Cloud Computing and Digital Forensics

Review in 500 words or more the video below called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Application Security to Software development

 

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Project Selection, Charter, and Work Breakdown Structure

 

The purpose of this assignment is to evaluate and select an IT project and create a charter and work breakdown structure associated with the project selected.

For this assignment, read the “Running Case” in Chapter 4 of the textbook. Complete the following tasks associated with the “Running Case.”

Part 1:

  1. Using the “Weighted Decision Matrix Template,” evaluate the four projects by preparing the weighted scoring model on the template. Develop at least four criteria, assign weights to each criterion, assign scores, and then calculate the weighted scores. Print the spreadsheet and bar chart with the results.
  2. Prepare a 250-word paper that describes the weighted scoring model and the results. Include justification of the scores and your recommendation and justification for which project should be selected for completion.

Part 2:

Based upon the recommendations you made in Part 1 of the assignment, senior management has made a preliminary decision to complete the “Global Treps Project,” but it has requested additional information about the project in order to finalize the decision to proceed. Complete the “Business Case Template.” Assume that the project will take 6 months to complete, use many volunteer hours, and cost about $130,000 for hardware, software, travel, and labor. Be sure to research information on the television show and events held by colleges and other groups, which have been sparked by the need for more successful entrepreneurs. Visit the DonorsChoose.org website to see how that site operates and investigate the process for forming a nonprofit organization.

When completing the “Business Case Template,” consider the following:

  1. Assume you would be the IT project manager for the project and that you want the project to be implemented.
  2. Reread the “Global Treps” project description.
  3. Review the sample JWD Consulting business case shown on Table 3-2 in Chapter 3 the textbook to ensure all of the proper information is included when completing the “Business Case Template.”
  4. Study the “Weighted Decision Matrix Template” results for the project.
  5. Assume that the new system must run on existing hardware and software, should require minimal technical support, must be easily accessible by employees, and must be protected from unauthorized users.
  6. For the “Analysis of Options and Recommendation” section, consider other possible options if the project is not implemented.
  7. For the “Potential Risks” section, consider business risk to the company if the project is not implemented.
  8. Be creative in the business case and state any additional assumptions.

Part 3:

Using the “Project Charter Template,” construct a project charter to formalize the project, provide management with information related to the project objectives and management, and provide an explanation of how organizational resources will be used to complete the project.

  1. Recall the assumption that the project will take 6 months to complete and have a budget of $130,000.
  2. You will be the project manager, and Dr. K. will be the project sponsor. Other team members will include Bobby, Ashok, Kim, and Alfreda.
  3. You will conduct four shark tank-like events and you will develop the Global Treps site and application.
  4. Review the next-gen DNA-sequencing instrument project charter shown on Table 4-1 in Chapter 4 of the textbook to ensure that you include all of the essential elements of a project charter.

Part 4:

Complete the “Work Breakdown Structure Template” using the information from the project charter and other relevant information from the Chapter 4 “Running Case.” Break the work down to Level 3 or Level 4, as appropriate for the project.

Here is the chapter 4

 

Running Case

Note: Additional running cases are provided on the Companion website, including the Manage Your Health, Inc. case from the seventh edition of this text, now with updated tasks based on this edition. Template files are also available on the Companion website. This running case starts here and continues through Chapter 13. Tasks based on this case are explained in the following Tasks section; throughout the book, these tasks will build on work done in previous chapters and scenarios.

Economic inequality is a huge issue. A recent study found that the world’s 80 wealthiest individuals own as much as the entire world’s poorest 3.5 billion people. The richest 1 percent of the world’s population control half of the world’s total wealth. Many individuals, corporations, charities, and government agencies have projects and programs in place to attempt to tackle this and other important global issues such as sustainability, but there are many opportunities to do more.

A grassroots group of college students has decided to work together to do their part in making the world a better place. The students are from many different countries, and several of them met at global conferences, through study abroad experiences, or on various Internet groups. Strategic goals of this group include developing skills for both college students and for needy populations, sharing information on existing products and services that promote economic growth and sustainability, and promoting entrepreneurship. Leaders of this group were reviewing some ideas for projects (all with a significant IT component) that they could do to support their strategic goals:

