Project – Application security

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

Building Excel

  • Microsoft Excel

You will analyze the data you collected and provided in your assignment last week. As you are working on each of the steps below, think about the analysis that you will provide to the research team. Follow the steps below to complete this analysis.

  1. Copy the file you created in week 5 and rename the new one “YourName_COMP150_W6_Assignment”.
  2. Open the file and duplicate the sheet where the initial table and data were created
  3. Rename the new sheet as “sorting & filters” and move it to the right of the original sheet
    1. Make the data look professional by using formatting options such as borders and table styles to place the data into a table.
    2. Select one of the text-based data columns such as names, cities, or addresses and sort the data by Z to A.
    3. Create a custom filter to any part of the data except where you did the sort. For example, if you sorted by patient’s name, then filter another set of data.
  4. Duplicate the original sheet again and rename it as “conditional formatting”. Move it right after the “sorting & filters” sheet.
    1. Implement conditional formatting to any of the number-based data sets. For example, showing higher numbers in green, while showing lower numbers in red.
    2. Add an IF function and apply it to the entire set. For example, you could create a function that says if x number is higher than x number, then you are at risk. The purpose is to show how an IF function works so creativity it is permitted in how you use the function.
  5. Use the “conditional formatting” sheet to create a pivot table.
    1. The pivot table needs to be on its own sheet.
    2. The pivot table needs to be meaningful so make sure to select data that will make it clear for your analysis.
    3. The pivot table should have data selected on the columns, rows, and values fields. Make sure to consider the data when adding the values selection
  6. Create a minimum of two charts. Make sure to select the right chart that explains your analysis. Each chart should be on its own sheet and should have a title. Make sure the purpose of the chart is self-explanatory just by looking at it.
  7. Update the documentation sheet
    1. Update the date.
    2. Add all the new rows for the sheets created.
    3. Provide a brief written analysis for each of the new sheets. Explain what you want the research team to learn about each sheet.
  8. Review all the sheets to ensure it looks professional. Try to keep the same style, colors, and formatting, Make sure the file is named “YourName_COMP150_W6_Assignment” and submit the file.

Assignment

Answer the following exercise taken from Ch6. An information system is to be developed to maintain information about assets owned by a utility company such as buildings, vehicles, equipment, etc. It is intended that this will be updatable by staff working in the field using mobile devices as new asset information becomes available. The company has several existing asset databases that should be integrated through this system. Design a layered architecture for this asset management system based on the generic information system architecture shown in Figure 6.8 (also found in Ch6 presentation slides #28, #29). 

You may use the following link which includes PowerPoints from the book.

https://software-engineering-book.com

Information Management

  

2-3 pages

Regardless of industry, organizations are responsible to protect and secure their customers’ information. Information management is the process of protecting an organization’s data in terms of:

· Classification and handling.

· Privacy.

· Document and records management.

· Sensitive physical information.

To reduce the risk of customer information being jeopardized, organizations often establish a separation of duties to ensure employees only have access to the information they need to do their jobs. Organizations need to abide by several U.S. privacy laws and regulations to be in compliance and to protect consumers.

discussion

 

Select one of the layouts and devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure. Support your decisions with justification.

Hands on 4

Instructions have been provided with a step by step pdf file to create a PivotTable using excel and solve by using DAX functions on excel. Please return with an excel sheet so I can see how it is supposed to be done

MGT 311 Online week 4

 

1. Briefly outline Maslow’s theory of the hierarchy of needs. What need levels are addressed by:

  • Being promoted from operator to supervisor.
  • Setting a new record for individual performance.
  • Being selected to attend a special training course.

2. In what ways did Frederick Herzberg’s research concerning employee motivation correlate with Maslow’s hierarchy of needs?

3. Of the various leadership approaches discussed in the chapter, which one would you most prefer your boss to use in working with you and your group. Explain your answers.

MIS

 A. Review current computer/technology-related magazines and journals.

 B. Select five (5) technological products NOT CATEGORIES from your review that you consider to be on the “cutting edge” of technology. Give at least a ONE-page product review of each one. This is to be done in your own words. Discuss the products in terms easily understood by someone who does not have a technology background. Include how the product benefits the consumer/user and why you consider the product to be on the cutting edge. Remember to cite your sources. 

C. Select one (1) technological product of the products from B. Your review should be at least two (2) paragraphs. Discuss the products in terms easily understood by someone who does not have a technology background. Include how the product benefits the consumer/user and why you consider the product to be on the cutting edge. 

Remember to cite your sources 

THE PRODUCTS SHOULD BE ACTUAL ITEMS AND NOT CATEGORIES OR TYPES OF PRODUCTS