Categories
Information Technology

Define for the project the process and definitions of a 1) standard change, 2) an emergency change.

Learning Goal: I’m working on a information technology case study and need support to help me learn.
In week 10 we looked at Change Management.
For this assignment, develop a short change management process for your team. This would be the team that you would put together if you implemented the software you are proposing to build in your final project.
In one word document
In a paragraph of no less than 250 words write an introduction for your team on the importance of change management for this project.
Define for the project the process and definitions of a 1) standard change, 2) an emergency change.
Create a worksheet that will need to be completed for both types of changes – you can use the templates from IT Change Management Appendix A and B as a jumping-off point but create your own template, not a copy of the templates.

Categories
Information Technology

Discuss some steps you can take to reduce their concerns.

Learning Goal: I’m working on a information technology question and need support to help me learn.
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.
The discussion questions this week are from Chapter’s 6 & 7 (Jamsa, 2013).
Chapter 6 topics:
Define and describe a SAN.
Define and describe NAS.
Describe how cloud-based data storage works.
Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
List the pros and cons of cloud-based data storage.
List the pros and cons of a cloud-based database.

Categories
Information Technology

What would be the first change you’d implement to make adopting blockchain technology easier?

Learning Goal: I’m working on a information technology question and need support to help me learn.
1)350 words
Chapter 10 introduced ten blockchain implementation obstacles. Create a new thread, choose two obstacles from those discussed in chapter 10, then describe them and how they could disrupt blockchain acceptance. Also, describe how you would overcome each of these obstacles. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 10 or 11. You’re not trying to test each other, but you are trying to start a discussion.
You must do the following:
Create a new thread. As indicated above, choose two obstacles from those discussed in chapter 10, then describe them and how they could disrupt blockchain acceptance. Also, describe how you would overcome each of these obstacles. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 10 or 11. You’re not trying to test each other, but you are trying to start a discussion.
2)2pages
Chapter 11 introduces issues relating to governance and leadership in a new blockchain era. What changes can you see that should occur in your organizational unit (i.e. your department) to be better prepared to adopt blockchain technology? What changes should occur at the higher organizational level? If you could make strategic decisions for your organization, what would be the first change you’d implement to make adopting blockchain technology easier?

Categories
Information Technology

Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term.

Learning Goal: I’m working on a information technology writing question and need an explanation and answer to help me learn.
Please read this information on IT sourcing strategies:
Chapter 12.4 – “IT Sourcing and Cloud Strategy” (PowerPoint)
Report on outsourcing and insourcing by Deloitte Consulting (Links to an external site.)(https://www2.deloitte.com/us/en/services/consulting.html) describes the sourcing trends that are important for IT.
Find 2 peer-reviewed articles from academic journals on information technology sourcing. Summarize each article and compare and contrast the sourcing approaches in each article. Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term. Which strategy did you think was more effective and why? Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.

Categories
Information Technology

Which strategy did you think was more effective and why?

Learning Goal: I’m working on a information technology writing question and need an explanation and answer to help me learn.
Please read this information on IT sourcing strategies:
Chapter 12.4 – “IT Sourcing and Cloud Strategy” (PowerPoint)
Report on outsourcing and insourcing by Deloitte Consulting (Links to an external site.) (https://www2.deloitte.com/us/en/services/consulting.html) describes the sourcing trends that are important for IT.
Find 2 peer-reviewed articles from academic journals on information technology sourcing. Summarize each article and compare and contrast the sourcing approaches in each article. Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term. Which strategy did you think was more effective and why? Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.

Categories
Information Technology

Research security policy frameworks appropriate for a DoD-focused organization.

You work as a junior security analyst for a governmental organization with Department of Defense (DoD) ties. Your manager has asked you to:
§ Identify and explain three business considerations relating to security policy frameworks
§ Describe the factors relating to them, especially for a DoD-focused organization
Your organization’s long-term strategic goal is to make DoD its primary focus of business. In doing so, your organization will be faced with a different set of business considerations—that is, DoD contracts, their security level requirements, and their time constraints.
For this assignment:
1. Research security policy frameworks appropriate for a DoD-focused organization.
2. Create a table showing three DoD frameworks and align them to your firm’s business considerations and goal of becoming a DoD-focused organization.
3. Create a summary report with an introduction describing business considerations relating to a DoD-supplier organization, the table you created in Step 1, and a conclusion that includes rationale for choosing the frameworks.

Categories
Information Technology

Describe the core principles and objectives of COBIT 2019.

Research and find answers to the below
Part 1: Research Security Policy Frameworks
Navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331 . Read Sections 1-5 of the SANS Policy Development Guide.
1. Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.
2. Describe the core principles and objectives of COBIT 2019. (Navigate to https://www.cio.com/article/3243684/what-is-cobit-a-framework-for-alignment-and-governance.html.)
Part 2: Define a Security Policy Framework
Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstation operating system (OS) has a known software vulnerability
Unauthorized access to organization-owned data
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
User destroys data in application, deletes all files, and gains access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data
Need to prevent rogue users from unauthorized WLAN access
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router
1. For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.
Acceptable Use Policy
Access Control Policy
Business Continuity—Business Impact Analysis (BIA) Policy
Business Continuity and Disaster Recovery Policy
Data Classification Standard and Encryption Policy
Internet Ingress/Egress Traffic Policy
Mandated Security Awareness Training Policy
Production Data Backup Policy
Remote Access Policy
Vulnerability Management and Vulnerability Window Policy
Wide Area Network (WAN) Service Availability Policy
2. Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.
Part 3:
A user at XXX has been using company network resources to download torrent files onto a USB drive and transfer those files to their home computer. IT tracked down the torrent traffic during a recent network audit. Unfortunately, the company does not have a current policy that restricts this type of activity.
1. Identify at least two appropriate policies that should be in place to define this type of behavior and the consequences thereof.
2. Write a brief overview for C-level executives explaining which policies should be added to the company’s overall security policy framework, why they should be added, and how those policies could protect the company.

