Week 1 Assignement

Required Readings for this assignemnt:

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs about 350 words, and using your own words, explain why ethical hacking is necessary in today’s complex business environment. Use only 2 in line citations. Added hyperlinks to references at end in APA format.

Note your Safe Assign score. Score must be less than 15 for full credit.

json and ajax

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words.

Portfolio project

Portfolio Project: 

Discuss a current business process in a specific IT industry. Note the following:

– What is the current business process itself? (approx a paragraph or two)

– What is the industry the business process is utilized in? (approx a paragraph or two)

After explaining the current situation, answer these questions…

1. Explain a new technology that the business should deploy. Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology). (write approx a 1 Page minimum)

2. State the pros and cons of the technology that was selected. (approx 1 Page)

3. State various factors the business should consider prior to deploying the new technology (approx 1 Page)

4. Write a Conclusion or Summary on the findings. (approx a paragraph or two)

5. There should be at least three APA (peer-reviewed) references to support your work.

Requirement: 

Minimum 4 pages for above submission.

Add cover page and reference page. The cover page and Reference page should be separate.

Use at least three (3+), APA & peer-reviewed references. Include in-text citations.

Put everything in the APA format. Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$20 max. Please bid if you agree.

web security

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples 

Discussion board

What are the consequences of an organization not having an information policy?

Post your response below and respond to at least one other student’s post. 

this is the student post i want you to reply to” If a company does not have an information policy, the simply have no control of how the data they collect is used, and cannot legally use it efficiently. The scale of the repercussions will depend on the type of business that they are as well as the size of the business.  For example, if it’s a data centric business, then they have lost the core of their business and will surely get run over by a competitor soon enough. However, if it is a non data centric business, some major consequences would possibly include other businesses not wanting to work with them, a loss of credibility, and penalties from data security regulators. Other less serious consequences that not having an information policy would entail would be an overall loss of organization in the respect of data, the company would have to establish to their customers what exactly they were doing with their information without the policy, which could result in legal problems“

Request for Proposal

 

Assignment Content

  1. This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. As a Senior IT Project Manager, your responsibilities may include proficiently working with a variety of technologies, conduct meetings with stakeholders, create and forecast budgets, and design project plans.

    The CFO of your chosen organization wants the organization to purchase and integrate six new web servers. The CIO envisions more business travelers using the Web to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed.

    Research information about your chosen organization to complete this week’s assignment.

    Create a 3- to 5-page (does not include title or reference pages) Request for Proposal (RFP) in Microsoft® Word for the CIO, which will minimize procurement related risks for this project. The RFP should contain the following components: 

    • Purpose of the RFP
    • Organization’s background as it applies to the use of the request for new web servers
    • Analysis of procurement risks
    • Methods for managing procurement risks
    • Basic requirements for the current and new hardware and software
    • Software and hardware environment 
    • Statement of work/Requirements and schedule information 
    • Process for evaluating the RFP 
    • Include APA-formatted citations when necessary.

Case Study: Transforming the Organization

Case Study: Transforming the Organization 

Use the Week 5 Case Study Template to complete this assignment. 

Congratulations! The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works.

The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running. Please also review the five case studies in The Leader’s Role in Managing Change so you can recommend a change management pattern for your company to follow. 

Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics:

  1. How much of the implementation work can you handle? What additional resources (people, information, time, money, etc.) will expedite the process so you don’t end up like Susie Jeffer?
  2. What is your change management strategy? Provide an outline. Consider:      
    • What new equipment and software are necessary?
    • What training and support will the staff need?
    • How will the staff complete their work during the transition period?
    • Do you anticipate other areas of resistance?

The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations!

Your memo should be 3–5 pages long.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Develop an information systems solution to address an organizational problem.
References

Brett Connelly. 2016. Too Much of a Good Thing: User Leadership at TPAC. https://files.eric.ed.gov/fulltext/EJ1136256.pdf

Kallol Kumar Basu. 2015. The Leader’s Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, vol. 34, no. 3, pp. 28–42. 

Item

BSWA 8

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words, NO PLAGIARISM. 

 

  • OverviewThis week’s class covers Database SecurityPrinciples
    This week’s topics:

    • SQL Injection
    • Setting Database Permissions
    • Stored Procedures
    • Review this week’s lab discussion
  • ItemRequired ReadingsRead Chapter 7 of the Sullivan text, Database Security Principles
    Primary topics:

    • The Dangers of Detailed Errors
    • Validating Input
    • Single Account Security
    • SQL Injection in Stored Procedures
    • Insecure Direct Object References
  • Web LinkRequired VideoSQL Injection Tutorial
    Click HERE to watch embedded video below.
  • ItemRequired VideosDo Stored Procedures Stop SQL Injection

    Click HERE to watch or click embedded video below.