31/p4

Write a 6 page paper 

  • What are the advantages and disadvantages of using consultants and third party organizations to provide security related services?
  • Traditionally, managing IT and physical security has been treated as two separate domains. Why should they be integrated?

2 CASE STUDIES

Title: Chapter-05 Video Case-3 Netflix

SEE LINKS: 

Watch 2 videos and Answer the following questions:

1. What event convinced Netfix to switch to a cloud-based service? 
2. What is Chaos Monkey and why is it importance for Netfix and its use of AWS? 
3. Why is it important for Netfix that AWS has multiple availability regions?

4. Do you watch TV or movies on Netfix? Have you encountered varying quality of service 
at different times of day?

———————————

Title: Chapter-06 Video Case-1 BrooksBrothers

SEE LINKS BELOW:

https://youtu.be/Pdil74-KoAU

Watch Video and Answer the following questions: 

1. What were some of the information system problems Brooks Brothers needed to resolve?
2. What critical aspect of Brooks Brothers service did the company hope to preserve with its
SAP implementations?
3. Why did Brooks Brothers select the SAP HANA database management system?
4. How will Brooks Brothers use its new database?
5. Do you think systems like SAP CRM and SAP HANA are necessary for all businesses with a
global presence? Why or why not?

———————–

Save both in separate Microsoft Word Files. 

Assignment

 

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). 

Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length. 

Literature Review

Submit one report file with four referred papers/articles on Blackboard.

  • Submit 5 files, respectively: your report (a Word or pdf file) and 4 references (pdf files). Do NOT compress them to a single file.
  • Format requirements are the same as for assignment report.  (APA Format, Use citations and follow APA Citation format).
  • Read at least four recent papers/articles on cloud computing related topics and have at most ONE to be review/survey paper/article. 
  • Write a 10-page (double spaced) review paper integrating and expanding the selected research paper subjects with the course topics (Excluding Cover and Reference Pages).
  • This will not be a paper report (to review the references), rather a thoughtful discussion of the research papers content pertaining to the material we have covered in the course. 
  • Papers and articles from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 

One example for review/survey article,

  1. M. Shahin, M. Ali Babar and L. Zhu, “Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices,” in IEEE Access, vol. 5, pp. 3909-3943, 2017.

One example of non review/survey reference paper/article,

  1. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.

Logical Modeling Design & Relational Schema

 

work on the Logical Modeling Design and to specify the entries, columns and their relationship. Use an entity-relationship ER diagram to visualize the database. 

Your schema should include some attributes that make it possible to include some transactions that involve aggregate functions. For example, a school schema would allow for queries to calculate enrollment in each section of the average enrollment in courses for a given department, or the total courses being taught by each instructor, etc. This should also make interesting constraints and triggers possible. Review this basic example of a requirements document and Conceptual Data Model.

Turn your ER diagram into a normalized relational database design for the (subset of the) domain (i.e. a set of tables, each with appropriate attributes, a primary key, and appropriate foreign keys. The database should be based on the ER diagram, but one-to-one and one-to-many relationships may be implemented by appropriate attirbutes in the “one” entity, rather than as separate tables. You relational database must be at least in 3NF. Remember to determine the cardinality of the relationships. You may want to decide on cardinality when you are creating an Entity–relationship diagram ERD relationship table.

see sample below

PRO1

 

A  template for this assignment  is provided using the format in  NIST Special Publication 800-18 . In addition to the NIST documentation that is linked throughout the course and in the document sharing area, you can locate SSP information in the Howard text on page 105.

Scenario:
To create the SSP for this project, you will be using your home computer system, as if it were used for a home-based business, whereby it may contain customer data and business applications critical to your operations. Although this is a home computer system, it is not completely shielded from many risks that can impact a large corporate business. Interruptions or breaches would place your business in jeopardy. For the purposes of this project, categorize this system as a Federal System in the “HIGH” risk category as defined in FIPS 199 and  FIPS 200.

Project Deliverable 1:SSP Expanded Outline and Potential Vulnerabilities Report 

SSP Expanded Outline
Using the SSP template (also found in Doc Sharing), complete the expanded outline by inserting a brief statement below each of the 15 sections which:

  • identifies the applicability of the section to your home system
  • describes the importance and purpose of the data provided in the section.

Potential Vulnerabilities Report 
Utilizing your experience, classroom resources, outside references and industry tools, analyze and generate a comprehensive overview identifying the specific potential vulnerabilities of the system.  

Insert this comprehensive overview into the SSP template as Appendix 1.

Submit this assignment to the dropbox no later than the date identified above

Excel_Introductory_Capstone1_Year_End_Report

Send me message I will make It Perfect for you 

Excel_Introductory_Capstone1_Year_End_Report 

  

Excel_Introductory_Capstone1_Year_End_Report 

Project Description: 

In this project, you will work with multiple worksheets and enter formulas and functions to calculate totals, averages, maximum values, and minimum values. Additionally, you will create a summary sheet, format cells, insert charts, insert sparklines, and create a table in a workbook.