Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

CLOUD COMPUTING (IN)SECURITY

1. Do some Internet research to identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn from the negative experiences of these businesses?

 2. Do some Internet research on security mechanisms associated with virtualization. How can virtualization be used by cloud service providers to protect subscriber data? 

 3. Choose one of the following cloud services categories: SaaS, IaaS, PaaS. Do some Internet research that focuses the security issues associated with the selected cloud service category. Summarize the major security risks associated with the cloud service category and identify mechanisms that can be used to address these risks. 

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout. 

Practical Connection Assignment Reflection

Practical Connection Assignment Reflection on INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING. 

How gained knowledge in INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING subject help you when you are working as a quality assurance analyst in the healthcare organization?

How you will apply what you learn to your current job?

Operational Excellence

practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

CLA2 – CLO 1, CLO 2, CLO 3, CLO 4, CLO 5

 Summary:

CLA2 – CLO 1, CLO 2, CLO 3, CLO 4, CLO 5

In a 4 – 6 page paper based on your internship course experience and the learning objectives achieved during the course, review your internship experience successes and challenges leading to growth. You should demonstrate in your paper a description of your professional portfolio and include any evidence of accomplishment and skill development or recognition that you have acquired this session and how it will contribute to your portfolio.

Provide at least two (2) peer-reviewed sources. If you have completed this CLA2 assignment in an internship course prior to this class, select new examples and sources to support your response. For questions, contact your instructor.

Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment, Memo and discussions

1.Assignment – Input Form Assignment

identify and apply the different analysis and design methods for business applications.

Use Wufoo to develop an input form using some of the key fields from your project. Copy (or take a screenshot of) the design and paste it into Word document with a title page. 

Provide the resulting URL as well.

Criteria: Design incorporates good choice of colors, text, font, arrangement, and evidence of possible navigation (as in a “submit” button).

Your essay should be 3 pages in length and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required). 

Relate this weeks assignment and discussions to your work in office/organization.

3.Discussions

1) Why is content awareness important? 

2)UX Design Principles – Explain three important user interface design principles.

Each discussion should have atleast 3 paragraphs, 2 inline citations, 2 references. Due by 11/16/2020 .

Plagiarism should be very minimal. I may ask for changes if required.

Discussion

Instructions

Write 1 thread of at least 300 words on the topic below. Also, reply of  at least 150 words to the thread below.

Topic

Research and develop a thread that compares and contrasts Firewalls and  Virtual Private Networks. Your thread must include: an introduction  statement/paragraph, body paragraph(s), and a conclusion  statement/paragraph.

Reply

When  thinking about the security of a network it is important to have all  connections with the outside world covered. This can be done with many  different components including a virtual private network (VPN) and a  firewall. These two are similar in the fact that they are designed to  stop threats from external entities. In order to have the best chance of  keeping your systems safe, it is best to have a complete VPN and a  complete firewall. Prior to beginning my college career, I thought that  these two terms were synonymous. However, I have learned that they truly  are two different, and very important, entities. 

 A  firewall is defined by our textbook as a border sentry device, much  like a security guard, that filters the flow of traffic examining every  incoming and outgoing packet then deciding to accept or discard it  (Gouda & Liu, 2007). Since firewalls are ultimately software code  written by humans and therefore the possibility will always exist for  mistakes or oversights. While a firewall is the filter that protects  your network from external threats, a VPN is what allows the connection  onto a network to remain secure through encryption and authentication.  This allows the VPN to provide confidential privacy protection for all  of the network’s communication. In order to be at its most efficient  level of security, telecommuting employees, businesses, or travelling  workers should utilize a host firewall along with a VPN to maintain  secure connectivity while at a distance.

 God  and his word act as our firewall from the things in the world that can  harm us. Zechariah 2:5says “And I myself will be a wall of fire around  it and I will be its glory within” (NIV). He will protect us and keep us  away from harm. I also think of the VPN as the constant flow of God in  our lives. If we constantly pray over the protection of others, then  evil will be unable to reach us. 

Discussion on Select one component of either project composition or chart composition and discuss.

 Note:- Question and Text Book attached. 

Composition deals with the overall readability and meaning of the project.  As noted by Kirk (2016), the topic of composition is divided into project-level and chart-level composition. Select one component of either project composition or chart composition and discuss.

  

Select one component of either project composition or chart composition and discuss.

Page- 360-364

1- Project Composition

    a- Wireframing

    b- Storyboarding

2- Chart Composition

    a- Chart size

    b- Chart scales

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.

Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.