Category: Information technology (IT)

  • IT Security Policy/Procedure Paper 1

    * NOTE: Please view the last several minutes of this week’s lecture before attempting this assignment **

    This assignment is designed to demonstrate your ability to write a professional document aimed at management or senior leadership in your organization. This is NOT/NOT an academic paper assignment. Do NOT submit a paper that cites sources or uses APA style. Academic writing is not how businesses or organizations write internally and these assignments are designed to help prepare you for writing in real world business, government, or other organization environments. This is an assignment more about writing a “business document” and not about writing an “academic paper.”

    Scenario:

    You are employed as an information assurance lead in a small U.S.-based company that is expanding their customer base to include international clients in Europe and North Africa. As a small company your employer has also attracted the attention of larger companies interested in licensing your intellectual property, the out-right purchasing of the entire company, or otherwise obtaining access to your intellectual property and/or lists of clients.

    Management has tasked you to analyze the risks the company faces as it sends sales and marketing personnel overseas to engage with future potential clients. The company does not perform actual work overseas but rather delivers the end product customers have contracted to them, so the intellectual property is not at risk after the sale (i.e., clients cannot reverse engineer the delivered product or otherwise obtain company secrets at or after delivery). The sales and marketing personnel, however, require access to the intellectual property, or parts of it, during demonstrations and capability briefings to clients and that information, as well as the full intellectual property held back at the company headquarters in the U.S., must be protected.

    Write a 2-3 page document, which could be a draft of a new policy or a risk assessment & mitigation proposal, for your fictional companys senior management on the information technology and intellectual property threats facing the organizations devices and network both at corporate headquarters and when the sales and marketing officers travel in the US and internationally.

    Applying material from modules 1-5:

    • How does defense in depth, assets, threats, vulnerabilities, controls, cryptography, and the laws & regulations both in the US and overseas impact how the IT devices and networks should be configured, operated, monitored, and deployed?
    • Is there any specific guidance or training people at HQS and those who travel domestically and internationally be provided?
    • What mitigations may help reduce the risk to the organization?
    • Are there specific legal or regulation hazards the organization should avoid or be aware of and accept as additional potential risks?

    This assignment is less about having the “perfect” answer for the organization’s needs than it is graded based on the ability to demonstrate clear arguments based on information security concepts we have covered in the first 5 weeks. Points will be deducted for spelling and grammar errors as well as incoherent arguments or arguments presented without foundations. Threats and risks should be clearly stated as should the associated mitigations when applicable.

    Lecture videos link.

    Week 2: https://youtu.be/83UUikNJOBs

    week 3: https://youtu.be/zwcS7acZ_3U

    week 4: https://youtu.be/r3OGMz1JR7w

    week 5: https://youtu.be/ldJqFhOD9AQ

  • SR05

    Read the paper – – carefully and summarize it with your own words using the Paper Summary Template

    Attached Files (PDF/DOCX): Helland 2016 CACM v59n8pp38-41.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • 3-page paper on Enterprise Risk Management (ERM)

    Complete a 3-page paper on Enterprise Risk Management (ERM). Select 3 major themes relating to ERM, identify them in bold in the paper, and discuss them. Reference your professional experience. Citing sources is optional, you can limit them to the textbook and assigned or optional readings. *** You must use MLA style (https://guides.nyu.edu/WritingGuides/MLA) for this paper

  • Reflection W5

    Please no plagiarism and the instructions are Reflect on one or more readings/videos from this week in at least 150 and I have provided the reading and the videos for this assignment Reading Links

    Attached Files (PDF/DOCX): Thinkyourphoneislisteningtoyou_ThatE28099sproximityadvertising.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Project W4

    Please no plagiarism and I have attached a picture of instructions on how to do this assignment and Please make sure to remember this assignment because there will be more assignment associated to this assignment
  • Technology components and network design for tax office empl…

    Your technology 3 pages in length. For each of the new employees, you must describe all hardware components needed to create the system, identify specific software programs that the employees would need, and describe security measures needed to support the systems. Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component. Network Diagram You have also been asked to include a visual representation of the topology you selected and the network equipment needed to support interactions between these employees. Use Visio to create a 1-page (or 1-slide) diagram that identifies the networking equipment needed to enable the workflow between these employees. Describe the technologies, hardware, and software used within the information technology field James Otis tax associates Logo Scenario You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly and is opening a new office. They are focused on hiring and retaining the best in the field, and they believe that one way to do this is to provide every employee with the appropriate tools and technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and network for the three employees in the new office. They would also like you to address the security needs of the various employees. Directions The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component. The manager has provided the following employee descriptions: Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees. Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds. Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review. For each employee, you must: Describe all hardware components, including peripherals, needed to create the systems Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include: Operating systems Applications such as: Office automation products Security products Describe security measures needed to support this system. Security measures could focus on: Access Administration and user passwords Firewalls Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components. Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

    Attached Files (PDF/DOCX): Technology Needs Template.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Explore types and vendors

    Instructions

    Virtual Machines (VMs) are a major component in enterprise networks today. Research what VMs are and explore the following:

    ACTIVITIES REQUIRED:

    Virtual Machines (VMs) are a major component in enterprise networks today. Research what VMs are and explore the following:

    • how they work,
    • the types (Type 1 and 2 hypervisors),
    • what they are commonly used for, and
    • the 4 or 5 most common platforms/vendors.

