COMPUTER SCIENCE

 Read the Orlando Marathon Case Study , found in this week’s module. Then respond to the following questions by due date listed in the syllabus:

  1. Consider  the responsibilities of risk management programs and risk in volunteer  management. What steps should be taken to prepare for the event in  compliance with the responsibilities of risk management programs and in  the aftermath of the Boston Marathon events. Assume that terrorism  threats on this event would be extremely heightened.
  2. What are all of the risks that you need to consider for the organization and for volunteers?
  3. In  what ways would you approach each of these risks? (Think about  elimination, reduction, assumption, transfer, etc). Explain your  rationale.

By the Saturday following the due date listed on  the syllabus at 11:59pm, respond to at least 1 other student. Do you  agree with the steps they selected to prepare for the event? Are there  risks they did not identify that should be included? 

new tech bus leaders

 Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.  

Request for Proposal

 

Assignment Content

  1. This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. As a Senior IT Project Manager, your responsibilities may include proficiently working with a variety of technologies, conduct meetings with stakeholders, create and forecast budgets, and design project plans.

    The CFO of your chosen organization wants the organization to purchase and integrate six new web servers. The CIO envisions more business travelers using the Web to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed.

    Research information about your chosen organization to complete this week’s assignment.

    Create a 3- to 5-page (does not include title or reference pages) Request for Proposal (RFP) in Microsoft® Word for the CIO, which will minimize procurement related risks for this project. The RFP should contain the following components: 

    • Purpose of the RFP
    • Organization’s background as it applies to the use of the request for new web servers
    • Analysis of procurement risks
    • Methods for managing procurement risks
    • Basic requirements for the current and new hardware and software
    • Software and hardware environment 
    • Statement of work/Requirements and schedule information 
    • Process for evaluating the RFP 
    • Include APA-formatted citations when necessary.

ERM strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found, and discuss how – if possible – organizations can use ERM as a strategy. It is perfectly acceptable if you deem ERM cannot be used as a strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project 1: Executive Summary

Hide Assignment InformationInstructions

This week, you will submit the one- to two-page executive summary that you started last week. This summary is for the owner of Don & Associates, where you are employed in this scenario.

Use this Executive Summary Template. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your summary should include:

  • the types of cloud computing (private, public, hybrid)
  • three major cloud service providers
  • three cloud computing service models
  • potential benefits and risks of migrating the company’s technical infrastructure to the cloud

Be sure to cite any sources you use.

How Will My Work Be Evaluated?

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.1: Identify potential sources of information that can be used to develop and support ideas.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.

When you are finished, click “add a file” to upload your work, then click the Submit button.

HackerView Vulnerability Assessment

 Prepare answers according to the questions given in this week’s homework document.  The assignment is that you “provide a remediation plan based on the HackerView vulnerability assessment”  I have attached a sample assignment as a guide and a pdf that need to be followed. 

I have to submit this assignment on 11/5 2020 at 11:00 pm EST

SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.