Reserved for hifsa
Security Architecture & design
Length: Minimum of 600 words
Simply, no plagiarism
Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine. Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement. Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.
Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time. Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment:
Discussion Week 5 ERM
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.
Please make your initial post should have 500 words and the post will do at least TWO of the following:
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Enterprise-9-P
Pick a topic relevant to Disaster Recovery and Business Continuity Planning and write a 10 page paper. The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):
INTRODUCTION
- State the topic you are attempting to cover
- State the issues involved
- State why we should be concerned with resolving whatever issues are involved
- State how answering the issues will help us
- State the implications and consequences of dealing with or resolving the issues involved
REVIEW OF THE LITERATURE (5 sources minimal, at least 3 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:
- Summarize how each of the sources presents and deals with the subject
- Explain how each source presents and deals with its findings or results
- Explain the relevancy of each source to your topic
- State what you learned from each of your sources
- State in what way(s) each source contributes to answering your issues
DISCUSSION
- State your answer to your issue
- State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
- State what questions about your topic you still have that your sources may not have answered
CONCLUSIONS
- Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
- State the implications of your conclusions
- State what might be the possible consequences of your conclusions
- State the significance these implications and consequences might have in the information technology / information security realm
DOCUMENTATION
- On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
- You should have a MINIMUM of five (5) sources for your paper, at least 3 source needs to be peer-reviewed
- Not meeting this minimum requirement of five (5) sources will lead to a lower evaluation of your paper for each missing source
- Use APA format for documenting your sources
-For APA help: Purdue OWL
-For more details on journal types, refer to this link: Rutgers Library
Business Intelligence
In the Group Discussion board for Data Visualization, answer the questions below.
o Go to Tableau Public gallery at https://public.tableau.com/en-us/s/gallery and find 2 to 3 vizzes you like, click on the vizz and then download them with the button in the bottom-right corner to try to understand how they were made.
o Go to Stephen Few’s blog “The Perceptual Edge” ( perceptualedge.com) and to the section of “Examples.” In this section, he provides critiques of various dashboard examples. Read a handful of these examples.
o Go to dundas.com. Select the “Gallery” section of the site. Once there, click the “Digital Dashboard” selection. You will be shown a variety of different dashboard demos. Run a couple of the demos.
Discuss these questions with the group:
- which 2 or 3 vizzes interested you?
- what were some of the good design points and bad design points of the vizzes & demos?
- What sorts of information and metrics were shown on the vizzes & demos?
How these courses are useful for work
1. Operational Excellence2. Information Governance3. Data Science and Big Data Analytics4. InfoTech Import in Strat Plan5. Emerging Threats and Countermeasures6. Cloud Computing7.InfoTech in a Global Economy I want to some points for these will useful for my job duties1. Azure Cloud storage2. Dynamics CRM(Customer Relationship Management)3. Developer
- JavaScript
- Angular JS
- JQuery
- HTML/ HTML5, CSS
- SharePoint
- SSIS & SSRS
Assignment 5-Fast Scrabble Words
You shall write a C++ program that:
- Reads an arbitrary number of whitespace-delimited tokens from standard input.
- Determines and prints (to standard output) two decimal integer values:
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
/srv/datasets/scrabble-hybrid
. - The total number of points that all those words would be worth in Scrabble, according to the letter values in
/srv/datasets/scrabble-letter-values
.
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
Specific Requirements
- You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
- Open and read the contents of each relevant data file exactly once.
- Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
- Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.
Cloud Computing week 7
Discussion : Define and describe virtualization. List the pros and cons of virtualization.
Paper requirements:
For week 8, you will write a paper on virtualization. The following are the items to discuss in the paper:
- Define and describe virtualization.
- List the pros and cons of virtualization.
- List reasons why companies should virtualize.
- Define and describe the hypervisor.
- Define and describe green computing.
Paper requirements:
- Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
- Minimum of four (4) references
- Format your paper consistent with APA guidelines
- When submitting the assignment, please ensure you are submitting as an attached MS Word document.
New Assignment
Please review Chapter 32: Constructive Dialogue and ERM: Lessons from the Financial Crisis Case and provide response for following questions.
1. What are the preconditions for conducting constructive dialogue in an organization?
2. Is effective risk management possible without constructive dialogue?
3. What are the forces that tend to undermine effective risk management in an organization?
4. Given its obvious value in helping an organization to understand the major risks that could prevent it from accomplishing its mission and objectives, why was the financial sector, including a risk-sensitive organization such as Goldman Sachs, so slow in adopting ERM?
You are required to respond to the questions thoroughly, in 250 -to-300 words for each question. Be sure to include at least three reference sources. APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.