Disaster and recover planning

 

Please enter your response to both questions posed below.

Total word count must be 250 to 300 words in your posting. (20 points)

Please also respond to at least two of your classmates with a meaningful reply of 150 words or greater each. (5 points each)

Do not cut and paste, please post original work.

Please provide references for your original postings in APA format.

1. Provide a summary of the importance of planning for a disaster

2.  Briefly describe the types of disasters that could occur that would require a Business Continuity and Recovery Plan

3. What legal or regulatory requirements would be likely to apply to a given organization? 

Case Study Analysis

 

Find a case study that has a history of poor leadership and analyze what you would do as a leader by completing the steps below.  (I have also attached an example of a what a case study analysis looks like that you can use as guide.)

1. Introduction: Investigate the Company’s history and growth.

2.  Background information: Identify strengths and weakness

3. Examine the external environment

4. Analyze your findings

5. Identify the corporate and business level strategies

6. Analyze implementations

7. Make recommendations/Proposed solutions

Make sure to review your paper when complete for any errors.  Follow the APA guidelines.

topic

  minimum of two paragraphs and should be between 200 and 250 words. The font is Times New Roman, font size should be 12, and the paragraphs are single-spaced. There should be a minimum of one reference supporting your observations. Citations are to follow APA 6.0 or 7.0, but not both.  

Research Paper – Cloud Computing

Three Page paper excluding references and title page.

APA format.

There are two parts to this weeks assignments:

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Help

MY FIELD OF STUDY = IT

Research a product or service relevant to your chosen field of study. You will be creating a hierarchical process map, consisting of three levels, that could be provided to a development team to follow to ensure that the intellectual property is protected. The process map will be focused on opportunities for intellectual property (IP) protection within the context of the creation of a new product or service relevant to your field of study. Proper protection for products/services often requires multiple forms of protection. Map out the process of appropriate protection of intellectual property, making sure to consider the legal processes involved. It is important to select the correct tool for the creation of a quality process map and the corresponding presentation. 

1. Create a process map to describe intellectual property protection within the context of the creation a new product or service relevant to your field of study. Your map should include a minimum of 10 process steps.

2. Describe the intellectual property protection mechanism required to protect your product.

3. How is this intellectual property captured, registered, and/or protected?

4. Clear inputs/outputs.

5. Clear scope definition.

6. Incorporate at least one subprocess.

7. In addition, in a minimum of 200 words, articulate and demonstrate how teamwork is integrated into, and supports an organization. 

 NOTE: Each question should be a heading 

Access control strategies

Access Control Strategies

Introduction

In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The specific course learning outcome associated with this assignment is:

  • Determine an access control strategy based on existing documents.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Scenario

Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI’s coding development projects often encompass classified information and personally identifiable information (PII).

Instructions

Write a 2- to 4-page paper in which you:

  • Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
  • Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
  • Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
  • Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
  • Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.​​​​​​ 
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.

Write a program to create a database from

 Java

Write a program to create a database from the data in the sequential file you created in Week Four.
 

Modify the GUI to connect to this database and add entries to it and read entries from it. Entries read from the database should be displayed in the JTextArea or JTable.
 

Test and debug this final program.
 

Submit the .java source file or files.

 

Research

 

Assignment Instructions

  • Define cybercrime and the categories of cybercrime.
  • Research how cybercrime (either in general or with respect to  certain crimes — e.g., hacking, identity theft, cyberstalking) is  handled in at least three different countries (one can be the United  States).
  • Compare and contrast each country’s laws. What ethical issues  arise as a result of differences in cybercriminal prosecution across  cultures?
  • How will your understanding of cultural differences affect your ability to make decisions within your company?

Assignment Requirements 

  1. Your paper should be a minimum of 3 pages and formatted according to APA guidelines.
  2. Use Times New Roman 12 pt font.
  3. Add a Table of Content
  4. Define cybercrime and the categories of cybercrime.
  5. Research on the Internet how cybercrime is handled legally in three different countries of your choice.
  6. Compare and contrast the laws in each different country and  discuss the ethical issues that arise due to the differences in how cybercrime is prosecuted across different cultures.
  7. Explain how your understanding of these different ethics and  laws across cultures will affect your ability to make decisions within your organization.

Semester Project Final Submission

This will be the last submission of your Semester Project.

You are expected to have a final draft of the project handed in. The security policy should be complete in all aspects.

attachment: -case  project rubric

                    – example paper