cloud computing service

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

ETHICAL DILEMMA PROJECT: POTENTIAL SOLUTIONS AND IMPACTS

Submit in a word document, template attached. Be careful, make sure to avoid plagiarism and to use quotation marks and proper citation as required. Length should be one page. Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words. Attached is the assignment, template, and prior paper to use as a guide.

Discussin week 7

Initial Post

“Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.” – http://seeingdata.org/developing-visualisation-literacy/

Please conduct the following activity located at the following address:

http://seeingdata.org/developing-visualisation-literacy/rate-these-visualisations/

Tell us what you think of the visualisations that we used in our focus group research. Instructions below!

What to do

  1. Look at the visualisations by clicking on the images below. You can choose to open the visualisation in a NEW tab or window (we recommend this) or view it in a pop-up window if you prefer to stay on this page. Some are interactive (i) and some are static (s).
  2. Place the images on the grid. When you’ve looked at one, go to the grid and position the image according to whether you liked or didn’t like and learned or didn’t learn something from the visualisation (‘learning something’ could also mean confirming something you already knew). Only place the visualisations that you have looked at onto the grid. Click SUBMIT.
  3. Compare your views with others. You can compare your responses to the visualisations with those of others, by clicking COMPARE.

Choose three of your favorite visualisations. Post a 3 – 5 sentence summary of why you chose the visualisations. What caught your attention? Were they effective in presenting the provided data? If possible, explain how you would you do to improve the visualization?

Reply Post

When replying to a classmate, offer your opinion on what they posted and the visualisations they chose. Using at least 3 – 5 sentences explain what you agree or disagreed with their evaluation of the visualisations.

paper

 

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

  

Week 8 Quiz

Answer the following questions from Chapter 5 in the text with a paragraph that contains at least five sentences. Include the question and number your answers accordingly.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Wagner 

Week Eight Assignment

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Introduction to Data Communication and Networking

Discuss the ethical of using network tools such as privacy. Provide examples from your outside research to support your comments.  Use at least two outside sources other than your textbook.

Below are two articles to help with developing a coherent discussion:

Writing Requirements

  • APA format, 2-3 pages in length (excluding cover page, abstract, and reference list)
  •  Minimum of 2-3 peer reviewed resources
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

IDM W 6 D

 Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster? 

400 words required

Assignment

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Risk assessment in physical security

1. Describe effective risk assessment approaches and frameworks related to physical security.  Address responsible parties, regulatory compliance, security in layers (defense in depth), and expected key controls.  Assume a large organization with multiple sites responsible for sensitive / confidential data.  (500 words)

2. Discuss regulatory requirements related to physical security, such as HIPAA and PCI.  What approaches from a testing and security maturity standpoint are beneficial to overall risk management and why.