Executive Program Practical Connection Assignment

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course   Cryptography have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Computer Science

 

Required Resources

The following resources will be used to complete your assignment:

  • Microsoft Excel

You will analyze the data you collected and provided in your assignment last week. As you are working on each of the steps below, think about the analysis that you will provide to the research team. Follow the steps below to complete this analysis.

  1. Copy the file you created in week 5 and rename the new one “YourName_COMP150_W6_Assignment”.
  2. Open the file and duplicate the sheet where the initial table and data were created
  3. Rename the new sheet as “sorting & filters” and move it to the right of the original sheet
    1. Make the data look professional by using formatting options such as borders and table styles to place the data into a table.
    2. Select one of the text-based data columns such as names, cities, or addresses and sort the data by Z to A.
    3. Create a custom filter to any part of the data except where you did the sort. For example, if you sorted by the patient’s name, then filter another set of data.
  4. Duplicate the original sheet again and rename it as “conditional formatting”. Move it right after the “sorting & filters” sheet.
    1. Implement conditional formatting to any of the number-based data sets. For example, showing higher numbers in green, while showing lower numbers in red.
    2. Add an IF function and apply it to the entire set. For example, you could create a function that says if x number is higher than x number, then you are at risk. The purpose is to show how an IF function works so creativity is permitted in how you use the function.
  5. Use the “conditional formatting” sheet to create a pivot table.
    1. The pivot table needs to be on its own sheet.
    2. The pivot table needs to be meaningful so make sure to select data that will make it clear for your analysis.
    3. The pivot table should have data selected on the columns, rows, and values fields. Make sure to consider the data when adding the selection of the value
  6. Create a minimum of two charts. Make sure to select the right chart that explains your analysis. Each chart should be on its own sheet and should have a title. Make sure the purpose of the chart is self-explanatory just by looking at it.
  7. Update the documentation sheet
    1. Update the date.
    2. Add all the new rows for the sheets created.
    3. Provide a brief written analysis for each of the new sheets. Explain what you want the research team to learn about each sheet.
  8. Review all the sheets to ensure it looks professional. Try to keep the same style, colors, and formatting, Make sure the file is named “YourName_COMP150_W6_Assignment” and submit the file.

Grading

This activity will be graded based on the Week 6 Assignment rubric.

Course Outcomes (CO): 4

Due Date: By 11:59 p.m. MT on Sunday

 

Textbook Reading

Below you will find the textbook reading for the week. Remember to complete your reading by Wednesday to be prepared for the week!

Microsoft Office 2016 at work for dummies (Links to an external site.)

  • Sorting & Filtering – Chapter 10
  • Quick Analysis Tool – Chapter 8
  • Conditional Formatting – Chapter 9
  • IF Function – Chapter 8
  • Pivot Tables (Links to an external site.)
  • Charts – Chapter 11
  • Cell borders, shading, and formatting – Chapter 9

Signature Assignment

  • Assignment Requirements: Integration: One Piece of a Large Puzzle. 

Refer back to the Marseille Urban Planning Project article you read in the Week 1 Content folder within your course Documents and Resources. In this article, you can visually see how multiple departments came together using Esri’s CityEngine tool to create and implement an urban plan to restructure a city within a matter of months.

To complete this assignment, choose a large public works project, such as the construction of a new high school. For the public works project you can select any project – this could be a local project or a hypothetical situation (adding a city park, expanding a freeway, creating more housing, building a new commercial complex, adding a neighborhood school, building out a train system, etc.). 

Write a two page paper, using the newest APA formatting edition within a Microsoft Word Document, that identifies two phases that can be independent projects. Discuss each phase and discuss how each phase is an independent project and what makes them independent projects.  Specifically, state how each project meets the definition of a project, and describe the product, service, or result of each project, and why it is temporary.

risk assessment on Acme Enterprise

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment

concepts we have learned about thus far. Each of the areas of the infrastructure mentioned

above is where you will concentrate your assessments. After you have completed your risk

assessment, you will then provide recommendations for each area that you assessed to

reduce risk, exposure, and threat. Also, as part of your final submission demonstrate

through a redesign where your mitigations will take place within the architecture. You can

use the image below as guide for your risk analysis of each area.

AC – Discussion

 Discuss how Access Control takes into account human nature of their employees to protect the system. 

500 words

APA Format

Dissertation Topics , Due Date 26th September

 Discuss the below dissertation topics and brief introduction to the literature review(Find the attachment) as well as develop a PPT 

Topic:  IT Security and impact on Healthcare  in the Remote areas of Pennsylvania(USA). 

 

Develop a PPT. on the following:

What is your problem statement: What problems are you solving.

What are your gaps?

What is your theory?

What are your research questions ?

Note:  Minimum 4 pages  or 1300 words not including title and reference page  and  PPT need 5-6 slides . References should be taken from peer revived   

CYS-p-11!

 

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

Corporate email usage policy template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wirele

InfoTech Import in Strat Plan (ITS-831)

Research Paper: Business Process Redesign

Word count: 600+ words

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the reading resources below and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Chapter 5, “Information systems and business transformation.

Textbook: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

2. Chapter 5, “Information Systems and Digital Transformation”  pp. 109-121

Strutynska, I., Kozbur, G., Dmytrotsa, L., Sorokivska, O., & Melnyk, L. (2019). Influence of digital technology on roadmap development for digital business transformation. 2019 9th International Conference on Advanced Computer Information Technologies (ACIT), 333-337. Retrieved from https://doi.org/10.1109/ACITT.2019.8780056