  1. Global Treps: Many people are familiar with the television show called Shark Tank where entrepreneurs (sometimes called “treps”) present their business ideas to a group of investors or sharks. Several colleges, high schools, and even elementary schools throughout the world hold unique versions of a shark tank like event. You believe that creating a non-profit organization with one central mobile-friendly website/application to assist groups in organizing these types of events would spark even more entrepreneurs throughout the world. You would plan to hold several shark tank like events during the term of the project and create a site and applications to help continue developing more global treps. This site/application would include the following capabilities:
    • Provide guidelines and templates for running a shark tank type of event.
    • Accept donations from potential investors targeted toward specific schools or organizations wishing to host an event (similar to the popular www.donorschoose.org site where people can fund teacher’s requests).
    • Accept ideas for needed new products or services.
    • Provide the ability for organizations to create their own custom site to solicit local participants and sharks, accept applications, and promote the winners as well as losers.
    • Research ideas for a mechanism where a certain percentage of all donations and profits earned by contestants are donated back to the Global Treps organization.
    • Provide an online version of the events by showing videos of contestants and live reactions of the sharks while also getting live inputs and donations from viewers.
  2. Change the Laws Campaign: Launch a global campaign to change laws to reduce further income inequality and promote social responsibility. This project would also involve creating a mobile-friendly website/application that would include information about current and proposed laws, allow discussions of potential ideas to change laws, organize people to contact appropriate lawmakers, etc.
  3. Wealthy Unite: Develop a system to enable the richest people in the world to provide their input on how they can make the world a better place. Provide information on what several people are currently doing (i.e., Bill Gates, Warren Buffet, famous celebrities, etc.) to promote philanthropy. Allow others to donate to suggested causes and recommend other ways to reduce economic inequality.
  4. Global Smart Shoppers: Develop a mobile app and website that recommends products and services produced by organizations that promote social responsibility. Customize the app so it works in any country in the user’s desired language. Work with large companies that do not currently sell products or services in certain countries to expand to regions in need. Allow small companies to easily add their products and services to the shopping network.

Tasks

  1. 1.Summarize each of the proposed projects using a simple table format suitable for presentation to top management. Include the name of each project, identify how each one supports business strategies, assess the potential financial benefits and other benefits of each project, and provide your initial assessment of the value of each project. Write your results in a one-to two-page memo to top management, including appropriate back-up information and calculations.
  2. 2.Evaluate the four projects by preparing a weighted scoring model using the template provided on the Companion website for this text. Develop at least four criteria, assign weights to each criterion, assign scores, and then calculate the weighted scores. Print the spreadsheet and bar chart with the results. Also write a one-page paper that describes this weighted scoring model and the results.
  3. 3.Prepare a business case for the Global Treps project. Assume that the project will take six months to complete, use many volunteer hours, and cost about $130,000 for hardware, software, travel, and labor. Use the business case template provided on the Companion website for this text. Be sure to research information on the television show and events held by colleges and other groups, which have been sparked by the need for more successful entrepreneurs. Also visit DonorsChoose.org to see how that site operates and look into steps for forming a non profit organization.
  4. 4.Prepare a draft project charter and an assumption log for the Global Treps project. Assume that the project will take six months to complete and have a budget of $130,000. Use the project charter template provided in this text and the sample project charter provided in Table 4-1 as guides. For the assumption log, document at least two assumptions including an assumption ID, date, source, category, description, and status. You will be the project manager, and Dr. K. will be the project sponsor. Other team members will include Bobby, Ashok, Kim, and Alfreda. You plan to hold four shark tank like events plus develop the Global Treps site and application.
  5. 5.Start a lessons learned register to document knowledge learned on this project. Include la lessons learned ID, date, source, category, description, impact, recommendations, and proposed actions. Be creative in then making two entries.
  6. 6.Prepare a change request for the Global Treps project, using the template provided on the Companion website for this text. Assume that you have decided not to provide an online version of the show as it would be too much work for the initial project. Be creative when making up information.

Cyber Security: Kali Linux Lab

I have a Lab assignment that has to do with Kali Linux. 

Youll have to watch 2 walkthrough videos:

The first video is regarding setting up Kali Linux

The second video is regarding setting up WordPress.

Once you successfully watch the two videos, you will then start the lab. The procedures of the lab are in the attachment section. 

Python Scripting

Need someone with a lot of experience in Python Scripting. Please read all of the directions on the file before attempting it. 

IA week6 DB

 

Hello,

i need this paper by 10/01 afternoon.

Strictly No plagiarism please use your own words.

Explain in your own words what some of the challenges are with the Change Management Process for IT security.

An initial post must be between 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

IAM Compliance Management

 1. An annotated bibliography of at least five sources. The annotations must be at least five sentences long.

2. A power point with at least 12 slides not including the title and references addressing the topic IAM Compliance Management  .

3. A 750 word summary on topic IAM Compliance Management 

Security related components

For this assignment research and discuss the various security related components that must be addressed when implementing any system (HINT: the first is policy).  Include citations and sources in APA style. 

500 words.