Step 8: Submit IT Operations and Risk Management Briefing
1. Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure).
2.Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business.
3.Write up a comparison on the services offered
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams
I need 4-5 Pages of Journal work for Publishing purposes with No Plagiarism
The COVID-19 epidemic has impacted the way organizations and individuals do business. Some of these adaptations may become permanent, offering unique advantages and opportunities. After you do some individual research and some group brainstorming, prepare a SWOT Analysis for Post University in this pandemic era. Instructions: • This is a group assignment. o You will be assigned a group in Blackboard. o You will collaborate with your group members to prepare the SWOT. o Your participation for the assignment will be based on the quality of your contributions in the group chat. • As a group, you will prepare a SWOT analysis for Post University and their response to the pandemic. o You will be assessing Post, not as a student, but as an expert analyzer. • You can easily create the SWOT graphic in a Word document or from an editable template you found online. • You will submit along with your SWOT graphic, a two-page explanation of your SWOT and your rationale for highlighting the noted points. Requirements: • One submission per group in a Word document in APA format. • No more than two pages in length. • You will include a reference page for any references used.
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:
1. monitoring and assessment,
2. policies and controls
3. hiring
4. software
5. firewalls
6. authentication and access
7. encryption.
code is written in java using react js in eclipse id and finally the code should in git. The code is written in production code and unit test code.
You have gained an understanding of BallotOnline’s current IT issues and policies and potential SLA-related gaps in the existing IT policy. Now, you will consider the future or expected growth of BallotOnline’s IT systems.
In growth projection analysis, historical data is combined with research on market and industry trends to predict growth and forecast future requirements. To get you started, Sophia has emailed you the BallotOnline infrastructure over the last five years.
In your forecast, Sophia has recommended that you incorporate an additional 10 percent year-over-year growth for the new projects.
Write a one-page report and submit it to the dropbox below for feedback. This will later become part of the final Cloud Adoption Policy Addendum.
You are a GIS intern in a land holdings company. The property owned by the company has been surveyed and the data is housed in text files on the company server. Impress your superiors by writing a Python script that creates polygons from these files.
This is the python_file sample that contains script and comments that provide background and examples ….
In this module we will cover reading from and writing to external, non-geospatial
### files such as text files or spreadsheets.
Question: A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure?
***Standard for all discussion posts:A substantive post will do at least two of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
**** No Plagiarism***
*** References