Assignment – Security Architecture and Design

 

Answer the following question. Use facts and examples to support your answer. Use APA style for any references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

shorturl.at/syGPR 

select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5

Write at least 500 words analyzing a subject you find on https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Write in essay format not in bulleted, numbered or other list format. 

Business Strategy d3

1) Consider the potential conflict between corporate social responsibility and ethics while maximizing share holder wealth.  How does exercising Christian principles play a part in running a successful business while operating within state and federal regulations? ( 350 words) 

2) 1 reply of 150 words

Access Control assignment 2

 Discuss the the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the template to write your paper.

Practical Connection Assignment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Assignment

 

Complete the following assignment as a single MS Word document. Only a Word document will be accepted. 

Chapter 2 – Discussion question #1 &
                    Exercise question #4 &
                    Exercise question #5 &
                    Exercise question 15 (limit to one page of analysis for question 15)

When submitting work, you MUST proceed each of your answers with a heading line that shows the Chapter # and the Question #.  Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

MIS Assignments

 

View the following videos on Customer Relationship Management

(1)  Introduction to Customer Relationship Management (CRM)

https://www.youtube.com/watch?v=3JqgiLRhYHw   (4:21)

(2)  Why CRM? 

https://www.youtube.com/watch?v=hmc4kF4o6Ek  (2:53)

Please answer the following questions.  The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive.    

1–  Explain what these videos are about. 

2– What is Customer Relationship Management software?

3—What are some of the ways that businesses can utilize CRM software? Provide 3 examples and label them as follows:  3a, 3b, 3c.

4—Provide 3 examples that state how you, personally, have interacted with companies using CRM software. Label these examples as:  4a, 4b, 4c.