Security Architecture and Design

 

Briefly answer each of these questions. Use APA style for any outside references.

  • What does a peer review process look like?
  • When does an assessment require a peer review?
  • Who should perform the peer review?

Due by August 16, 11;59 p.m. EST.

Need help! due in 3 hours!

 

Assignment Content

  1. The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the IDS solution. Therefore, you will provide him with the following information to consider in his planning:

    Part A
    Create 1- to 2-page summary, and do the following:

    • Identify the number of additional employees necessary to rollout and support an IDS desktop solution.
    • Explain how individuals will work with the existing desktop support and malware teams.
    • Identify the job title for those who normally perform rollout and support functions for the IDS desktop solution.
    • Outline the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution.
    • Part B
      Create an infographic displaying an organization chart, and do the following:
    • Identify job titles provided in your summary and how they fit in with the existing cybersecurity team.
    • Indicate the industry certifications the new IDS rollout-and-support-function employees should have or can work toward.
    • Format your citations according to APA guidelines.

      Submit your assignment.

       

bi12 work

1. Explain why it is useful to describe group work in terms of the time/place framework.

2. Describe the kinds of support that groupware can provide to decision makers.

3. Explain why most groupware is deployed today over the Web.

4. Explain in what ways physical meetings can be inefficient.Explain how technology can make meetings more effective.

5. Compare Simon’s four-phase decision-making model to the steps in using GDSS.

be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)  2 pages

Assignments

Discussion 5 

5 Discussion: Recommendations for IT Leaders

Required Readings Chpters in Textbook: 

Chapter 12, “Innovation   with IT”

Chapter 13, “Big Data   and Social Media”

—————————————————————————————————-…………………………………………………………………………………

Case Study B – ModMeters

Case Study Project B – Be sure to address each question in the Case studies, and explain your rationale thoroughly. Be sure you saved your file with your full name, and title of this project. Example: Jason Karp Case Study B. 

Details: You will be given a case study to solve from the textbook. While your responses will vary, properly documenting your response from valid resources is a requirement. This assignment requires you to use proper citations and references from the textbook and alternate sources. Thoughtful opinions/research based on the literature, and from the textbook are necessary, so be sure to review the chapter prior to completing these activities. This task is like a research paper, so please take your time when preparing your responses. Separating each case study with a title and proper formatting is essential so that I can read and follow your paper. A one (1) page response is NOT – NOT going to earn you maximum points. The Case Study response will be submitted on the assigned due date from the past weeks (see submission due dates and rubric). The Dropbox will close after the due date and late submission will not be accepted. Case study projects are NOT posted on the discussion board, they are submitted as an assignment. 

……………………………………………………………………………………………………………………………………………………………………………….

..

week -13 cpm

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. 

Digital Forensics Tools&Tech

 

Week Six Assignment

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Week 7

Minimum 500 words

Blockchain Technology

How will Snovio impact marketing?