reflection

In this assignment, you need to reflect on key learned concepts from the course and discuss future IT trends. 

You will write a short reflection report describing the key learning from the course and future trends in IT. This report will be organized as follows:

  1. Description – Describe up to 3 key learning points(like security, ERP system, process planning)
  2. Analysis – Connect the learnings described in the previous section with the real-world. Analyze how these learnings are applicable in the real business world. Highlight 2 takeaways from your learnings.
  3. Future trends – Discuss what you envision in the future. You can discuss the role of new IT systems that will revolutionize business.

The report should not be more than 500 words.

Assignment

Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples. Your submission should be:

  • between 300-500 words (or one to two pages double spaced)
  • in-text citations and at least two (2) references using the APA style
  • double spaced
  • no title page required
  • DO NOT add an Introduction or a Conclusion.

Personal Reflection: Problem Solving in the Workplace

It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future). To complete the assignment, please follow the below instructions:

 

Courses: 

 1. Comp Crimes & Digital Forensic.

 2. Digital Forensics Tools & Tech.

  1. Review your program’s goals and curriculum on the UC Webpage and the UC Graduate Course Catalog:
  1. Reflect on (research, if needed) your current (or future) job duties and responsibilities.

Assignment Details:Part 1 – Identify a Problem

  • Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.

Part 2 – Solve the Problem

  • Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.

Grading Expectations:

  •  Fully answer both parts of the assignment.
  • Word requirement: 400-500 words

*Please include job details (job title and employer, if available). 

Activity 4- Exe Proj

 

 Chapter 4. Leadership and the Project Manager  

Consider the profile examples on project leaders Sir John Armitt and Jim Watzin from the chapter. If you were to summarize the leadership keys to their success in running projects, what actions or characteristics would you identify as being critical? Why? What are the implications for you when you are given responsibility to run your own projects? 

Text 

 

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pearson

Edition: 5TH 19

Data backup

 

Experts recommend the 3-2-1 method for backing up data, both professionally and personal data as well. This is three copies of your data, on two different devices, and one off-site.

  • Why is it important to back up my data?
  • It is mandatory for businesses to back up their data?
  • What can we do personally to meet the 3-2-1 methodology?

System Design

 Specifically the following critical elements must be addressed: 

III. Systems Design: 

Propose a solution that addresses the identified problem in your case. Be sure to include screenshots of all relevant diagrams, charts, and tables. 

a) Specifications: Provide a physical design that will meet the specifications outlined in the systems requirement document. 

b) Data Design: Create entity relationship diagrams (ERDs) that accurately describe the proposed solution, including 3NF table designs. 

c) User Interface Design: Illustrate the user interface design. Specifically, be sure to address your proposed human computer interactions (HCIs) and graphical user interfaces (GUIs). Your proposals should follow user-centered design principles and address all design requirements. 

d) System Architecture: Describe the system architecture. Specifically, be sure to address the corporate organization and culture, enterprise resource planning, total cost of ownership, scalability, integration and interface requirements, and security. 

e) Feasibility Analysis: Provide supporting details that justify why your proposed solution is appropriate for solving the problem. In your defense, be sure to address operational, technical, economic, and scheduling feasibility. Be sure that you frame your response for communicating effectively to your target audiences.  

dq

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.