Cloud Incident

Topic:  Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.   

Follow up your discussion with a recent article discussing a company who has begun utilizing a cloud environment and what challenges they may face.  Make sure to cite the article.

Class Diagram and Use Case Diagram

 

Address the first question posed and then create the two diagrams as instructed below.

You can create your diagrams in Visio®, Word, or PowerPoint® (using drawing tools in Word or PowerPoint) or draw them out by hand and share photos.

Assignment Requirements

  1. Describe the difference between a use case and a class diagram. What is the purpose of each? What role do they play in object-oriented-programming design specifically?
  2. Create a class diagram that describes an automobile dealership. Your class diagram should include at least 6 classes and show the relationships between the classes.

Refer to this site for additional examples of class diagrams:
http://www.agilemodeling.com/artifacts/classDiagram.htm

  1. Create a use case that depicts the actors (people and systems) and processes involved in a university system that registers students for classes. Be sure that your use case includes all actors (systems and people) Involved in a university class registration process and show the interactions between actors. At a minimum, you should show the student, the registrar, the online registration system, and accounts receivable.

Refer to this site for additional examples of use case diagrams:
https://www.uml-diagrams.org/use-case-diagrams-examples.html

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

cloud computing service

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

Images

Excel 2019 In Practice – Ch 5 Independent Project 5-4

 

Wilson Home Entertainment Systems monitors cash flow at their individual locations separately and consolidates data. After the summary is complete, you insert hyperlinks to each of the supporting worksheets.

[Student Learning Outcomes 5.1, 5.4, 5.6, 5.7, 5.8]

Files Needed: WilsonHome-05.xlsx (Available from the Start File link.) and WHES.png (Available from the Resources link.)

Completed Project File Name: [your name]-WilsonHome-05.xlsx

Skills Covered in This Project

  • Group and format worksheets.
  • Create a static data consolidation with SUM.
  • Insert a picture from a file.
  • Insert a hyperlink.
  • Copy a hyperlink.
  • Encrypt a workbook with a password.
  1. Open the WilsonHome-05 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Group all the worksheets.
  3. Edit and format grouped sheets.
    1. Select cells A1:B2 and click the Launcher in the Alignment group [Home tab]. Choose Center Across Selection from the Horizontal list and click OK.ImagesFigure 5-76 Consolidate dialog box for cash flow
    2. Click the Launcher in the Page Setup group [Page Layout tab] and click the Margins tab.
    3. Choose Horizontally from the Center on page list and click OK.
    4. Edit the contents of cell A10 to read Cash paid for marketing.
    5. Select cell A1 and ungroup the sheets.
  4. Select the CashFlow sheet.ImagesFigure 5-77 Image positioned as title
  5. Build a static data consolidation for the Cash flow from operations section.
    1. Select cells B4:B12.
    2. Use SUM to consolidate the data from the three location sheets without links. (Figure 5-76).
  6. Build a static data consolidation for the Cash flow from banking and investment section in cells B15:B21. Delete the references in the Consolidate dialog box and use SUM as the function.ImagesFigure 5-78 Hyperlink text to switch to Cash Flow sheet
  7. Build a static data consolidation for the Cash balance at the beginning of the quarter amounts in cell B24 with SUM as the function.
  8. Insert a picture from a file.
    1. Delete the contents of cell A1 on the CashFlow sheet.
    2. Click cell D2.
    3. Click the Pictures button [Insert tab, Illustrations group].
    4. Find and select WHES from your student data files.
    5. Click Insert. The picture is placed at a default size.
    6. Click the Height box [Picture Tools Format tab, Size group].
    7. Type 1.2 to replace the default height and press Enter.
    8. Format the height of row 1 to 86.25 (115 pixels).
    9. Point to the logo frame to display a move pointer.
    10. Drag the image to appear in cell A1 as a main label for the worksheet (Figure 5-77).
    11. Click cell D2 to deselect the image.
  9. Insert and copy a hyperlink.
    1. Click cell C3 on the Peoria worksheet.
    2. Create a hyperlink that displays Total Cash Flow and switches to cell A1 on the Cash Flow worksheet (Figure 5-78).
    3. Right-click cell C3 and choose Copy from the menu.
    4. Select the Champaign sheet tab and paste the hyperlink in cell C3.
    5. Select the Rockford sheet tab and paste the hyperlink in cell C3.
    6. Select the Peoria sheet, and press Esc to remove the copy marquee if it is still visible.
    7. Select cell C5 and then click the cell with the hyperlink to test it.
  10. Save and close the workbook (Figure 5-79).
  11. Upload and save your project file.
  12. Submit project for grading.

Week 2 Discussion: Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Decision Support system

 

1. Find examples of  an applications for each of the following: decision support systems (DSS), business intelligence (BI), and analytics. Summarize the applications in 300 words. Include a list of resources you used. (10 points) 

2. Identify the future of analytics in healthcare? What will it be used for and what are some expected outcomes. (300 words)

3. What role does and should IBM Watson play in healthcare? Are there significant findings that Watson assisted in obtaining?  (300 words)

 

How will artificial intelligence (AI) improve your business? What advise would you give managers and executives about using AI?  (300 words)

2. What are the major drivers of AI? Are there any impediments your organization needs to be aware of? Are there any reasons organizations should avoid using AI? (300 words)

3. Identify a voice recognition software and explain some of the applications. What type of processing is used for voice recognition? What are some of the issues still with voice recognition? (800 words).

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Practical connection

  

Explaining how the work was related to studies.

Need an explantion of Masters in Computer science all the subjects and how its was helpful for my work environment as a Software Engineer/Programer Analyst.