a PowerPoint presentation containing 8 to 10 slides for your corporate Board of Directors logically depicting at least 3 ethical challenges you might anticipate along with a policy statement for each. Include research concerning the country’s stance on issues, such as privacy, protection of intellectual property, corruption index, major religions, or indigenous tribal groups in the speaker notes.

    Include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless you obtain author permission or use copyright-free images.

    Note: You may use other applications like Adobe® Spark®,, Microsoft® Sway®, or Mix instead of PowerPoint.

    Submit your assignment.

Network Security

  

Questions for the Lab

1. Carefully read the lab instructions and finish all tasks above.

2. If a packet is highlighted by black, what does it mean for the packet?

3. What is the filter command for listing all outgoing http traffic?

4. Why does DNS use Follow UDP Stream while HTTP use Follow TCP Stream?

5. Using Wireshark to capture the FTP password.

Questions

 

Answer the following research questions (25 points each) using external references.  APA must be followed.  

1. What are the three sensing device categories and their specific purposes and how would you apply them based on your experience or expert recommendations?

Guidelines: Sensing device categories include those for perimeter protection, area/space protection, and object/spot protection.

2.  How is the type of alarm transmission/signaling system used in a particular application determined and how would you apply them based on your experience or expert recommedations?

Guidelines: The location  of the business or residence, the frequency of police patrols, and the ability of the customer to afford the cost all help determine what type of alarm transmission/signaling system is used.

Assignment -1 – SD

1. Using a Microsoft Word document, Please solve the following questions.

Need at least 4 pages.

No plagiarism and on time delivery 

APA standards with appropriate references. 

College Capstone research paper proposal to develop a Secured Online Voting system due to COVID-19 in the state of Texas

 The proposal must include these elements:

  • 1.Brief summary of problem statement.
  • 2.Your objectives and goals.
  • 3.Your proposed approach to this issue.
  • 4.Inferences that you have made from your research that informed your approach.
  • 5.List of resources that you will need to accomplish your goals.

Formatting guidelines: double spacing, 12-point Times New Roman font, one-inch margins, and discipline-appropriate citations. 

Page length requirements: Minimum of 1-2 pages, not including cover page, tables or diagrams, or resources. Your proposal should include citations and a bibliography section of 3-5 primary resources in APA format. 

Must use the following references. 

SECURED ONLINE VOTING

https://ieeexplore.ieee.org/iel7/6287639/8274985/08320349.pdf

https://libres.uncg.edu/ir/uncg/f/N_Kshetri_Blockchain_Enabled_2018.pdf

https://arxiv.org/pdf/1705.04480

CIS IOT 

http://mirlabs.net/jias/secured/Volume13-Issue4/Paper13.pdf

https://www.academia.edu/download/59322681/security-issues-in-blockchain-applications-using-iot-IJERTV8IS02003920190520-92018-187ch8d.pdf

COVID-19

https://www.tandfonline.com/doi/full/10.1080/09540962.2020.1766222

PLEC8

 

Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences. Include the question and number your answers accordingly.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

ISI Research Paper

 

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  1. Information systems infrastructure: evolution and trends 
  2. Strategic importance of cloud computing in business organizations 
  3. Big data and its business impacts 
  4. Managerial issues of a networked organization 
  5. Emerging enterprise network applications 
  6. Mobile computing and its business implications 

Research paper Requirements: 

  1. 8-10 pages in length 
  2. APA formatted 
  3. Minimum six (6) sources – at least two (2) from peer reviewed journals 
  4. Include an abstract, introduction, and conclusion 

Web Analytics: The importance of Reporting

 300 Words Minimum

Discussion Points:

Roll-Up Reporting answers very specific requirement for many companies, please answer the following in your post

  • Explain roll-up reporting and why is it important.
  • Describe what is the tracking roll-up transactions.
  • Describe the implications of the roll-up techniques.
  • Explain how roll-Up pageviews be improved.
  • Compare and contrast web server log files vs. java scripting.