IT leaders promoting innovation

Discuss IT leaders can promote innovation. Use your own experiences as good or bad examples.

Forum rules:

  • Your answer must be substantive, which usually requires 300 words or more
  • Your answer must be well written and well organized
  • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available. 

Post two replies to your classmates 

  • Your replies should be meaningful, which means they should engage your classmate in discussion focused on the forum questions. Usually this requires 150 words or more.

Roles in the Cyber Domain

Assignment Content

  1. The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning:

    Part A:
    Create 1- to 1.5-page summary including the following:

    • The number of additional employees necessary to rollout and support an IDS desktop solution
    • An explanation as to how individuals work with the existing desktop support and malware teams
    • The job title for those who normally perform rollout and support functions for the IDS desktop solution
    • An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution
    • Part B:
      Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following:
    • The job titles provided in your summary and how they fit in with the existing cybersecurity team
    • A list of the industry certifications the new IDS rollout-and-support-function employees should have or can work toward
    • Include citations as necessary in APA format.
      Submit your assignment.

movie war games

 

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Use at least three sources.  Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

DS wh-14

Please check the document attached and write at least 3 pages in APA format.

No plaigarism.

On time delivery.

Project paper – COmputer Science

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

1-2 pages, Essay on union find, I need it done in 5 hours

 Read the instruction and write an 1-2 pages essay. All instructions are attached. In the “union find assignment.pdf” there’s all the instruction. In the zip file, there are 9 programs I made. In the HW1. pdf, I drew a graph to indicate the results of each program, they show how each program unions. There are three big programs called quickfind, quickunion and weightquickunionfind. Each of these three programs has three different algorithms. Engineers first require to compare the efficiency and asymptotic bounds of each algorithm. Then, they compare the results from all kinds of algorithms in quickfind, quickunion and weightquickunionfind. The measure would be focusing on time efficiency and asymptotic bounds. Please write more about comparing. 

cyber kill chain

 

Pick a breach from the list provided and then explain in a 1,200- to 1,500-word report where the policy failed and/or where management failed to implement the policy. Make sure to address the following:

  1. What portion of the policy first allowed the Kill Chain to be effective?
  2. How can the implementation of policies be strengthened so a breach is not repeated?
  3. Were laws broken when the policy was not followed or even developed?
  4. What were the financial costs that occurred for the company?
  5. In the Bible, the story of David killing Goliath (1 Samuel 17:4) shows that Goliath has advanced bronze armor, but this armor is futile against a stone and sling. This gives us a lesson that our trust in technology to save us is not always warranted. Examine the application of the Christian worldview within the context of security breach and how it can be prevented.

Data Breaches

  1. Yahoo. Date: 2013-14.
  2. Adult Friend Finder. Date: October 2016.
  3. eBay. Date: May 2014.
  4. Equifax. Date: July 29 2017. …
  5. Heartland Payment Systems. Date: March 2008.
  6. Target Stores. Date: December 2013.
  7. TJX Companies, Inc. Date: December 2006.
  8. JP Morgan Chase. Date: July 2014.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

MIS Paper 2

Pick one of the topics listed below, write a 4-page paper describing the topic and recent developments (past 3 years).  

Mobile Marketing, Mobile Entertainment, Data Visualization, Supply Chain / Logistics Automation

 Provide a minimum of three scholarly reference in your paper (cited and referenced in APA format).

– Double space your paper
– The paper must use APA format (6th edition)
– Minimum of 4 pages, plus 1 cover (title) page, plus 1 page for references.
– Work must be original, no cut and paste.
– No word changing software such as Spinbot, Rephraser, etc. allowed