Cyber Security 19735237

Need a 200-word response essay to the two attached essays in the word documents. The response should contribute to the statement or provide an additional perspective to it. Need two references for each of the responses and the essay should not be plagiarized. 

I5

part 1

 

Management is worried, after consulting with the IT department that the current documentation of the present architecture was not done correctly and with the required details, therefore if IoT is implemented they desire more detailed graphical documentation on its implementation. Discuss the following components as part of an architecture model graphic to be delivered to management and within your assignment for the asset tracking system: Devices (Generic device – Sensing and Actuating Devices) IoT Application (transforms the data for value to the user) Cloud/Server (data storage, processing and management) Gateway capability (data is acquired, forwarded to the communications network)

part2

 

Management is worried, after consulting with the IT department that the current documentation of the present architecture was not done correctly and with the required details, therefore if IoT is implemented they desire more detailed graphical documentation on its implementation. Provide the following components as part of an architecture model graphic to be delivered to management for the asset tracking system:
Provide an introduction to the paper concerning the purpose of the graphic and the overall solution being recommended by the asset tracking IoT implementation (2-3 paragraphs). Provide descriptive information regarding the architectural model graphic, and the details describing the devices, applications, Cloud/Server environment and gateway. (2 pages) Provide the architectural graphic with the components below (Describe each of the objects on the diagram below, the interconnections or interfaces, types of data traveling across the connections, active protocols, cabling or wireless connections, and implemented security): Devices (Generic device – Sensing and Actuating Devices) IoT Application (transforms the data for value to the user) Cloud/Server (data storage, processing and management) Gateway capability (data is acquired, forwarded to the communications network) Provide a conclusion to the paper summarizing the content and purpose of the paper.

An example of the required level of detail for your graphic can be found at http://www.latogalabs.com/2017/05/iot-architecture-the-journey/.

Discussion Board Comments

2 separate 50 words on: 

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions: People: stakeholders, audience. Constraints: pressures, rules. Consumption: frequency, setting. Deliverables: quantity, format. Resources: skills, technology

Among the key factors mentioned, write about–> People: Stakeholders, audience.

Total 100 words.

Olap 19766619

 What is OLAP and how is it used in Data Mining? 

 References: At least one peer-reviewed, scholarly journal references. 

Research Paper 19837297

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 6 research paper, please address the following in a properly formatted research paper: Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization. Are there other frameworks mentioned has been discussed in the article that might be more effective? Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements: Be approximately four to six pages in length, not including the required cover page and reference page. Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Personally Identifiable Information

Personally identifiable information (PII) is any information that can identify an individual.

Review the NIST Special Publication 800-122 “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). In an APA formatted document answer the following: What is considered PII information? How to protect PII information? What are the categories of PII and how to determine what types are considered for the categories? What should occur if a breach happens? Did this article mention others to reference for more information? If so identify the source.  How should an organization address data fields? Explain Intranet Activity Tracking What security controls and safeguard’s should be implemented (recommendations)

Do not simply copy the content from the article that can be considered as plagiarism, in your own words explain and answer the above question in a research paper format.  APA Formatted Document Minimum 3 pages

It Management Executive Brief

   Assignment Content    Imagine you are an IT manager at a small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.  

Write a 2- to 4-page executive brief that details the following:
How the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance How IT policies, standards and procedures can be used to determine if the enterprise is in compliance and support the IT strategy How Quality Management Systems (QMS) are important in assuring quality processes are in place How IT management and monitoring of controls can be used to asses IT performance Format your document according to APA guidelines.

Stage 4 19543437

 For this assignment, you will prepare the final section of your report in which you will review a system solution provided to you and explain how it meets the requirements and what needs to be done to implement the system within the organization in the case study. This section should not exceed five double-spaced pages and must include at least three references.

Need done by Sunday please. 

Topic Or Area That Pertains To Information Technology Management

    

I need a research paper related to information technology management.     

1,500 word research paper using a minimum of 5 credible sources cited in APA 6th edition style 

Cis 560 Exercise 1

Exercise 1: Assessing Discussion Forum Access Controls
Due Week 9 and worth 125 points
Objective: The goal is to evaluate the process of joining a discussion forum group to analyze their “access controls.”  Please note: Do not use your primary, personal email address to sign up for the forum you select for this exercise. It is a good idea to have a secondary email address that can be used for this type of testing. Finally, please make sure that your virus and malware protection is up to date before you start this Exercise.
Tools required to complete Exercise: Internet Browser and search engine of your choice.
                          Suggested browsers: Chrome, IE, & Firefox
                          Suggested search Engines: Yahoo, Bing, Google, & Duckduckgo
Directions: Please read all directions prior to starting this exercise.
Using your favorite search engine, type in one of the following search requests:  forum best video card forum parenting tips forum best hikes  (Alternatively, you can choose something in which you are very interested and on which you might want some additional insights.)    Once you’ve located an acceptable forum, please go to the folder or “thread” where other users are discussing your selected topic. Make sure you are on a forum that asks you to “join” or “register” before you can create new posts or respond to posts created by other users.   Pay close attention to the forum’s registration process. The steps below will help you chronicle your experience of gaining access to the forum. Note: You will be required to take screen shots for several of the steps below.
Create a Word doc. In the document, briefly state the topic you selected for your search and why you selected that topic. Then, provide the EXACT web address of the forum where you registered to post.  Briefly describe the forum as well as the types of discussions/questions being asked by the other users.  Take screen shots of the verification process and paste the screen shots into your document. Did it have CAPTCHA? Did it require two-factor identification? Do not proceed if you are not comfortable with sharing the information the site is asking you to provide. If this occurs, please select another topic/forum.  Locate the End User License Agreement (EULA) on your selected forum and paste it in the document. This is the legal document to which you are agreeing when you join. You can read it in all cases, and in some cases you can also download it. In either case, make sure you include it with your submission.  Provide a brief description of all the steps your instructor or a fellow student would need to take to sign up for the same forum you selected in order to gain the same posting rights that you have.  What feedback would you give to the forum’s administrator to improve their access control strategy? If their access control strategy is exceptional, please explain why you feel this way.  The specific course learning outcomes associated with this assignment are:
Diagnose risk from unauthorized access to IT systems through proper testing and reporting. Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.
By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.