Assignment: IT Infrastructure Policies & Discussion

Q1.) Learning Objectives and Outcomes

  • Examine IT infrastructure policies.
  • Describe IT infrastructure policies based on the scenario given.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.

Sean, your manager, was impressed with the work you did on User Domain policies. This time, Sean is asking you to write descriptions for policies that affect server, mainframe, and RSA user access. 

Assignment Requirements

Research policies for each affected IT infrastructure domain, and place them into a table with an introduction explaining the following questions: Who? What? When? Why? Be sure to add a conclusion with a rationale for your selections. Reference your research so your manager may add or refine this report before submission to senior management.

Required Resources

  • None

Submission Requirements

  • Format: Microsoft Word
  • Font: Times New Roman, 12-Point, Double-Space
  • Citation Style: Your school’s preferred style guide
  • Length: 2 pages

Q2.) Discussion
Participate in a discussion on best practices for IT infrastructure security policies in domains other than the User Domain. Address the following topics:

  • IT framework selection
  • When to modify existing policies that belong to other organizations versus creating your own policies from scratch
  • Policy flexibility
  • Cohesiveness
  • Coherency
  • Ownership

Cybersecurity RACI Chart

 

RACI charts are commonly used in business proposals to determine responsibilities amongst the team and to clarify expectations.

As a team, develop a RACI chart for a cybersecurity plan for a small start-up company in which you:

  • Explain the roles/responsibilities for the organization’s staff regarding security.
  • Identify expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff (clerical, maintenance, etc.).

Data mining Discussion#6

 

Financial services are experienced by consumers and businesses. This may be with a checking or savings account, credit cards, loans, and other offerings. With all of these services available, there is a level of financial fraud that occurs. This may be with credit card charges not done by the credit card holder, fake checks, or other issues. In analysis, these would be an anomaly or outlier.

For the discussion question, please choose a form of financial fraud a consumer may experience and an approach or method the bank may to detect this. 

Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

kindly bid carefully, i will not revise my budget once assigned

task I

 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Task 2′

Submit a Word document that addresses each of the following:

  • Chapter 10
    • Define and describe business continuity.
    • Define and describe disaster recovery.
    • Discuss pros and cons of cloud-based backup operations.
    • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
    • Create a DRP for a company with which you are familiar.
  • Chapter 11
    • Define software architecture.
    • Define and describe SOA.
    • Compare and contrast a web page and a web service.
    • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
    • Discuss what it means for a web service to be interoperable.
  • Chapter 12
    • Discuss key items that should be included in an SLA.
    • Define predictive analytics and discuss how an IT manager might use such analytics.
    • Discuss how an IT manager might use load testing on a site.
    • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
    • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.
  • Chapter 13
    • List and describe common system requirements one should consider before moving an application to the cloud.
    • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
    • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
    • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
    • List and describe budget considerations one should evaluate before moving an application to the cloud.
    • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
    • Define and describe cloud bursting.

Discussion Week 1 Strat plan

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.