    Due

    [Enter general info when assignment is due]

    Submission and Assessment Guidelines

    Your submission should include a summary of your findings:

    • 2+ paragraphs (Min 500 Words)
    • Provide an introduction to the subject matter at the top of the document, additional details in the body, and your thoughts and conclusion at the end
    • Cite your sources where referenced in the document and then a References section at the end of your document. See:

    Rubric

    IFT 103 Homeworks

    IFT 103 Homeworks

    CriteriaRatingsPtsThis criterion is linked to a Learning Outcome

    Meets Requirements

    Writeup meets the requirements of the assignment, integrating topics requested and meeting minimum requirements of length and structure, including References if needed.

    1 pts

    This criterion is linked to a Learning Outcome

    Presentation Quality

    The writeup is well presented, with proper spelling/grammar, spacing, and use of elements like tables, images, etc. as appropriate.

    1 pts

    This criterion is linked to a Learning Outcome

    Content Quality

    The writeup’s content is appropriately detailed and well thought out with original ideas, and/or is properly supported with referenced evidence.

    1 pts

    Total Points: 3

  • Infrastructure Modernization – Core Technologies

    This a Group project(Infrastructure Modernization Review (pg24), my portion to contribute is listed below. Please reference attachment to get more detail of the entire project. Student 3 Cooper Technology Research (Step 4 Core Technologies) Primary Focus: Technical depth Responsibilities Research and explain current & emerging technologies, including: Cloud computing Virtualization Big Data & analytics Artificial Intelligence Mobile computing For each technology: What it is Key benefits How it applies to Largo Corporation Which issues it addresses Deliverables Owned ~500600 words of the 1,000-word technical briefing 7 APA Style, in text citations list sources 6

    Attached Files (PDF/DOCX): Group Project Infrastructure Modernized Review.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • System unit, input devices, output devices in personal compu…

    ITC 2301 PERSONEL COMPUTER FUNDAMENTALS This assignment will give you an opportunity to learn more about the system unit, input devices, and output devices. You will also demonstrate your ability to use some advanced Microsoft Word features. This assignment will measure your mastery of ULOs 1.1, 1.3, 1.4, 3.1, and 3.2. Your assignment will have four parts. Before working on this assignment, you will need to complete the Unit III Activity: Word Advanced Features. Part 1: Introduction Begin your assignment with an introduction that identifies what a computer, storage, and networking are. Introduce internal, input, and output devices of a computer. Your introduction should provide an overview of these three types of devices. Part 2: The System Unit Research one internal device inside your desktop or laptop computer (i.e., power supply, RAM, CPU, hard drive, cooling fans, motherboard, etc.). Then, insert a picture or something relative to the internal device you chose using the Insert then Online Pictures feature. Center the image on the page and provide a title. Adjust the image size as needed. Next, create a table with a title (the title should name the internal device) and the following four column headings: Name of Internal Device, Description, Manufacturer, Cost. In the table, list at least three manufacturers that sell the internal device, and complete the table with the information you gathered for each heading. Part 3: Input and Output Choose and research one input device (i.e., fitness tracker, touchscreen, keyboard, scanner, etc.) and one output device (i.e., 3D printer, multifunction printer, OLED monitor, video card, etc.). For each, insert a picture or something relative to the input and output devices you chose using Insert then Online Pictures feature. Center the images on the page and provide a title for each. Adjust the image size as needed. Create another table with a title (the title should name the input device) and five column headings: Name of Device, Description, Input or Output, Manufacturer, Cost. In the table, list at least three manufacturers that sell the input device and three manufacturers that sell the output device, and complete the table with the information you gathered under each heading. Part 4: Summary Include a summary paragraph that reflects on the significance of internal, input, and output devices in the realm of computing. Your assignment should be at least two pages in length, not counting the required references page. Include at least two sources to support your assignment. Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used.
  • CIO Organization Memo

    Introduction & Purpose: ~12 page

    Leadership Philosophy + Management Style: ~341 page

    Internal IT Strategies: ~1112 pages

    • (Paragraph intro + table takes space even though table is single-spaced)

    Current IT Department Structure: ~121 page

    • (Org chart counts as page space)

    New CIO Organization: ~1 page

    Key Services: ~1112 pages

    • (Table + explanations)

    New CIO Organization Structure: ~121 page

    • (Explanation + org chart)

    Key Milestones: ~1 page

    • (Table-heavy)

    Conclusion: ~12 page

    resources:

    • https://leocontent.umgc.edu/content/dam/course-content/tus/ifsm/ifsm-301/document/Colonel%20Murray%27s%20Leadership%20Philosophy.pdf?ou=1378150
    • https://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action
    • https://leocontent.umgc.edu/content/dam/course-content/tus/ifsm/ifsm-301/document/Tools%20for%20leading%20business%20change.pdf?ou=1378150
    • https://www.cio.com/article/264621/leadership-management-it-gets-organized-introducing-the-office-of-the-cio.html
    • https://deloitte.wsj.com/cio/structuring-it-organizations-for-service-excellence-1410926501
    • https://leocontent.umgc.edu/content/dam/course-content/tus/ifsm/ifsm-301/document/Is%20it%20time%20to%20reset%20your%20IT%20strategy.pdf?ou=1378150
    • https://leocontent.umgc.edu/content/dam/course-content/tus/ifsm/ifsm-301/document/Dept%20of%20Energy%20OCIO%20Org%20Chart.pdf?ou=1378150
    • https://leocontent.umgc.edu/content/dam/course-content/tus/ifsm/ifsm-301/document/Organizational%20Change%20Management%20Methodology.pdf?ou=1378150

    Attached Files (PDF/DOCX): Course Resources – Case Study- GG Freightways (GGFRT) (1).pdf, GG Freightways CIO Organization Assignment (1).docx

    Note: Content extraction from these files is restricted, please review them manually.