Practical Connection Assignment

     

Writing Skills, Grammar, and APA Formatting

Assignment strongly demonstrates   graduate-level proficiency in organization, grammar, and style. 

  Assignment is well written, and ideas are well developed and explained. Demonstrates   strong writing skills. Student paid close attention to spelling and   punctuation.  Sentences and paragraphs   are grammatically correct.  

 

Proper use of APA formatting. Properly and   explicitly cited outside resources. Reference list matches citations.

 

Maintains purpose/focus

Submission is well organized and has a tight   and cohesive focus that is integrated throughout the document 

 

Understanding of Course Content

Student demonstrates understand of course   content and knowledge. 

 

Work Environment Application

Student strongly demonstrates the practical   application, or ability to apply, of course objectives within a work   environment.

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

paper

 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

WK 5 Rough Draft

 

Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as a business field that would benefit from technical writing.

1) 10 pages (double-spaced).

2) Choose any technical topic to write your report about.

3) Identify the purpose and audience of your report.

4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).

5) In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!

6) Use your approved topic.

7) Use your approved outline.

8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

9) Arial 11 or 12-point font or Times New Roman styles.

10) Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations

11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!

I attached an outline of what to write about.

Wireless Network……

 

First Section 

In a 350- to 500-word essay, address the 4 questions. 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget