procedure doc

 

Write a procedure document for CSI that documents how to change a password in a platform of your choosing.

The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases.  (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)

Text should be as understandable as possible and as non-technical as practical.  Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade.  Include a glossary where needed.

Visual aids should be included.  Screen captures or photographs are very helpful to the technically challenged.

For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.

Tips

This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.

Most students tend to get caught up in the editing process.  Getting a prototype document put together, including screen captures, is usually pretty fast.  Editing can be a time black hole so be mindful of that.

Ask a non-technical person to read one of your drafts.  If they understand it, and can follow it, you have succeeded.

Business Intelligence

When submitting work, be sure to include an APA cover page and include APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion

1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

4. What are the most common metrics that make for analytics-ready data?

Excersise 

5. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

Module 7 13-3

A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.

Please check for grammatical errors and don’t use books or journals as references. 

6

discusses the topic of recovering data.  For this week’s assignment, choose one of these tools for recovering deleted data or files.  Experiment with installing it…deleting something and trying to recovering it using the tool.  Then, write what you have learned and experience during this process.  Provide screen shots.  Was the process of recovering successful or not successful?  Have fun with this assignment! 🙂  

How to Design, Organize, Implement, and Maintain IT Security Policies

 

What binds well-formed IT security policies together is a sense of shared beliefs, purpose and urgency. Within your organization these can be achieved by establishing principles that create a shared vision, by empowering others to act and by institutionalizing support processes.  

1.Describe the processes needed for maintaining and updating policies and standards

2. Describe one security principle in which YOU think policy writers should keep in mind when developing security policies.  Why is this specific principle important?

Operational Excellence

Lenovo Company

Technological advances of the organization that makes the product or service viable. (2 pages)

i.What technology advances are key to this company?

ii.What is the physical layout of the company’s facilities? Does this impact their use of technology?

Cloud Discussion 15

 Review in 500 words or more the video above called Cloud Security Myths. 

 Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.