I hope to help me answer the attached project file
Operational Excellence Week -3
In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found above (attached). Provide a detailed analysis of what is working and what is not working.
— 500 Words
Discussion
Endpoint Protection vs. Anti-Malware discuss the differences ?
CPSC 355 Project Part 1 – C file
Due Oct 22nd
Discussion
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
- Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
- Identify vulnerabilities and clear-text information transfer.
- Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
- Identify any opportunities for reduced ISP costs through port redirection or address translation.
- Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
- Create a professional report detailing the information above as supportive documentation for the network security plan.
- Create a report that includes a basic network diagram and research results.
Strategic IT Plan
Strategic IT Planning: Your 3-Step Process
Introduction
Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.
What is a Strategic Plan?
It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.
Making it Happen
There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.
• Take your time and keep it manageable
• Link your plan to your company’s strategy
• Justify your initiative and get buy-in and support
• Don’t re-invent, rebuild
• Go slow, manage change
• Set aside time from your operational responsibilities to make it happen
Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.
Why you need an IT Strategy:
Redirect from tasks to opportunities and result
• Switch from fighting fires to preventing fires
• Reduce risk with planning and a longer view
Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:
1. Why do you need to do it? What is your goal?
2. What are the things you need to get done to achieve your goal?
3. How can you make those things happen?
By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.
Implementation Plan
Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.
1. Set the objective for each step
2. Analyze internal/external factors
3. Develop solutions
4. Identify and eliminate barriers
5. Allocate resources (people, time, money)
6. Develop detailed tasks
7. Implement your plan!
Step Implementation
What Are The Roadblocks?
How Can You Overcome The Roadblocks?
What Resources Do You Need?
What Are The Timelines?
What Are The Main Steps To Implement Your Plan?
One Page outline of a Term Paper on are there any loopholes in the IT ACT 2000?
Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.
This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.
1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.
2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?
3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
4. Adequacies: Discuss the positive aspects of the law?
5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).
6). Conclusion: Why should and how can your proposal be adopted?
A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts, and reading
Use the information below to help with the outline for the term paper
Are there any loopholes in the IT ACT 2000?
Yes, there are many weaknesses and loopholes revolving around Information Technology Act, 2000 even after the 2008 amendments. They are as follows:
- ITA 2000 does not deal with Proper Intellectual Property Protection for Electronic Information and Data. Contentious yet very important issues concerning online copyrights, trademarks, and patents have been left unnoticed by the law, thereby leaving many loopholes.
- It does not pay any heed to Domain Name related issues. It does not deal with the rights and liabilities of domain name holders.
- It does not cover various evolving forms and manifestations of cybercrimes such as:
- Cyber theft;
- Cyberstalking;
- Cyber harassment;
- Cyber defamation;
- Cyber fraud;
- Chat room abuses;
- Misuse of credit card numbers.
4. It does not touch upon antitrust issues.
5. It is not explicit about the regulations of electronic payments.
And the biggest flaw is the improper implementation of the cyber laws as the police stations are not well equipped with the required technology and technical skills associated with them.
Assess an IT organization you are familiar with using the Balanced Scorecard approach.
Assess an IT organization you are familiar with using the Balanced Scorecard approach.
Be sure to
(1) address at least one KPI including hypothetical goal, measure and target for each of the four perspectives (financial, customers, etc.) in tabular format and
(2) draw or sketch out a dashboard for your scorecard.
Include a brief narrative (at least two sentences) explaining your specific scorecard as it relates to the organization.
You might want to review the below video first.
Experimenting and Testing (WEB ANALYTICS)
Please note, points will be deducted for overuse of citations.
please feel free to explore your own research for eBooks, journals and articles that best answer the topics and assignments. Do your best to locate resources that are no more than three (3) years old. PLEASE DO NOT USE WIKIPEDIA AS A RESOURCE AND OR REFERENCE.
Please submit a Word Doc with your answers in 500 words or more, and use APA references in support of your answers.
Some resources are attached for help, you may use that for help as well.
Explain in your paper how to build a successful testing program, demonstrate the importance of understanding user interactions.
Explain the importance of setting goals before you test. Explain how the web analyst should be aware of visitor site usability.
Include why a hypothesis is so important. Explain the importance of testing and settings goals and the hypothesis.
project 1
gaming application