ITS 350-1 Portfolio project

 

Option #1: XYZ Corporation

XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

  1. A plan to provide secure Access Control Methods for all user access
  2. A viable Password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to the CSU Global Writing Center (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU Global Library is a good place to find these references.

Security Architecture and Design

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1, Business analytics logical data flow, from your textbook. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Research Paper

 

Mindset

To help you add more insights into other issues that you need to address you need to think about your topic as if your manager told you that you needed to fix the issue and answer the following questions: 

  • What does the organization have to understand about this issue to really address the topic of Ransomware with hospitals?
  • What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a cybersecurity breach emergency response plan?
  • What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a business continuity plan?
  • What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a crisis communication team and plan? 
  • What are the potential consequences for organizations that do not have a cybersecurity breach emergency response plan? 
  • What are the potential consequences for organizations a crisis communications team and a plan? 

Research

Literature review 

Remember, many of these theories and concepts can come from your course text or from university on-line library from articles that you get using the following search terms. Present 8 to 9 pages of theories, models, and concepts describing how you fix or address the problem in the selected case study.

Suggested Search Terms

  • Ransomware in healthcare
  • Electronic health records security
  • healthcare information security
  • Strategic planning
  • Business Continuity Planning
  • Disaster Recovery planning
  • Crisis Management
  • Crisis Communications Planning
  • Kotter Change Management Model
  • Agile Project Management
  • Organizational Planning
  • Organizational Development 

Tasks

Write your first draft consisting of 7 to 8 pages describing the following aspects of your solution. 

  1. A cybersecurity breach emergency response plan. 
  2. A business continuity plan to address this issue now and in the future. 
  3. A crisis communication team
  4. A crisis communications plan
  5. The benefits to the organization of these plans and final conclusions 

Submission

You are required to write at the graduate level with meaningful writing. Your paper should be in the following format:

  • APA Style
  • A cover page and Reference page
  • double spaced 12 point Times Roman New in APA format. 
  • A minimum of 10 to 15 different references, which could include your course textbook (the final paper requires 20 different references).
    • majority of your reference should be scholastic resources
    • Wikipedia  is not an acceptable source of reference 
  • Paragraphs should be written in the MEAL writing style for clarity in terms of making the argument. See the resource page in this course.

its531_wk2analysis

4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni-tion product.

Implementing Open Addressing, is ready.

 

Develop an algorithm to search and remove data from a hash table using the open addressing technique.

Aim

Implement a hash table using open addressing with linear probing.

Prerequisites

To solve this activity, you have to implement the following methods in the OpenAddrHashTable.java file:

    public void put(K key, V value) {
        //...
    }
 
    private int searchPosition(K key) {
        //...
    }
 
    public void remove(K key) {
        //...
    }
 
    public Optional get(K key) {
        //...
    }

Steps for Completion

  1. Study the pseudocode shown in Snippet 3.3 and Snippet 3.4 (shown below) and implement them in Java.
  2. The container class OpenAddrPair will hold your key and value in the hash table.
  3. Have a flag on this container to indicate when an item is deleted.
  4. Use this flag in the put operation to overwrite it if it is deleted. You can use this flag to optimize your get method using the filter method.
insert(key, value, array)
    s = length(array)
    hashValue = hash(key, s)
    i = 0
    while (i < s and array[(hashValue + i) mod s] != null)
        i = i + l
    if (i < s) array[(hashValue + i) mod s] = (key, value)

Snippet 3.3: Psuedocode for inserting using linear probing

search(key, array)
    s = length(array)
    hashValue = hash(key, s)
    i = 0
    while (i < s and array[(hashValue + i) mod s] != null and array[(hashValue + i) mod s].key != key)
        i = i + 1
        keyValue = array[(hashValue + i) mod s]
        if (keyValue != null && keyValue.key == key) return keyValue.value
        else return null

Snippet 3.4: Solution pseudocode for searching using linear probing

Grading

Complete each task listed below. Each task contains automated checks which are used to calculate your grade. When you have completed each task by clicking the checkbox, open the task list panel on the left navigation bar and click the “Submit” button.

Tasks

New OpenAddrHashTable objects are empty.

1

Implement the following methods in the OpenAddrHashTable class:

  1. put
  2. searchPosition
  3. get
  4. remove

Practical connection assignment

Assignment:

Subject: InfoTech Import in Strat Plan
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

IISP DISCUSSION-5-dummm

 Read the topics of content in the attached text book and write this assignment how the knowledge from this text book can help you in your workplace if you’re working now or finding employment.

 Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. You should have at least two scholarly sources supporting your write-up.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).