InfoTech Import in Strat Plan

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

IT-project management WK2 REGISTRY

 

You are working as a Desktop Support Specialist. Your work team has been given a computer with the instructions to rename the computer from John Martinson to Alison Rogers. John made his administrative password “password” and his administrative username is Admin; his computer’s name is “JohnLaptop.” He created a user account for himself, “John” and his user account password is “English!9&”. Your job is to perform all the following tasks via the registry. 

  1. Delete or rename the user account so that it is changed from John’s to Alison’s account.
  2. Create a new complex password for Alison.
  3. Change the administrative account to include a new administrative password.
  4. Change the computer name from JohnLaptop to Alison Rogers Computer.

Can you make these changes using the Registry?

  • Document the process you used to change the information.
  • If you could not perform the tasks using the registry then document the details of the process you used.
  • It is very important to document the steps excactly.

Agile software development security plan- 600 words

Length:  Minimum of 600 words .Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.   

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

2 Separate Discussion

  

Subject: Emerging Technologies

Textbook: MSTM-5023-M2A Emerging Technologies

Two Separate Assessments. Each 300+ words with Reference

Discussion 1

Chapter 9 Exercise.

There continues to be a disparity between the advertising dollars spent on reaching TV viewers and Internet users versus the amount of time that is spent interacting with each medium. A large degree of Google’s success is attributable to taking advantage of this large gap. Research to determine (a) TV advertising dollars and Internet advertising dollars spent, and (b) the amount of time spent watching TV versus using the Internet. How has Google taken advantage of this disparity? What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?

Your response should be at least 300 words, single-spaced. Provide references in APA format if necessary. The title page is not needed.

Discussion 2 

Chapter 15. Exercise:

An acquirer looks for a company with a good profit margin, a proven history, and a fair price. Choose an industry of interest and list five criteria for selecting candidates for acquisition.

Research and response to the above question in no less than 300 words, single spaced. Provide references in APA format. A title page is not needed.

Two Separate Assisments. Each 300+ words with Reference

Galaxy_Discussion

**********************************************************************************************************************

The beginning of chapter 4 has two pictures of galaxies. The study of the universe has been on-going for decades. One organization involved with this is the SETI Institute. You may remember this from the movie Contact. One area of their research is with exoplanets. Until 1995, other solar system with planets like ours was a simple conjecture. Now, this is a very exciting field of study. To do this, the scientists gather immense amounts of data from the telescopes. For their research, the goal is to find a planet which could, in theory, support human life. In this endeavor, the scientists would not be as interested in a gas giant, e.g. Saturn or Jupiter.

If you were creating a decision tree based on the telescope observations, please describe what the root node would be, possible internal nodes, and leaf terminal nodes. 

**********************************************************************************************************************

 Need 250 words with references and textbook is attached. No APA format required