Cloud Computing

 

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history
  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)
  • Goals
  • Achievements

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

12-point Time New Roman font

Your paper should be typed and double-spaced with 1″ margins on all sides

The first sentence of each paragraph should be indented one tab space

Week 6

Due in Week 6 and worth 75 points

You work as a forensic investigator. A recent inquiry from a local company called TriGo has caught your attention. On a routine file audit of their servers, TriGo has found some files that appear to be “corrupt” because each file uses the .xde extension. When TriGo personnel try to access the files, they show as “garbage.” Search the Internet for this file extension and summarize your findings. 

Write a one-page report detailing your results. Include at least one tool or best practice you would recommend to this client. 

Employee Policy

Assignment Content

A policy should specify the kind of employees covered, the kind of health organization (clinic, hospital, etc.) it is for, and the Do’s and Don’ts when handling electronic healthcare information.

Create a 2- to 3-page policy for the employees of a health organization which protects the privacy and security of patients when handling electronic healthcare information. In addition the policy should discuss how legislation on the privacy of electronic health information has evolved and what the future of Health IT holds.

Create an accompanying 2-page Frequently Asked Questions (FAQ) document to anticipate some of the questions from readers of the policy and the answers to these questions. Be sure to include questions around how this new policy might bring up new security and privacy issues and how those could be resolved.

Payroll(casestudy)

  

Case Study:

You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.

Project Proposal in cloud computing – Research Methods

The project proposal must be on the topic: Carbon footprint reduction in Cloud Data Centers using natural direct air free cooling implementation.

At least 20 references needed. The citation and references should be in IEEE style.

The Project proposal document should be done in latex editors like overleaf. The corresponding pdf generated along with the latex code should be shared. Also, a ppt of the project proposal is needed. 

The required structure of the paper is attached. Also, a couple of previous sample have been attached for reference. 

Discussion 3 cryptography

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  How does this affect the way business is done? How have you used it?

You must use at least one scholarly resource.

– discussion posting must be properly APA formatted.

– 400 words

– No plagiarism 

– References

Computer Science

Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst case scenario and (2) the best case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst case scenario could learn from the best case scenario?

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count)