Topic name: The vision of Airport Security.

Thesis statement: We Believe Artificial Intelligence is going to be the future of security at the Airport. It will immensely reduce human interaction thereby enhancing protocols.

Requirement :  

Your research should include speculation on where the state-of-the-art will be in the near future for one

of the following technologies. The group paper could include a description of the state-of-the-art in

physical security technology, a discussion of where the sources that you read believe the physical

security technology is heading in the near future, and a discussion of how this technology will affect the

choices you would make if you were making purchase recommendations for a client. Although there is

room for personal opinion in your paper, you must justify your conclusions.

The team needs to consider all the possible roles that need to be supported in this organization that

includes Access Control with CCTV Cameras, Surveillance cameras, Facilities Security Plan, Biometrics,

Glass, Window, Fences, Chain-Link Fence Standards, Floor Plan, and customer support.

The overall assignment is to develop a comprehensive plan for this fictitious organization in a form that

would be appropriate for a Word Document and as a PowerPoint slideshow for management. You may

consider this as the means of presenting your conceptual plan.

Physical Security -Reflection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Note :Please write based on the attached Textbook

Assignment

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Assignment Link: http://book.visualisingdata.com/chapter/chapter-4

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

E-Commerce and Micropayments

  

This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).

An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:

1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credits some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.

2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.

The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.

Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)

Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe / explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Security Overview Presentation

 

Create a 10- to 12-slide, multimedia-rich presentation in which you provide:

  • A definition of cybersecurity and further explain how cybersecurity differs from enterprise security
  • A timeline of cyber milestones, including graphics and a brief explanation of the milestone
  • An explanation of why knowing cyber milestones is important for improving security for the organization’s current and future environment
  • A chart presenting 4 strategies that could be used to determine the organization’s current security environment, the impact of the strategy, and resources (personnel, finances, etc.)

Your presentation should also include:

  • Speaker notes
  • At least 2 references to support the presented facts/etc. Format your citations according to APA guidelines.

Note: “Multimedia-rich” presentation typically means including several of the following: appropriate charts, graphics, video or audio samples, or images

Ethical hacking

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

assignment should be 3-4 paragraphs in length.

Executive Summary

 You are a member of the IT team at Don & Associates, a financial  consulting company that provides services to small- and medium-sized  companies. Because the company is looking to expand into neighboring  states within the Northeast region, its leaders have tasked you  with determining if cloud computing is a viable solution to the need for  infrastructure.

 

you will be submitting a one- to two-page executive summary to the  owner of Don & Associates. It should briefly explain the major cloud  service providers, cloud computing service models, and the potential  benefits and risks of migrating Don & Associates’ technical  infrastructure to the cloud.

Use this executive summary template. In  the template, you will see specific instructions in the document.  Delete the instruction text before you submit your project.

Your summary should include: 

  • the types of cloud computing (private, public, hybrid)
     
  • three major cloud service providers
     
  • three cloud computing service models 
     
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud
     

Be sure to cite any sources you use.

Template

  

Project Description

Include the name of the project here.

Statement of Need 

Explain what the company is struggling with and how the company could benefit from moving to the cloud.

Cloud Service Providers

Provide an overview of the top three cloud service providers. List the services offered and briefly describe the advantages and disadvantages of each provider.

Recommended Plan

Provide your recommendation for a cloud service provider and justify your selection.

Impact of Recommended Plan 

Describe how your recommended plan will address the needs of the stakeholders. Briefly describe the potential risks of migration/potential drawbacks for the company.

References

DISCUSSION

 

Being an Effective Agile Project Leader

You have been asked by your manager to document your experiences as an Agile project manager so these can be shared with others.

Write a 6–8 page paper in which you:

  1. Explain how to handle the documentation needs using the Agile concepts.
  2. Determine the necessary success factors one would need to become an Agile leader in this project, which contains a complex scope and extended timeline.
  3. Recommend the approach to manage offshore resources in this project. Determine the associated challenges and mitigation strategies to ensure the success of the project.
  4. Suggest strategies for measuring the performance and quality of the products and services of this organization. Provide the approach to accelerate the delivery process.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.