I have attached 2 attachments below. please go through them to get an idea . If you do the project based on the 2 attachments, I will be satisfied
Summary and Chart
Assignment Content
- Phoenix Fine Electronics would like you to brief them on your system recommendation.
Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business. Cite at least two sources within your chart. Compare the following information:
- Elements of the system
- How the system would support management
- How the system would create a successful partnership between the business and IT
- Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at the 12-point font, and single-spaced.
Include the following in your summary:
- An overview of the business needs and desired outcomes
- The system comparison chart (from above)
- Your system recommendation
- The scope of the project
- References
Assignment 1: Network Infrastructure Design Diagram
Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:
Table 1. Kamehameha Educational Offerings.
GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information
The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.
Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:
· Each of the facilities has three floors:
· The first and second floor of each building requires 150 network connections each
· The third floor of each building houses a data center and requires 75 network connections
· The Honolulu location requires additional network connections for failover purposes
· The Hilo location will be the primary data center and house redundant database servers
· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)
· A constant connection between the three locations, carrying at least 75 Mbps of data
· All servers at all locations must have redundancy
· Protection from intrusions is required and should be documented
· A plan to verify security and failover measures is required
· Submission: Using the free tool, daw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:
Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates
Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.
One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:
· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:
Table 2. Example Network Diagram Callout Box.
CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010
· Any necessary hardware
· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
· Annotate the following values for each of the Sites:
· Network ID
· Useable Range
· Subnet Mask
· CIDR Value
· Broadcast Address
· All devices require hostnames complying with the following naming conventions:
· Routers: Rx; where x is the site number incremented by a value of 1 for each router
· Switches: Sx; where x is the site number incremented by a value of 1 for each switch
· Servers: SRVx where x is the server number incremented by a value of 1 for each server
· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
· management vlan
· production vlan
High availability
When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:
Figure 2. Draw.io ‘Export’ as Function to PDF
How Will My Work Be Evaluated?
1.1.3: Present ideas in a clear, logical order appropriate to the task.
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
10.1.1: Identify the problem to be solved.
10.1.2: Gather project requirements to meet stakeholder needs.
10.1.3: Define the specifications of the required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
Wk 4 – Apply: Controls, Protocols, and Threats
Assignment Content
- Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.
Create an 8- to 10-slide multimedia-rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:
- What do they protect against?
- What is their purpose?
- Write a 2- to 3-page analysis of your findings answering the following questions:
- How are controls or protocols implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and protocols would you find in a security policy?
- WARNING – There are two assignment in one for this week, the presentation and written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.
Presentation checklist:
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Consistent fonts and font sizes throughout the presentation
- Use colors and background. No black and white presentations.
- Include at least one references that are properly cited
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
- Include speaker notes for every slide except title and reference pages.
- Did the use slides to convey ideas and handouts to communicate details?
- Did the slides follow the golden rule of one idea per slide?.
- Did the slide titles convey the key message of each slide?
- Did the visual diagrams to convey the concepts in a simple, clear, and memorable way?
- Can the charts be understood in less than 5 seconds?
- Did the pictures add clarity to the message the slides
- Did the presentation build curiosity in the audience by revealing information in stages?
- Did the presentation repeat the agenda slide as a guidepost to review your points periodically?
- Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?
- Are the slides clearly readable from the last row in the room?
- Consistent fonts and font sizes throughout the presentation?
In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.
Assignment checklist:
- The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count)
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Include at least one references that are properly cited
- Any images must have a caption and referenced in the paper.
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
Information Goverance
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.
The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.
The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.
Requirements:
The paper should include at a minimum of the following sections:
a. Title page
b. Executive Summary (Abstract)
c. Body
i. Introduction (including industry discussion – 1-2 pages)
ii. Annotated Bibliography (2-3 pages)
iii. Literature review (2-3 pages)
iv. Program and technology recommendations, including:
1. Metrics
2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
3. Regulatory, security, and privacy compliance expectations for your company
4. Email and social media strategy
5. Cloud Computing strategy
d. Conclusion
e. References
2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.
3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).
4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.
Milestones:
· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.
· Week 6 – Develop a full annotated bibliography (2-3 pages). 25 pts.
· Week 12 – Develop the literature review (2-3 pages). 25 pts.
· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.
P.S: I have completed all the sections, last section is pending Final research paper ( I will pass all the necessary documents introduction, Bibliography and Literature review)
InfoTech in a Global Economy 3.1
Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:
- Be approximately three to four pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Forensics
1.Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. (300 words)
Chapter 7 ppt
2. Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. (300 words)
Chapter 8 ppt
interivew
WRITTEN INTERVIEW QUESTIONS
DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.
1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.
2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?
3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?
4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?
5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?
Programming
Please read carefull the picture I have attached please
CSIA 459
The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness.
Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?
Post your briefing paper as a reply to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end of your posting.
Reference
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4679168&site=ehost-live&scope=site