Research Paper

Research Paper

Course – Cloud Computing

Submit your professional research paper on a current topic in cloud computing. Amend your paper based on feedback you received during the residency weekend. The paper includes your final literature review and your completed analysis of your chosen research topic. Plan on approximately 15 pages. Your literature review should include:

  • An introduction that includes: Brief explanation of your strategy for finding literature (databases searched, keywords used)Statistics on your references (Total references, percent recent, percent scholarly)
  • Discussion of the topic (themes, variables)
    • Include a separate subsection for each theme (variable)
    • Relevant studies that relate to the same topic

Do not simply summarize each article. Practice synthesis.

The paper must adhere to APA format (7th edition) and include a proper APA references list with all references provided in APA forma

2 Discussion

 Risk Mitigation

Company M designs, manufactures, and sells electronic door locks for commercial buildings. The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues. Over 5,000 wholesalers and distributors access the Company M business-to-business (B2B) Web site to place orders and track fulfillment. In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones. In addition, the company dealt with four serious malware events that originated from an unpatched server, an insecure wireless network used in the manufacturing plant, an insecure remote connection used by a sales person, and a headquarters employee who downloaded a game from the Internet to her workstation. Three of the malware incidents resulted in files that were erased from the company’s sales database, which had to be restored, and one incident forced the B2B Web site to shut down for 24 hours. Explain your risk mitigation strategy that reduces risks for an organization. Include the following:

  • Identify and discuss technological and financial risks that you see Company M faces.
  • Which domains of the IT infrastructure do you see were involved during the four malware events?
  • What types of security policies should Company M institute to mitigate those risks?

Explain your answers. Submit your initial post (minimum 350 words)

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

CPTED Continued

 Build upon your earlier post about CPTED and explain the importance of crime analysis in reference to secure architectural design.

Remember to cite at least one scholarly peer-reviewed article.  

All citations should be in APA format.

Attached previous post.

Data Analytics and Visualization

 

Project assignment is to have you do more research on the topic of Data Analytics and Visualization. In this project you will need to do some research. Select any software that can help you with data analytics,  it can be Tableau. Research the software and write a paper on its capabilities with examples.

Here is what needs to be done:

1. Submit at least 2 but no more than 4 pages double spaced, APA style MS Word document.

2. Only 2 graphics or figures allowed.

3. Reference all sources used. Use APA style references.

CC W 8 A 1

 Search the Internet for companies that supply utility computing. Select 2 or 3 companies and compare them to Amazon. What services do these companies provide? What promises do they make about availability?  Grammatical and mechanical errors will be checked.  

quetion

 

Security Breach Evaluation

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

web dev

 

Part One:

Your client is interested in how you will structure the Website. Before you begin to write the HTML for your pages, it’s a good practice to create a storyboard* that outlines your ideas for colors, font sizes, placement of images, hyperlinks, and sections on each page. You do not need to write this in HTML! In fact, it will save you time if you develop your storyboard in Word, PowerPoint, or Visio first, so you can make adjustments based on feedback.

Here are some online resources to help you think through the process:

https://www.webhostdesignpost.com/website/websitestoryboarding.html

https://itstillworks.com/use-powerpoint-create-website-storyboard-6190734.html

Example Story Board

Part Two:

Based on your storyboard, you will begin to create your file structure for your site. It is never a good practice to keep all of your files in the same folder.

For example, if you are developing a site that sells clothing for men, women, and children you might have one folder for all the pages that house men’s clothing, another for women’s clothing, and so on.

You can create this portion in Word indicating where each of your HTML pages will be located, as shown in Section 2.4: Links in your text.

PCA

  

Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.