InfoTech Import in Strat Plan (ITS-831)

Discussion: Business Strategy

Word count: 300+

Things to be included in the discussion:

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Text book: 

Managing and Using Information Systems. Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta. Publisher: John Wiley & Sons

1. Read Textbook Chapter 1:  The Information Systems Strategy Triangle

2. Dent, A. (2015). Aligning IT and business strategy: an Australian university case study. Journal of Higher Education Policy & Management, 37(5), 519–533. Retrieved from  https://doi.org/10.1080/1360080X.2015.1079395

APA format, Plagiarism check required, good work

Project with 3 to 4 papers

 

Part 1: Introduction to the Problem

During this course you will complete a series of projects that will help you understand the components of a research study. You will do this by writing a proposal that supports the extension of a previously published research project. (You will not actually conduct the research; you will be developing a short proposal that explains the need to extend the research.)

Using the ACM database in the Library Portal, find a study related to an area of Information Security that you are interested in to be the basis for your projects for this term. The study can be quantitative or qualitative, but needs to address a problem that you are familiar with. In the conclusions of the study, it should indicate areas for further research.

In Part 1 of the project, you will write a short introduction to the research proposal (3-4 pages) which includes the following:

  • A description of the problem that was addressed in the selected study
  • A description of the study population and the sample
  • A summary of the previous findings
  • A description of an area of research suggested by the author for further research.
  • An explanation of why this extension of research could be important or how it might yield more insight into the problem.

Network Design

 

instructions

  1. Network Topology (15 points): Describe in 2-3  paragraphs the network topology that you have selected. Explain why you  chose the topology, and how it will help you to meet your project needs 
  2. Technology Budget (10 points): Based on your needs  assessment and technology requirements listed during week 2, what would  be your total expenses needed to fully implement this network (outside  of the virtual environment?) You should be able to use the URLs that you  used in last week’s assignment to gain easy access to the prices. 
  3. Network Diagram (25 points):  Using Visio, or a similar charting tool, create a DETAILED network  diagram. Be sure to include your selected network topology, specific  hardware, software, IP addressing, networking and security standards,  selected services, etc. All components should be CLEARLY LABELED.   Week 3 Assignment 
    Use the attached template “IT491 Week Three Assignment” template for this week’s submission. 
     

Discussion 07/03

 

Here is a questionnaire for you to take on your “Influencing Style”. Provide feedback on how it relates to you and your style. How might you use your style with organization management? How does your style prepare you for operations strategy?

FTT-InfluencingSkillsFinder_v1.0.pdf

You will be writing three or more discussion posts per week. Your main post must be three to four substantive paragraphs (400+ total words) and include at least one APA-formatted external citation/reference.

Vulnerability Assessment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.

Assignment 1 Vulnerability Assessment Template.docx

Also review the additional files attached for detailed information on Vulnerability Assessments.

Cloud Computing and Digital Forensics

1.) Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. 

authentication

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Research Paper

  1. The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 
    Start your paper with an introductory paragraph.
    Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 
    Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
    Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Create Wiki

 

Wikis for Learning and Collaboration

A wiki is a collaborative web site that collects and organizes content, created and revised by its users. The most well-known example is Wikipedia. Wikis are a way to grow a knowledge base around a particular content area, be it best practices in a particular field or how to use a specific piece of hardware/software. A hallmark of Web 2.0 is that it improves as more people use it and this approach underlies wiki-based learning. It is based on the idea that within any enterprise, a great deal of knowledge exists among the members. Sharing this knowledge and information can raise the organization’s intelligence level, be it a university, an association, a corporation or club.

How simply awareness can help with security countermeasures?

Conduct your own research and post a short relevant summary of your findings. ( Post current information, not older than five years ). Use not more than three (3) references.

You must provide AT LEAST 2 substantive comments on other student’s views.