Research Report

  

This requires the completion of 3 elements: 1) Software Architecture, 2) Analysis & Design, 3) Report & Overview.

  

Coursework Documentation/Report

You are asked to address the aims and business requirements by producing a report, based on your own wider reading and research including relevant citations to recent literature, which covers:

1. Software Architecture (20%)

This should include selection, analysis and evaluation of architectural styles based on the work undertaken in the broader subject area. This should also include some recommendations for a suitable, to the above problem, architectural style.

2. Architecture Comparison (20%)

This should include the overview of the benefits of software architecture using software quality factors, highlighting advantages and disadvantages of two architectural styles such as object and service orientation, and a suitability analysis of the service based architecture. 

3. Analysis & Design (20%)

This should include a discussion of your analysis and design aspects decisions. It should also include requirement specification and design diagrams such as component, class and sequence diagrams.

4. Migration Strategy and Technologies (20%)

This should include selection and reviewing potential Cloud services, mapping of a selected architecture onto the Cloud with clear migration strategy. This should also include and the potential technologies for the implementation.

5. Report & Overview (20%)

This covers the report’s overall content, research, legal, social and ethical issues associated with software construction, referencing, flow and structure. 

Data Center Security

Write about Data Center Security in 700 Words  double spaced paper, written in APA format, showing sources and a bibliography  and also prepare PPT consisting of 10-12 slides about Data Center Security

Misleading Graphs

 1 page

For this discussion, you are to choose one graph, and complete these steps based on the graph you chose:

Steps

  • State the graph you chose.
  • Discuss how you interpreted the graph when you first saw it.
    • What did it tell you about the data represented?
    • Did you find it confusing?
  • Now, study the graph. Use your understanding of the topics Graphs, Pie Charts, and Bar Charts to interpret what is being presented.
  • Compare your first impression with your second more informed interpretation and answer the following:
    • Is the information presented in a biased way (that is, is it misleading?)
    • What information is being misinterpreted here? How?
    • What type of graph was used and was it used correctly?
    • How could you correct the graph so that it more accurately represents the data?
  • Discuss why someone might intentionally use a graph to mislead?

Assignment

 For this assignment, create a continuous improvement plan for the Cloud.  If you would like, you may use the continuous improvement plan example as a template.   

Privacy and Security Considerations for Information Governance

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Initial post due Thursday

Cyber security planning and management

It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters? 

300 Words

EH week13 p13

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please reference and follow the attachments and needed 2 pages words. Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.