Disaster Recovery for Cyber Security

Individual Assignment.

Both Deliverables: Post in Discussion Board.

(1) Prepare a list of four (4) Back-up and Disaster Recovery vendors.

Vendors: https://solutionsreview.com/backup-disaster-recovery/backup-and-disaster-recovery-solutions-directory/

Provide a brief description of their services.

Create a grid of them and compare and contrast them. 

(2) Disaster Recovery – AWS Outage 

Disaster Recovery Preparedness

At 9:45 AM (PST) on February 28, 2017, Amazon reported a severe degradation with Amazon Web Services (AWS). Many companies and organizations rely on AWS for their infrastructure. As a result, the incident created a highly-deprecated experience for customers. 

Many companies engineering teams worked through this outage and restored services using an alternate site. 

Companies are continuously enhancing/improving their back-up and disaster recovery readiness. Organizations learned from this incident to mitigate the risks associated with large scale outages from their service providers.

Using Internet resources, research and answer the following questions using MS Word/PDF:  

1. When did the AWS outage start and how long did it last?

2. What was the root-cause of the outage?

3. About how many sites were effected and what are some names of the larger companies?

4. When was the last time AWS was down prior to this incident and what was the root-cause?

5. Has AWS been down since this incident? If so, when, for how long, and what was the root-cause of the outage?

6. What can AWS do to prevent an outage again?

7. Briefly describe the AWS Shared Responsibility Model

8. What can a customer of AWS do to continue uninterrupted computer operations?

9. See this link on Barracuda Security for AWS: https://www.barracuda.com/programs/aws

If you were a customer of AWS, would you consider implementing Barracuda Security for AWS? What security features and why?

10. Prepare a high-level diagram of the AWS infrastructure and pinpoint in the diagram where the root-cause of the security vulnerability occurred.

Grading – 15 Points broken down as follows:

– 5 Points – The details in Deliverable 1

– 10 Points –  The details in Deliverable 2

Discussion

 Using examples in this book or online, describe a project that suffered from scope creep. Could it have been avoided? How?  

Business intelligence Discussion Questions

Question 1:

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Question 2:

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

-each question with 500 words and 2 references in apa format

Discussion board

 

Hello,

i need this paper by 07/01 afternoon.

Strictly No plagiarism please use your own words.

Please identify the five approaches for controlling the risks that result from vulnerabilities and provide a unique example for each approach.

In order to receive full credit for the discussion posts, you must include at least two citations (APA) from academic resources with a 300-word minimum.

Here is a link to an https://owl.english.purdue.edu/owl/resource/560/01/

Strictly No plagiarism

IT STrategy – Building BI and enabling IT

 

Total at least 900 words.

Text – Attached.

Format of APA (in-text citations with references )- Attached.

Review chapter 16 in the course text.

1. In your own words, discuss at least three 3 steps for facilitating effective collaboration.

Review chapter 15 in the course text.

2. In your own words, discuss the several ways of improving business intelligence.

What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management?

  1. What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management? 2. How can blockchain technology improve employee safety and security? You are required to cite this week’s assigned readings in your paper. 

 

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words

 Your response should be formatted in APA style and reference 

 

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

 

Project Report

  

Requirements:

1 Building Application: No restrictions on the technology you can use any technology that meets the requirements)

2 SQA Plan (SQA_Plan_Template_Long)

3 Requirement specification (SQA requirement template)

4 Software design document (Software Design Document)

5 Implementation plan (Implementation_plan_template)

The Documentation should contain the following:

• Project schedule document

• Requirements Specification Documents

• Software Design Document

• System Implementation Plan

• SQA Plan

• Risk Management

• Testing documents Unit testing, black box testing usability testing performance testing

• SQA Test Case Report

• Calculate Halstead’s volume calculation

• Zipped source code

what to submit ?

1. Zip the code (project) into a single file named surname(s)_CWK2_code.

2. Prepare a README file containing the name (or names) of the students and their specific contributions, and any specific instructions for installation/configuration/ that are needed for your website, and for technical documentation.

3. A Power Point presentation containing a summary of the work and snapshots of the developed website 

Please find attached templates 

ET WK 7 Research paper

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately 5 (full)pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

OLDM W 1 D

 

please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Table 1.2 is in the attached pics