Add 3 pages of original research update table of contents and add to and exiting document
APA format 3 additional references
must include a turn in report
due in 15hrs
topic will be Security Standards for Development and Deployment
+1 (231)-518-0303 [email protected]
Home » Archives for June 2023 » Page 504
Add 3 pages of original research update table of contents and add to and exiting document
APA format 3 additional references
must include a turn in report
due in 15hrs
topic will be Security Standards for Development and Deployment
1. Describe trade-offs that may need to be made among project stakeholders’ priorities. How would you address these trade-offs as a project manager?
2. List and describe at least three common quantitative risk analysis techniques. Under what circumstances would you find each one useful?
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.
The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.
The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.
Question 1) Summarize what you have learned in your coursework about your special area. Be sure to discuss how the literature interacts with your own experience on job if any
Question 2) Choose a topic in your area of specialization ( blockchain, cybersecurity or forensic) and describe whether a qualitative or quantitative research study would be more appropriate.
Question 3 ) identify and explain three IT leadership models and how each can positively influence behaviors in an organization.
The answers for each question should be more than 750 words need to concentrate on goals from the courses infotech import from strat plan, Emerging threats and countermeasures, infotech in the global economy, information governance, enterprise risk management, and Data Science & Big data Analysis
Discussion and Question attached
Choose one of the research areas under the Trends in Requirements Management in Chapter One of the Wiley Guide to Project Technology, Supply Chain and Procurement Management. Those trends include:
In this paper, provide the reader the following for your chosen trend:
Describe in 500 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.
Exp22_PowerPoint_Ch03_CumulativeAssessment_IT_Careers
As the department chair of Information Technology at the college, you often give presentations on IT Careers to potential students. You have been asked to to update the presentation with recent data on the programs you offer at the college that will prepare students for a career in IT.
Start PowerPoint. Download and open the file named Exp22_PPT_Ch03_CumulativeAssessment_IT Careers.pptx. Grader has automatically added your last name to the beginning of the filename.
Insert a Title and Content layout slide after Slide 1. Type Jobs in IT in the Title Placeholder.
Insert a Trapezoid List SmartArt graphic in the content placeholder. Type the following in the Text pane as first level bullet points. Remove any unneeded bullet points in the Text pane.
Software applications developer
Information security analyst
Computer systems analyst
Database administrator
Computer network architect
Management analyst
Apply the Moderate Effect SmartArt style. Change the color to Colorful – Accent Colors.
On Slide 4, insert a two column, seven row table in the content placeholder.
Type the following information into the table:
Row 1: Col 1: Profession; Col 2: Salary Per Year
Row 2: Col 1 Software applications developer; Col 2: $103,560
Row 3: Col 1: Information security analyst; Col 2: $95,510
Row 4: Col 1: Computer systems analyst; Col 2: $88,270
Row 5: Col 1: Database administrator; Col 2: $87,020
Row 6: Col 1: Computer network architect; Col 2: $104,650
Row 7: Col 1: Management analyst; Col 2: $82,450
Apply the Light Style 2 – Accent 4 table style.
Add a new column to the left of column 1. Merge the cells in the new column. Set the cell width of the merged cell to 0.79“. Type 2016 in the new column and rotate the text 270°. Center the text in the cell horizontally. Increase the font size of the text to 28 pt. Change the cell shading to White, Text 1.
Set the text in the table to Center Vertically. Set the table height to 4.2” and the width to 10.7“.
Change the layout of Slide 3 to Title Only.
Start Excel. Download and open the file named ITData.xlsx and save it as ITData_LastFirst.xlsx. Copy the chart from the Job Growth Percentage worksheet and embed the chart using Paste Special on Slide 3. Paste as Microsoft Office Graphic Object.
Note, Mac users: Paste as Microsoft Office Graphic Object.
Size the chart to a height of 4.5“. Position the chart horizontally at 1” and vertically at 1.85“.
On Slide 5, create a Clustered Column chart with the following data:
In cell A1, type Profession and in cell B1 type # of Jobs.Then populate A2:B7 with the following values:
Software applications developer 1,256,200
Information security analyst 100,000
Computer system analyst 600,500
Database administrator 119,500
Computer network architect 162,700
Management analyst 806,400
Change the source data to use the range A1:B7.
Make the following changes to the clustered column chart:
• Apply Chart Style 9
• Apply the Layout 4 Quick Layout
• Remove the legend and y-axis
Save and close Exp22_PPT_Ch03_CumulativeAssessment_ITCareers.pptx. Exit PowerPoint. Submit the file as directed.
Choose one of the 1 Security Topics from the Management of Information Security Book and write your final paper educating the reader on that topic. Use the sub-categories for each Security Topic presented in the book as a guide to your content for the paper.
This proposal should be an annotated outline of your paper. Use sample # 2 and 3 as your guide. The samples can be found here. Only write outlines describing what you are going to write about. Do not write paragraphs but make sure it is in outline form.
Content for the paper should have the following at a minimum:
Define employment at will. Are there legal exceptions to the employment-at-will doctrine? How can employers protect themselves from wrongful discharge lawsuits? Discuss