Op Excellenteè

Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

Name the organization and briefly describe what good or service they sell and where they operate.

Note how they are a differentiator in the market.

Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

Explain what actions the company took to achieve operational excellence.

Information Governance wek-5-1

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references

— 600 Words

ROTOR MACHINE CIPHER IMPLEMENTATION

  1) Using any programming language of your choice implement the encryption scheme that uses a simple two cylinder rotor machine. It is not necessary to implement the decryption scheme [50 marks] Please note that your submission is expected to run on IRIS. Please ensure that you use a programming language that is compatible with IRIS and also ensure the program can run on IRIS before submitting it 2) Specifications: The program should start by randomly generating the mappings for the inner and outer cylinders, with the inner cylinder rotating faster than the outer cylinder. You can use any data structure to implement the cylinders but a “map” data structure is recommended. The program should then prompt the user for an input string to encrypt. When the user presses the enter, the program should validate and encrypt the input string. Validation would mean that the string is well formed and is not a command. It should then output the encrypted text and prompt the user for another text value. The cylinders should update their state after each character encryption. At any time, the user should be able to enter a predefined string to exit the program. The program should also contain a sub-routine that prints out the current state of the cylinders by entering a predefined command at the prompt. Example output might look like: Inner Cylinder 25 ↔ 4 6 ↔ 11 . . Outer Cylinder 13 ↔ 12 12 ↔ 24 . . In coding the above, please note the following • White space, numeric and special characters should not be encrypted. Simply output whitespace, numeric and special characters into the ciphertext • You can write your code to be case insensitive – convert all input to lower case 3) What can you say about the computational complexity of your algorithm relative to the size of the input string? [10 marks] Test 1 [10 marks] 1) Output the state of your cylinders. 2) Encrypt the string “A” and output its encrypted value. 3) Output the state of your cylinders. Test 2 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “EE” and output its encrypted value. 3) Output the state of your cylinders. 4) Is a rotor machine a monoalphabetic or polyalphabetic cipher? Comment based on the results above. Test 3 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “Mr. Jock, TV quiz PhD, bags few lynx” and output its encrypted value. 3) Output the state of your cylinders. 4) Comment on the state of your cylinders before and after encryption. Please provide an explanation for what you observe. Submission 1) Submit the following documents separately in Blackboard by the deadline. NO ZIPPED FILES ALLOWED 1) All your code files 2) A detailed README file, which should explain how to run the code with sample input and output. If you are unfamiliar with READMEs you can find an introduction here https://www.makeareadme.com/ , here https://medium.com/@meakaakka/a-beginners-guide-to-writing-a-kickassreadme-7ac01da88ab3 and here v=RZ5vduluea4. Note that the README file you

submit for this project need not be complex, it only needs to at least explain how

to compile the code and run the code with examples. [5 marks]

3) A MAKEFILE that automates the building/compiling of your code. If you are

unfamiliar with Makefiles you can get a quick introduction here

https://www.youtube.com/watch?v=vye0kV5gvkA and here

https://swcarpentry.github.io/make-novice/02-makefiles/. Note that the exact

structure of your makefile will depend on the programming language you are

using, so you may choose to find an example specific to you. The Makefile you

create for this assignment need not be complicated. It only needs to define the

TARGET, its DEPENDENCIES, if any and the COMMAND to create the target

executable. [5 marks]

4) A report (which should include your answer to Question 3 and your test results

with screen shots)

Access Control

 Topic: Access control planning & implementation in an enterprise environment
PAPER:
write an 8-page paper that must include all of the following: Discuss the strengths/weakness of the topic and possible improvements. Discuss what you have learned from this assignment and how you will apply it moving forward in your career. Use at least one NIST resource as a reference. Use a minimum of 10 peer-reviewed resources. APA format; Times New Roman 12-point font. The title page and reference page do not count towards your 8-page minimum.

PRESENTATION:
A minimum of 10 slides. The title slide and reference slide do not count towards your 10-slide minimum. Include speaker notes on each slide. 

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)

COMPUTER

 

Below are some example good topics but any topic that can associate use of computers and technology is fair game to use for this final written paper.

  • Application of Artificial Intelligence
  • Application of Technology and Computers applied to a Field of Study
  • Biotechnology
  • Electronic Commerce
  • Electronic Monitoring
  • Management of Information Systems
  • Geometric Computation
  • Gaming
  • Green Computing
  • Hardware/Architecture
  • Human Computer Interaction
  • Informatics
  • Internet Systems
  • Knowledge Management
  • Machine Learning
  • Mobile Computing
  • Networks
  • Nursing Informatics
  • Robotics, Vision & Physical Modeling
  • Scientific Computing
  • Security and Privacy
  • Smart Cards
  • Social and Academic Networking
  • Social Commitment using Technology
  • Software/Operating Systems
  • Systems Reliability/Dependability

Assignment Expectations

Length: Minimum of 1500 words; thoroughly addressing research topic in a clear, concise manner.

Structure: Include a title page, abstract, and reference page in APA style. These do not count towards the minimal word amount for this assignment.

References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. Include at least three (5) scholarly sources to support your claims.

Format: Save your assignment as a Microsoft Word document (.doc or .docx).

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the  readings from the course and at least two scholarly journal articles to  support your positions, claims, and observations, in addition to your  textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise,  and logical, using excellent grammar and style techniques. You are  being graded in part on the quality of your writing.