Mini Paper

 My Topic is a:- a comparison of authentication mechanisms

 Research topic.  You must  include at least four primary, peer-reviewed sources in your  bibliography.  Additional sources of varying standards can also be used.   However, these four must be specifically cited.  An un-cited source  should not appear in your bibliography.

A primary source is the original material. If you are directly  quoting the words of an author, that is usually a primary source.  However, if you are quoting a paraphrase from an author (known because  the author is making a citation), then you should find the original  document they are paraphrasing and then quote or paraphrase the  original.

  • Peer-reviewed means that experts in the field have vetted the ideas,  methods, and conclusions to determine its suitability for publication.

  • Use the library databases, Google Scholar, and Wikipedia to locate  these primary sources (i.e. see what Wikipedia cites, or what papers are  listed as often cited in Google Scholar). Ensure that they are from  peer reviewed sources (such as ACM, IEEE, etc.) and not from trade  publications (such as eWeek, PC Magazine, etc.) Wikipedia is not a  primary source — you can use it, but it will not count as one of the  four peer reviewed primary sources.

  • Write a 4 to 6 page research paper on your topic.  The page count  excludes any figures, tables, pictures, title page, front-matter,  back-matter, appendices, or bibliographic references. In other words,  there should be 4 to 6 pages of double-spaced prose.

  • Proofread your assignment carefully.  Improper English grammar,  sentence structure, punctuation, or spelling will result in significant  point deductions.

Intrusion detection and fire safety.

  

ISOL 634 – Physical Security

Final Exam

Due: June 25, 2020 200 pts.

This final exam will be a scenario similar to the midterm project, but with a focus on the concepts learned in the second half of the textbook, with a special focus on intrusion detection and fire safety.

Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using. 

The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.

The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas. 

The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.

There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always. 

Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

· Perimeter Protection—what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.

· Area Protection—what types of intrusion detection will you use and where? Explain and justify your choices.

· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.

· How will you use the security staff to monitor and respond to intrusion or duress?

· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

· Discuss the fire classification most likely for this type of physical space. 

· Where would you put fire alarms? What maintenance is required for fire detection alarms?

· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?

· Discuss the maintenance required for any systems used for fire safety and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.

portfolio assignment

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

3 PAGE WRITING IN APA 6TH STANDARD- CHAPTER READINGS REFLECTIONS JOURNAL

Writing needs to summarize Chapter 7, 8, 9 from the attached textbook. There shouldn’t be any plagiarism and should be in APA 6th standard. 

Chapter 7, 8, 9 Reading Reflection should address the following prompts: 

1. Summarize the content of the chapter addressed. 

2. What were some of the highlights in this chapter and learning opportunities?

Internet Crime and Virus Hoaxes

Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. How do pedophiles and other child exploiters use the Internet to commit their crimes?

2. What are virus hoaxes? Why are the hoaxes sometimes more dangerous than an actual virus?

MM G1

students will develop a marketing plan for a small business (either real or fictional).

Topic:

Pricing and Positioning Strategy 

1. Should be in APA format with references.

2. Should be 400- 500 words with references

information system

  

Q4 ) In Wikipedia, IT governance is a part of corporate governance  (https://en.wikipedia.org/wiki/Corporate_governance_of_information_technology).  In a page or less, what is IT governance and why is it important to the IT manager? Make sure you describe who has precedence, the company or the company’s IT function.

Q5 ) In a page or so, write a job description for an IT manager that incorporates at least one area of IT governance that you covered in Question 4 above. Monster.com has an example template http://hiring.monster.com/hr/hr-best-practices/recruiting-hiring-advice/job-descriptions/information-technology-manager-job-description-sample.aspx [1]. The template can be edited to use the terms, definitions, principles, methodology, etc. of our readings, e.g., risk management, IT value delivery, IT strategic alignment, etc.

Q6 ) In Wikipedia (http://en.wikipedia.org/wiki/Information_technology_management), Information Technology Management is defined as “… the discipline whereby all of the technology resources of a firm are managed in accordance with its needs and priorities.” [2] I suggest this is an excellent definition and also allows a broad spectrum of ways to achieve the course objectives listed in the syllabus.  In a page or so, please take a deeper dive into this from A1 and comment on this definition, and clearly state whether you agree with it or do not agree with it and why. Use our course material in your commentary.