Course Research Project part 2

  

Part II – Investigation and Review

In part II, you will closely study the materials found on the topic and conduct research to fully understand the relevant details. Based on your research and investigation, you are going to describe your understandings in the review. For example, if you chose “An investigation on Facebook privacy issues” as your topic, you should describe its privacy policies in detail and present different ways to enforce privacy in Facebook. As a result, at least 800 words are expected for this part. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. If you have used additional references in this part, be sure to include them at the end with the references from Part I. The second submission of the course project is due by 11:59 p.m. (ET) on Sunday of module/week 6.

IT Leaders IT Managers

 

*APA Format and Plagiarism Free. Answer below three questions separately with References and In-Text citations for every response. Attached Text.

Review chapter 12 course text. Atleast 900 Words.

  1. 1. In your own words, discuss the guiding principles for effective innovation.  

Review Chapter 12 in the course text – privacy and data quality must be managed properly in order to ensure a successful business model.

  1. 2. Discuss the recommendations that the IT managers group collectively provided.

  Review chapter 14 in the course text.

  1. 3. In your own words, discuss the steps to improving customer experience.

Analyze how advanced security concepts are applied to develop secure code

You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.

  1. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
    • What is the value of secure communications to the company?
    • Are there any international transactions that the company produces?
    • Are there governmental restrictions about secure communications to consider?
    • What external threats might be present now and in the immediate future?
    • What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
  2. Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.

*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.

  1. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
  2. Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
    1. The names or vulnerability codes of the known vulnerabilities
    2. A brief description and recommended solutions provided by the dependency check report
    3. Attribution (if any) that documents how this vulnerability has been identified or documented previously
  3. Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

*Please note: You do not need to fix these vulnerabilities in this project.

Assignment 2

write a research paper that explains how Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples. 

Requirements:

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)

Paper MUST address: How Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples.

Cited sources must directly support your paper (i.e. not incidental references)

At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

discussion 10/06

 

Topic: Review the culture at your organization and discuss the impact of how it would/did affect building the Interim Business Continuity Plan.

DQ requirement: I recommend your initial posting to be between 300 words. 

Conclusion of 100-words. 

Total of 400 words

All initial posts must contain a properly formatted in-text citation and scholarly reference.

IT incident response

 

  • Your team is an incident response team.
  • You have just learned that a webserver is displaying pages indicating that your systems have been hacked.
  • Utilizing your Incident Response Plan  detail a step by step response to this intrusion from beginning to end. Who, when, what, how are all required for each step.

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library ( https://libguides.nec.edu/az.php )not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Assignment

 Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for exercise 15).

question 1:

 Discuss the difficulties in measuring the intelligence of machines. 

exercise 4:

 In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.) 

exercise 5:

 Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

exercise 15:

 Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

 

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

TextBook:

 Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E.  ISBN: 978-0-13-519201-6