Cloud Computing

Project : Shared Technology Vulnerabilities

A 750 word summary of your findings. This must be appropriate graduate level work. Please, do not double space your submission.

Research Paper 10

search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Item

Information Technology

 

  •  Step 1: Find Sources
       In this phase, you will research information about each of your  careers, an ethical issue and an emerging technology. You want to find  out what a person in each career does but you also need to investigate  criteria for each career that we will use for evaluation. For each  career, you need to investigate the salary, education, hours, location  and passion. You should be able to find information on all the criteria  except passion. We are going to define passion as your desire to have  this career.
     
  • Look up the criteria for each of your careers on the Bureau of Labor and Statistics Occupational Outlook Handbook     
  • Look up the criteria for each of your careers on O*Net     
  • Look up the criteria for each of your careers on a site of your choice
  • Find at least one site that identifies an ethical issue(s) for one of your careers
  • Find at least one site that identifies an emerging technology(ies) for one of your careers
  • Keep all (9 or more) URL’s in a Word document using the Word reference feature.

      

  • Item   Step 2: Evaluate Sources
       

    Read  the information on this site which is the Evaluating Sources,  Evaluating Websites section of the  Research Tutorial. Look  at your sources from Step 1 and see how they meet the five basic  evaluation criteria. Replace those sources that might not be high  quality.

      

  • Item   Step 3: Create a Bibliography
       
    Create a bibliography (reference page) using the Word references  feature. Include each of your sources. Here’s the link  from GCFLearnFree on How to create a bibliography or works cited page in   Word. https://www.gcflearnfree.org/word-tips/how-to-create-a-bibliography-or-works-cited-page-in-word/1/ 
    Managing your references will be much easier if you use the same  computer; but if you plan to work in different locations, you will need  to move your sources. Here is a link that explains how to move  bibliography sources:
    http://blogs.office.com/2010/09/29/move-bibliography-sources/

      

  • Item   Step 4: Create an Annotated Bibliography
        
    You are required to use your sources as evidence in this research  paper. You will need to synthesize what you have read and then write  your paper. Read the GCFLearnFree.org tutorial Use Information  Correctly, Putting Info Together. Create an annotated bibliography to  force yourself to read each source and take notes on what information  will be needed to support the facts in your paper (career salaries,  ethical issue related to new technology, etc). See a sample annotated  bibliography in Blackboard. 
  • sample.

  

  

   

APA Annotated Bibliography (Haddad)Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2008).This paper follows the style guidelines in the Publication Manual of the American Psychological Association,6th ed.(2010).Arman HaddadProfessor AndrewsPsychology 10114 October XXXXPatterns of Gender-Related Differences in Online Communication: An Annotated BibliographyBruckman, A. S. (1993). Gender swapping on the Internet. Proceedings of INET ’93.Retrieved from http://www.cc.gatech.edu/elc/papers/bruckman/gender-swapping-bruckman.pdfIn this brief analysis, Bruckman investigates the perceptions of males and females in electronic environments.She argues that females (or those posing as females) receivean inordinate amount of unwanted sexual attention and offersof assistance from males. She also suggests that females (andsexually unthreatening males) are welcomed more willinglythan dominant males into virtual communities. She concludesthat behavior in electronic forums is an exaggerated reflectionof gender stereotypes in real-life communication. The article is interesting and accessible, but it is quite old, and it reliesalmost entirely on quotations from four anonymous forum participants.Crowston, C., & Kammerer, E. (1998). Communicative style and gender differences in computer-mediated communications. In B. Ebo (Ed.), Cyberghetto or cybertopia? Race, class, and gender on the Internet(pp. 185-203). Westport, CT:Praeger.This brief study examines how the dominant Gender and Online Communication 1Marginal annotations indicate APA-style formattingand effective writing.In APA style, eachentry begins at the left margin;subsequent linesindent 1⁄2″. The annotation begins on a new line and is indented 1⁄2″.Summary is followed by a shortevaluation of the source that notes its age andquestionable research technique.

Source: Diana Hacker (Boston: Bedford/St. Martin’s, 2008).communication style (masculine versus feminine) of an onlinediscussion group affects men’s and women’s desire to participate. The findings, while limited, provide evidence thatin fact bothwomen and men were less interested in joiningforums that were dominated by masculine-style language.These findings seem to contradict the pronounced gender inequality found in the other sources in this bibliography.Herring, S. C. (2003). Gender and power in on-line communication. In J. Holmes & M. Meyerhoff (Eds.), Thehandbook of language and gender(pp. 202-228). Oxford, England: Blackwell. Herring investigates empowerment opportunities forwomen online. She points out that, although more than halfof Web users in the United States are women, men continue to dominate technical roles such as network administrators,programmers, and Web masters. Even in anonymous onlinesettings, males tend to dominate discussions. And online“anonymity,” argues Herring, may not really be possible: Writing style and content give off cues about gender. Herring concludes that “the Internet provides opportunitiesfor both male and female users, but does not appear to alter societal gender stereotypes, nor has it (yet) redistributedpower at a fundamental level” (p. 219). The essay is well written and well researched, and it includes a long list of useful references.Herring, S. C. (1994, June 27). Gender differences in computer-mediated communication: Bringing familiar baggage to the Gender and Online Communication 2Haddad interpretsthe authors’ findings in relationto other sources inthe bibliography.A quotation fromthe author of thesource captures theessay’s main point.Annotations areroughly three to seven sentences long.

