Research Paper – ITS-631: Operational Excellence

Information Technology and Organizational Learning Assignment:

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges which are present in the digital era. Will things get better or more complicated as time goes on?  Explain. What are some methods to assimilate new generations into the workforce and get them thinking about competitive advantage?

The above submission should be two pages in length and adhere to APA formatting standards.

**Remember the APA cover page and the references do not count towards the page length

**at least two scholarly or practitioner sources

Note: plagiarism check required, APA7 format, include References, within 8hrs

SECURE CLOUD ARCHITECTURE

Pink Sky  Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.   

Here are the current databases under Pink Sky   Datacenter  (on-premises).

Databases for customers to reach 

Database 1: Movie Soundtracks

Database 2: Videos

Database 3: Pictures

Databases for Employees (workforce members) to reach 

Database 4: HR

Database 5: Payroll

Database 6: Heath insurance 

Please address the Pink Sky   Entertainment Company manager’s expectations and requirements.

Question 1: Pink Sky Entertainment products  ( Databases  1, 2, and 3) will be moved to the cloud:  How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud?  The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.

Question 2: Pink Sky   Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and  Pictures)  by having only one account. Pink Sky   Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files.  They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?

Question 3: Pink Sky  Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky   Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?

Summative Assessment Lab Reflection

 

  • I took a picture of the labs that we have for this week.

  • Compare and contrast the vulnerability scanning tools you used in the labs. Are there scenarios in which a scanning tool would be advantageous to use over others?
  • When assessing the security risks of a network, a step that is important but sometimes overlooked is the gathering of organizational data. How can knowledge of organizational data give you leverage over network vulnerabilities? Name two types of organizational data and explain how a hacker might be able to exploit them.
  • Cite sources to support your assignment. 

    Format your citations according to APA guidelines. 

Operational excellence

Discussion:

 This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods. 

Assignments:

 Information Systems for Business and Beyond Questions:

  • Chapter 9 – study questions 1-10, Exercise 3
  • Chapter 10 – study questions 1-10, Exercise 1

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 
  • Chapter 8 – Review the Siemens AG case study.  Note the importance of understanding the interrelationships amongst all the senior leaders at every location.  Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders.  Why is this important? 

computer architecture Embedded systems

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 Question 3

Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system?  

Question 5

Is the microprocessor controlling a cell phone an embedded system?  

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer?  

Question 7

List and briefly define the possible states that define an instruction execution.  

Question 8

List and briefly define two approaches to dealing with multiple interrupts.  

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long.  (a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ?  (b) Repeat assuming that half of the operands and instructions are one byte long.  

Discussion 13- Legal

Assigned Readings:

Chapter 16. Management of Employee Conduct: Agency Law.

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain and analyze the duties owed by each party in an agent/principal relationship.
  2. What steps should an organization take to limit apparent authority that it does not intent to bestow on an agent?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Abstract #2

 

*Below is the instructions, and I have attached an SAMPLE EXAMPLE document 

Legal Abstracts – Instructions

A sample legal abstract is posted in Blackboard. Use the sample as your template.

Make sure that your case or controversy is current — within the last 6 months — because older cases or controversies are often misleading or not relevant because of subsequent legal developments. Cases can be overturned; statutes or regulations can be amended or repealed. 

The abstract is a summary of the author’s article in the words of the student. Abstracts submitted containing the original article’s text in full or part will not receive full credit. Your abstract should reflect a summary in your own words of the material in the article you are discussing.

Abstract topics should address current legal issues, controversies, cases or developments affecting cybersecurity law as we examine it in this course. For further guidance on topics, consider the subjects covered in each of the class modules. Articles may be chosen from technical journals or websites, legal journals or websites, or general news or information sites. 

To restate, the timeliness of your selected case, controversy or issue is crucial, because an article about a case that has subsequently been overturned or a law that has been amended or repealed not only does not keep you properly informed on current legal issues, it may actually provide incorrect information that can negatively impact your decision making when analyzing potential legal issues. 

Each abstract must contain the following headings:

Article title

Author

Publication

Publication date

URL

Facts of the dispute

The background of the case or controversy.

Plaintiff’s claim

In a criminal case, the Plaintiff is the State or the appropriate governmental entity. What legal wrong does the plaintiff claim that the defendant committed?

Defendant’s claim

How has the defendant answered? In the early stages of litigation, the defendant may not have answered the complaint. 

Applicable law (i.e. statute, regulation, treaty)

Usually, the applicable law is mentioned in the article. If not, try to determine which law or laws apply. 

Issue of law

This is the legal question that is the foundation of the case. Courts rule on an issue of law by interpreting the law as applied to the facts of the case. 

Holding (if an adjudicatory body has rendered a decision)

This is the ruling that a court issues after it applies the law to the facts of the case. If a case is still ongoing, the court may not have issued a holding. 

Impact on IT

Finally, include your evaluation of the possible impact on cybersecurity in the enterprise of the particular legal issues in the article under the following heading. Here is where you get to apply your knowledge and skills as an IT professional. If you can find additional commentary on the case or controversy discussed, include it here. 

cybersecurity

 

Research a cybersecurity incident.

In your original post, identify the following:

  • The general info about the incident (who, when, the impact, and the details)
  • How the incident is related to cloud usage
  • If possible, what security controls were put in place to prevent the same kind of incident from reoccurring.

IT476 week 3 A

Assignment Question :

1- What is referential integrity in a relational model?

2- Create an ERD for the following relation (see image below)?

Hint: The entities are PERSON, PERSONCREDITCARD, and PERSONPHONE.

The attributes for the above entities are the column headings below respectively.