Categories
Information Technology

Discuss in detail, including Visio diagrams to support your words, how the architecture is to be used in the system.

Learning Goal: I’m working on a information technology project and need an explanation and answer to help me learn.
Mobile technologies represent a significant part of today’s software market. Their pervasive nature enables experienced, as well as inexperienced, users to interact with them for accomplishing a particular task. In addition, the diffusion of the computing systems on which they run, such as smartphones or tablets, coupled with an intertwined retail method (application stores present on all devices), allows for a capillary distribution of such applications.
For this project, assume you are a programmer analyst. You are required to work with a large sporting goods company, and then utilize the knowledge acquired in the course to simulate the creation of a mobile application that your company will be able to sell to the organization.
Your company has been asked by a large sporting goods company to deliver a customer-guidance mobile application for the company. You will simulate the creation of this mobile application for them. The application should offer an interface where customers could type in what they are looking for to be guided through the store leading them to the right department or section. The application should also enable the customers to watch video demonstrations of the products available in the store, after they scan the product barcode by using a camera.
The application should contain different features, including data-driven material that should be available within the application itself, without having to rely on external data sources.
Moreover, the application should be able to suggest places in the store vicinity where customers may try certain items; for example, the application may guide the customers to archery ranges if they are interested in bows and arrows. You will add a feature that suggests apparel to the customers based on their lifestyle and something they can easily purchase through the device, without needing to go to the store.
Tasks
For this project, please assume that the planning and analysis phase have already been completed. During this course, you will be required to build upon those two phases and perform the design and implementation phases. Although you are not required to create a full application by the end of this course sequence, you are welcome to do so. This project does not require you to initiate communications with the target company for the sale of the application you wish to develop. You can use the examples in your book to draft the required documentation. In addition, different tools, templates, and examples that you may utilize to create the documents will be discussed. Typically, Microsoft Word will allow you to create most (if not all) of the material to be turned in for this project. You may utilize specialized graphics software, such as Visio, to create any images or diagrams to accompany your documentation. You should assume that the project could be handled in-house, therefore, no outsourcing should be considered through the project.
Requirements
Create a search tool that will bring up the location in the store of the department or item that is being searched for.The tool shall run on any Web browser
The tool shall run on an iOS or Android app
The tool shall allow for the user to create a customer account
Payment information and personal information shall be secure
The search tool shall provide an aisle number of the location in the store for the item
The interface to the tool shall operate like a search engine
One or more words can be placed into search
Wild cards can be used in search
The tool shall bring up a display to whatever is being searched as a listing
The tool shall include similar items in the same sport in the listing
The tools shall bring up locations in the store that will allow testing of the equipment.
The tool shall have the store’s archery range’s location appear when the input is bows and/or arrows.
The tool, on searching for golf balls or other golf equipment shall bring up the location of the store’s driving range.The tool shall allow the item to be purchased online,
The tool shall place all items that are clicked on to purchase into a shopping cart.
The tool shall display any associated videos for the item that exists in the database. This display shall appear as a listing of them, allowing the user to click on one to watch.
This tool shall allow the user to scan the item’s bar code or there will be another way to bring up any related video.
The tool shall display associated apparel for the sport that is being searched. The display will have a link for additional information, which will have a link for purchase, and its location in the store.
In Week 1, you will complete the following tasks along with a discussion of the architecture complete in a 4- to 6-page Microsoft Word document:
Discuss in detail the system acquisition strategy for the project
Illustrate the business need, in-house experience, project skills, project management, and time frame required by the project.
Create an alternative matrix or decision matrix. Click here for some examples.
Discuss in detail, including Visio diagrams to support your words, how the architecture is to be used in the system.
Address operational, performance, security, cultural, and political requirements for the project.
Submission Details:
Support your responses with appropriate research, diagrams, and examples.
Cite any sources in APA format

Categories
Information Technology

Discuss the attributes of applications that are not well suited for virtualization.

Learning Goal: I’m working on a information technology discussion question and need support to help me learn.
1)Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.
The discussion questions this week are from Chapter’s 8 & 9 (Jamsa, 2013).
Chapter 8 topics:
Define and describe virtualization.
Defend the following statement: Virtualization is not a new concept within computer science.
Describe the various types of virtualization.
List the pros and cons of virtualization.
Discuss the attributes of applications that are not well suited for virtualization.
List reasons why companies should virtualize.
List the benefits of blade servers.
Define and describe the hypervisor.
Define and describe green computing.
Describe the concept of the desktop on demand, and include the benefits of such a system.
Chapter 9 topics:
List the security advantages of cloud-based solutions.
List the security disadvantages of cloud-based solutions.
Define and discuss the data wiping process.
Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
Define and discuss hyperjacking attacks.
Define and discuss guest-hopping attacks.

Categories
Information Technology

Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

1)350 words
Discussion (Chapter 11): Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.
2)Complete the following assignment in one MS word document:
Chapter 11- discussion question #1-4 & exercise 4
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).