Project Documentation

Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans begin to come to life and assumptions are able to be tested and measured in real-life scenarios.

One of the outcomes of project implementation is a set of deliverables that typically includes a system diagram; a network diagram; a database design document, including an entity-relationship diagram, a data dictionary, and table definitions; a clearly articulated cybersecurity plan; and source code.

To complete this assignment, you will create:

  • A system diagram that shows, in graphic form, the components of your project.
    • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
    • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
    • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
    • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Answer the following 2 questions in 2-3 pages

 

Consider diagram 7-1 from your textbook. Answer the following questions: diagram is in 215th page in the text book which is attached below.

  1. Do presentation layers add an attack surface to the enterprise? How about an e-commerce presence?
  2. The supply chain will interact with an entire business ecosystem of many other organizations. Interactions will probably include both people and automated flows. Are these third parties to be trusted at the same level as the internal systems, such as content management or data analysis?

CC-3

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

Cloud computing and digital forensics – Week 11

Week 11 Discussion(500 words)

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Eleven Assignment(250 words)

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

500 words essay on networking in APA format

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Discussion

the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

  • Create a new thread (by the FIRST DUE DATE)
    • Contract the advantages and disadvantages of using local and public blockchains to test applications.
    • Explain how each advantage and disadvantage impacts blockchain application development, and why each is important to successful blockchain implementation.

2 Discussions and 1 case Study

Discussion 6.1

Describe 5 types of Endpoints

Discussion 6.2

List and describe each step of NIST risk management process

Case Study 6.1

Describe NSA’s suggested data-loss response process

Writing Requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer-reviewed sources that are properly cited 
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.