IT345 week 2b discussion

 

Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson.

related to this topic  

  • What is an inadvertent leak of information? How has it affected the adoption of technology?

Post your reply by Wednesday at midnight. Your response should be at least 300 words and appropriately cite your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see other posts until you make your first post.

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Security architecture and design Assignment

600 Words

Briefly respond to all the following questions. Make sure to

explain and backup your responses with facts and examples.

This assignment should be in APA format and have to include at

least two references.

As you consider the reputation service and the needs of

customers or individual consumers, think of a large

organization that are security conscious like a fictitious

enterprise named, Digital Diskus.

What will be the expectations and requirements of the

customers? Will consumers’ needs be different from those

of enterprises? Who owns the data that is being served

from the reputation service?

In addition, what kinds of protections might a customer

expect from other customers when accessing reputations?

Address these questions for this assignment.

IFG Case Study

Read the Consumerization of Technology at IFG Case Study on pages 239-242 in the textbook. Answer the Discussion Questions at the end of the Case Study. 

The response should be in APA format with in-text citations and Plagiarism free.

Total at least 800 words.

Text – Attached.

Format of APA- Attached.

Discussion Questions:

1. Describe the problem at IFG as succinctly as you can. Use this description to identify the main stakeholders.

2. IFG can’t afford the resources to identify, define, cleanse, and validate all of its data. On the other hand, building yet another data mart to address a specific problem worsens the data situation. Propose a solution that will enable IFG to leverage a key business problem/opportunity using their BI tools that does not aggravate their existing data predicament.

Need help in homework

Business Process Design

If you have been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure. 

Should have :

Introduction

Body

Conclusion

Power Point Presentation

Create a Power Point Presentation

 PIONEERS (  Tim Berners-Lee )  tell me about this person. What did this person do to become a pioneer? Did he/she invent something? What did they invent? What is the person doing now? What has this person accomplished? Be thorough with the subject. 

 PowerPoint Criteria For the PowerPoint you must:

 1- Research your subject 

2- Find photographs 

 3-  Your Presentation should not be your entire research assignment. o USE THE 7X7 RULE  7 lines per slide (maximum) 7 words per line (maximum) o This does not mean that all of your slides need to have 7 lines with 7 words .

Use key words and/or phrases to make your point o DO NOT crowd the slides with too much text or too many pictures 

 Use the NOTES Pages underneath each slide to include some information you are going to talk about if/when presenting in front of an audience. 

 The purpose of the presentation is to give details, information or teach about a subject. o You are NOT to read the slides 

 Be sure that ALL of your slides contain both text and pictures 

There should not be any slides with pictures only  

FORMAT the pictures/images that you’ve used 

 Be sure to include a slide transition 

Use the same transition throughout the presentation 

 DO NOT make the slides change automatically 

 Insert a Footer with Your Name and your Student ID number on all slides except the title slide 

 Be sure ti include a Works Cited slide with your video link at the END of the presentation. 

Use one of your images AS a background on one slide 

 Use shapes to enhance your presentation 

  DO NOT make the slides change automatically o The Presentation

 MUST have a minimum of 15 slides.  Slide 1: Title  Slides 2 – 14: Presentation  Slide 15: Work Cited, Links, Video Link and resources 

Executive Program Practical Connection Assignment

 Course : InfoTech Import in Strat Plan 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

question 20200915

  

1) Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or another list format. 

Do not use attachments as a submission. 

2) Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

3) Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class not a database class.