ACTIVE DIRECTORY RECOMMENDATIONS

Can Budget Max $10 for 3-4 Pages of work

  

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Can Refer

Ø Internet access

Ø Course textbook

Ø Format: Microsoft Word 

Ø Font: Times New Roman, size 12, double-space

Ø Citation Style: APA 

RP

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Answer should contain 3 pages of following

Abstract and Introduction, which includes industry discussion

Introduction Section – describing the industry chosen and potential resources to be used

Journal Week 3- Ethereum

 Chapter 9 introduces blockchain advantages in the artistic content creation and delivery business. Do you create or acquire artistic content? (art, music, etc.) Discuss how the changes covered in chapter 9 would affect you personally. Would adopting blockchain technology change your art production or consumption practices? 

1- Introduction

2- Chapter 9 introduces blockchain advantages in the artistic content creation and delivery business

3- Do you create or acquire artistic content? (art, music, etc.) 

4- Discuss how the changes covered in chapter 9 would affect you personally. 

5- Would adopting blockchain technology change your art production or consumption practices? 

Reference – Book author and others. 

Operational Excellence

 APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

1. Give two examples of technologies that have had a big effect on globalization. Use at least three unique references. Length: 4-5 paragraphs. 

2. What are some of the advantages of globalization? Use at least three unique references. Length: 4-5 paragraphs.

3. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics? Use at least three unique references. Length: 4-5 paragraphs.

4. Give an example of how NORA could be used to identify an individual. Use at least three unique references. Length: 4-5 paragraphs.

COM303 Week 4 Discussion 13

  

Choose one of the belief systems presented in the reading that you do not personally follow and consider their stance/belief about death. Which is most appealing to you? Which differs the most from your current belief system?  How does your current belief system ‘work with’ or ‘work against’ the belief system you choose to examine in this prompt? 

Executive Program Practical Connection Assignment – Information Governance (ITS-833-M23) – Full Term

Your team will conduct a literature review in Information Governance 

You can also conduct a literature review on information governance and how it is applied to an Information Technology organization. 

7-8 Pages of Content 

Literature Review needs to be written on the document which is attached below.

You are to review the literature on Information Governance planning and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection. 

As you read the literature, it will become apparent that there are multiple issues, pick one issue that stands out in the literature & agree on that as a Team to address that. 

Cover: Include the names of those who participated in the project 

Table of contents: Use a Microsoft Enabled Table of Contents feature. 

Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. 

Research Questions: In your identified problem area that you are discussing, what were the research questions that were asked? 

Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported? 

Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? 

Discussion: 

Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy plannin£!. What do you see as long-term impacts and what further research could be done in the field? 

References: Include at least ten scholarly references in APA format. 

Bid Response Proposal Presentation

  

Bid Response Proposal

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

  1. Deliver      a Bid Response Proposal to provide a business security solution to      prevent malicious or unauthorized use of digital assets
  2. Create      and implement effective policies to mitigate risks
  3. Deliver      a detailed list of security products and pricing
  4. Provide      safeguards for the information assets

Format:

Format for the project should be a 15 PowerPoint presentation with a budget sheet.

Critical Review

 

Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

You will also prepare a presentation of this Critical Review during the residency. The presentation should last about 10 minutes and Power Point is required. The presentation rubric provided under the Content Tab in the Getting Started folder will be used to grade the presentation. Follow the same format as the paper for the presentation. Power point is required and the presentation should last 10 minutes. The presentation is worth 50 points and the paper is worth 100 points.

Writing Requirements for all Written Work:

  • References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions (even initial discussion posts)
  • Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write more than the minimum requirement of the word count assigned
  • As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.