ERP System 2.0

You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two or three alternative strategies, and explore related examples of situations for which each approach would be preferred and required.
1000 words 

IA week4 DB

 

Hello,

i need this paper by 09/16 afternoon.

Strictly No plagiarism please use your own words.

Describe each of the elements of a Business Continuity Plan (BCP).

An initial post must be between 300 words

Strictly No plagiarism make sure even the reference are unique.

BE D4

 

Discussion:

How would you describe that factors that determine the tone at the top?

Should be 250-300 words with references.

Should be in APA format

Response

 

two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Week Research Paper 3 – Info tech

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat hunting– Research paper

Your team currently works as a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:

  • Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2:  You will provide this answer based on your research.
  • Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
  • Step 4:  You will provide this answer based on your research.
  • Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
  • Step 6-7:  Calculate
  • Step 8:  Assume Moderate
  • Step 9:  Assume Moderate
  • Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

The paper should be based on ” There is an uptick in port 8080 according to SANS Top 10. Why is that being targeted currently? “

Note: See the attachment

discussion

 Discussion  (Chapter 6): List and briefly describe the nine-step process in con-ducting a neural network project. 

 Your response should be 250-300 words.  Respond to two postings provided by your classmates. 

How these courses are useful for work

  

1. Operational Excellence

2. Information Governance

3. Data Science and Big Data Analytics

4. InfoTech Import in Strat Plan

5. Emerging Threats and Countermeasures

6. Cloud Computing

7.InfoTech in a Global Economy

I want to some points for these will useful for my job duties

1. Azure Cloud storage

2. Dynamics CRM(Customer Relationship Management)

3. Developer

  • JavaScript
  • Angular JS
  • JQuery
  • HTML/ HTML5, CSS
  • SharePoint
  • SSIS & SSRS