Discussion question – 350 words, 2 references

 Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology. 

Assignment

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

Physical security 7

 

Search the Internet for an article where physical security failed:

  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 5 full pages double spaced (not including your required cover page, reference pages, abstract, or table of contents)
  • No photos or graphs
  • Reference all sources used
  • Your paper must be APA formatted (including a separate cover page and reference page) 
  • Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section

Security Portfolio Assignment(Min 600 words)

Question for Week7:

 

In week #4, your midterm project was to provide a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

1. Cover Page (i.e. APA title page)

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Week #4’s Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.

This assignment should be about the security needs only.  Do NOT discuss how the client can achieve more business (That is not your job). Please use  APA format and include at least two references.

Other references:

Below is the question for week4 assignment

 

Vestige, Inc. is an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time.  Since you have spent the past several weeks in training to be a System Architect, perform your assessment:

Hint: Review your assignments from week 1-3

This assignment should be in APA format and have to include at least two references.

Week4 Assignment Attached:

Hearsay Rule

 Do a bit of research on the hearsay rule in legal proceedings. In your own 250 words, explain the hearsay rule and describe how it relates to the concept of an expert witness. 

Homework

  

Please be sure to answer the questions fully and in essay/short answer format. There should not be any 1 or 2 word/sentence responses to any of the questions. Use your own words. Copied answers will NOT be accepted.

assignment 1

 Search the web to find a Cloud provider. Now search the companies website to answer as many of the questions you provided below. Atleast 50-100 words

  1. What are the models of delivery?
  2. What security measures offered?
  3. Does iCloud support external collaboration? How?
  4. Is the solution secure?
  5. What capabilities are offered to facilitate mobile growth?
  6. What capabilities does the cloud offer?
  7. How will the solution influence the corporation’s operations, especially the information technology department?

Share the name of the Cloud provider and the answers to the questions with the class.

Linux Environment

There is attachment ,In which you ll know how to do this …..

Lab #1-1 The Linux Environment

In this lab you will learn about the environment you will be using to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.

The first lesson is getting into the ssh environment to access the lab area.

Refer to the attachment lab work 1-1

Lab #1-2 Navigating the Linux Environment

In this lab you will learn how to navigate in the environment you will use to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.

The second lesson is navigating the Linux hierarchy.

Refer to the attachment Lab work 2-2

Writing Requirements

  • Use the APA template located in the Student Resource Center to complete the assignment.
  • You will keep notes on each lab these lab notes are your responsibilities

wk8.2 research paper

 

Use standard APA writing and the application of the Blooms taxonomy(highest level of analysis) to answer the following questions. 2-4 pages to each questions without the cover page and references.

Approach this from a research perspective, apply what you have learned from this course and add other resources as applicable. Find 5 -7 Scholarly papers to support your response to each question.

2. You have just been named the Project Manager of IT Governance Enterprise Wide Initiative within a company. who do you think should own the Project, the Chief Information Officer (CIO), Chief Security Officer (CISO) or Chief Operating Officer (COO) and why?

Define and relate these different terminologies and Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG), E-Discovery, Digital Assets; how do you see IT Governance evolving in the next 5 years? What framework will you adopt to in implementing the IT Governance Initiative, and demonstrate its applicability. 

Dissertation Outline cyber security

In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with.