 

  • Step 1: Criteria
       Each class will set their own criteria and your instructor will post  these into Blackboard under Phase 3. Most classes will use salary,  education, passion, etc.; but you need to make sure you are using the  exact criteria for your class. You will use the criteria to evaluate  your careers.
      
  • Item   Class Criterias for Phase 3
       All Students must use these criterias.  See Below.
     
  1. Salary
  2. Education
  3. Experience
  4. Duties
  5. Security Clearance
  6. Advancement 
  7. Work Schedule
  • Item   Step 2: Evaluation Matrix
        
    Create an evaluation matrix in Excel that will let you compare the 3  careers side by side on each criterion. Refer to the tutorial  presentation about creating an evaluation matrix if needed. What should  be in the matrix is the 3 careers, the criteria to be used, how you  personally weigh each criterion. Divide 100 points among the criteria,  with the highest number of points going to the criteria that is most  important to you.
     
      
  • Item   Evaluation Matrix Tutorial
      Attached Files:
  • File Evaluation Matrix Example Criteria 17.pdf   Click for more options                                                                      (188.588 KB) 
  • Learn how an evaluation matrix is constructed. One of the most  important parts is developing criteria that will be used in your  evaluation. This presentation has some blank slides for you to practice  coming up with criteria for various decisions (not the one that is the  focus of your research project). Try coming up with your own criteria  before looking at the completed presentation below.
      
  • Item   Step 3: Rate Criteria
        
    Based on your research, rate each career on each criterion (on a  scale of 1 to 100). Again, refer to the presentation about creating an  evaluation matrix if needed. After you have rated all 3 careers, create  Excel formulas to calculate weighted scores using a mixed cell  reference. This will enable you to see which career scored best with the  raw scores and then which career scored best with the weighted scores.
     
      
  • Item   Step 4: Create a Chart
        
    Create an Excel chart worksheet. The chart may be the style of your  choice. It must give good information about the data in your worksheet.  Name each worksheet in the workbook appropriately. Submit your file with  both worksheets into the Blackboard assignment for this phase.

 

Discussion: Remote Access Method Evaluation

Learning Objectives and Outcomes

  • Explore and assess different remote access solutions.

Assignment Requirements

Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:

  • Identification, authentication, and authorization
  • Cost, scalability, reliability, and interoperability

NOTE: PLEASE ADD ATLEAST 3 REFERENCES. NEED DISCUSSION APA FORMAT. 

Practical connection assignment

Based on the below job duties we need to write the practical connection assignment for the Topic.

  

Job Description

·Provide leadership and guidance for QA engineers in the creation of a dedicated test environment and test data management practices for automation and performance testing of web applications.

·QA Management practices for automation and penetration testing of web applications

·Lead selection and standardization of automation tools and test environment, suggesting the best practices for automation which is to be implemented across the organization

·Lead the development of end-to-end test plans and processes to meet quality objectives and product requirements.

·Work on required documentation needed for the project adhering to existing process guidelines.

·Serve as an expert and knowledge source for the escalation of complex application design and development issues.

·Coordinate software installation/deployment activities and monitor the implementation verification process.

·Develop automated test scripts for the web interface and web services using Selenium WebDriver with Java.

·Ensure system performance by validating stability, scalability, reliability, latency, and response time of different products and applications.

·Participate in troubleshooting and triaging of issues with different teams to drive towards root cause identification and resolution.

  

Topic 1

How leadership theories can help in enhancing organizational success by influencing efforts directed at change management in information and technology management

Important note: The assignment should be of 500 words at least with proper citations and the Latest APA format. It should meet the rubric attached.

Physical Security – Research paper

Using proper APA formatting, write a 400-word discussion paper describing:

  • Physical Security mitigation for External Threats and Countermeasures.  
  • Search the Internet for an article for examples of physical security Physical Security mitigation for External Threats and Countermeasures.  
  • Why is Physical Security mitigation for External Threats and Countermeasures  ? So crucial in a data center?
  • Please cite at least two sources

Length: 2-3 paragraphs 

threat modeling

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin

Module 8 – Case Project 16-1

Write a code of ethics for an organization you belong to or a school you attend, and explain  the purpose of the code. Your code of ethics should have at least three items of expected ethical behavior.

Please don’t use books or journals as references.

resume

1. Submit your Resume Draft and Reference Page as one Word document. Please use the above resources to assist you in creating your Resume with Reference Page.

2. Submit your Cover Letter after reading the instructions on the attached document and review the template. Your cover letter should contain three paragraphs.

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following:  

Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive  incident. Discuss the challenges that organizations without proper Work Area Recovery Plan may face when disruptive events arise.

What are the benefits of performing Pandemic risk assessment in an organization?

The post should include adequate citations and references that adhere strictly to the APA format.