Imoprtance of strategic IT planning 4

Research Paper: Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Imoprtance of strategic IT planning 8

Research Paper: Server Virtualization

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
  • Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

  • Be Minimum of 3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: please find the textbook in the attachment and refer to the  virtualization and clo ud computing topic if needed.

Ethical Hacking

 

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

Assignment

 Define and describe business continuity.

Define and describe disaster recovery.

Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both

3 pages APA format 

Network Forensics-1

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. 

The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

1) What types of network investigations are typical of those that fall under the topic of network forensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

· No Plagiarism 

· Each Answer Should be 400 words without References.

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

Research paper – Data visualization using R

  

•Project: Research Paper

–Topic based on dataset assigned

–Describe the dataset fields

–Summary of the data in the dataset

–Research content (at least 1000 words and 6 references – 3 must be scholarly peer-reviewed articles)

–Create visualizations using R Language as applicable, discuss findings

•Project: PowerPoint Presentation

–Summarize research (not copied) and data visualizations

  

–**Must be APA formatted** **College Level Writing****No grammar issues and no spelling issues**

•Title Page – Include Group number and names of all contributors from the group

•No abstract is to be included

•Document body with citations (rewrite all information used from sources)

•Reference Page

Assignment

 Write a short summary of the analytical steps needed to work on the final case analysis. Run basic exploratory data analysis (EDA) on the data given to you and submit R-Markdown file. Write about the types of data cleaning needed before moving to the next steps of analysis

 Step 2: Join the files for the final case analysis and submit the final combined file in the csv format 

Presentation

Imagine your organization is going to build an application utilizing Big Data and Machine

Learning. You are going to propose to upper management of your idea with supporting system

design. Develop an APA formatted paper that presents a detailed analysis and research-based

information pertaining to ALL of the following topics;

● List and describe the type of data you will need for your application, and how you will

ensure the quality of the data.

● List and explain the technologies, tools and software packages that will be used to build

the application.

○ Provide the design of your Big Data database. Explain why you chose the

database compared to others. Also, include supporting theories for the schema

you came up with.

○ Describe in detail why the chosen technologies are adequate to process the

data.

○ List and describe the types of the statistical analysis methods that will be used.

MSIT 690 Syllabus

18 of

● List and describe the benefits from the customer’s perspective and organization’s

perspective. Please pinpoint where the benefits are drawn from – data, technology,

software package, process, and etc.

● List and describe the concerns and downsides that may be introduced by the

application and the Big Data from multiple perspectives – law, regulations, social and

etc. Provide solutions, processes, application modules, and etc. that mitigates the

concerns, problems, issues.

● Provide data flow diagram, database design, and sample code of a module for your

application.

Present it in 10 slides.