Research Paper 10

search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

FN week 6

Prepare a 4 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

Infer Stats in Decision-Making “QUANTITATIVE” Journal Article Review

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Response Required Discussion cloud DBA

Please read the below two discussion posts and provide the response for each discussion in 75 to 100 words.

 Post#1

Nowadays, there are numerous advancements in technology. As a result, the traditional workplace has gradually transformed with home offices and virtual workplaces where employees can hold meetings using video teleconferencing tools and communicate through email and other applications such as Slack (Montrief, et al., 2020). This makes the cloud more busy which brings up the need for improved cloud security.

            Generally, in a public cloud, there exists a shared responsibility between the user and the Cloud Service Provider (CSP). Due to the rise of cyber-related crimes over the years, security for things like data classification, network controls and physical security need clear owners. The division of such responsibilities is called shared responsibility model for cloud security. “According to Amazon Web Services (AWS), security responsibility is shared by both CSP and CSC and they called it as Shared Security Responsible Model” (Kumar, Raj, & Jelciana, 2018). “While client and endpoint protection, identity and access management and application level controls are a shared responsibility the responsibility resides largely with the client organization” (Lane, Shrestha, & Ali, 2017). However, the responsibilities may vary depending on the cloud service provider and the cloud environment the user is using to operate. Nevertheless, despite the cloud services used, the burden of protecting data lays upon the user.

            Normally, security is broken down into two broad categories: security of the cloud and security in the cloud. Security of the cloud is a section of the shared responsibility model handled by the cloud service provider. It comprises of hardware, host operating systems and physical security of the infrastructure. Most of these logistical challenges are offloaded when an organization moves its operations to the cloud. In contrast, security in the cloud is the security responsibility handled by the user. “The cloud service customer is responsible for securing and managing the applications that run in the cloud, the operating systems, data-at-rest, data-in-transit, policies and other responsibilities” (Bennett & Robertson, 2019). Since access to customer data remains the most critical component in cloud computing, it also determined the level of security in the cloud to be implemented by the customer.

            The customer is responsible for the following components. First, the customer is responsible for data security. While the provider is responsible for automatically encrypting data in transit and in storage, the customer is expected to configure file system encryption and protection of network traffic. Secondly, the customer is responsible for physical security of computers and other devices used to access the cloud. Thirdly, the customer is responsible for application security. Security of managed applications may be handles by cloud provider services, but the customer is responsible for configuring those services accurately and correctly. Fourthly, the customer is responsible for security hinges on identity and access management in on-premises computing. The cloud provider can implement authentication services but it’s the work of the customer to configure them. Finally, the customer is responsible for network security on-premises.

            The cloud has various advantages such as scalability, elasticity and flexible prices. However, security is remains a critical business concern for many organizations (Xue & Xin, 2016). Regardless of which cloud service provider used, the customer will always be responsible for managing the customer data, analyzing workload, traffic and performance. When implementing cloud projects, customers need to identify and understand the risks associated with digitalization, public networks and outsourcing of infrastructure components. Shared responsibility in cloud computing depends on the agreement that the customer has with the cloud service provider. This is because there are specific tasks that can be logically handled by the customer while other duties are handles by the service provider such as ensuring physical access to the data center is restricted to authorized personnel’s only.

Post#2

 

Cloud offers variety of services and virtual machine to an organization at cost effective and is thus considered as one of the most innovative advances in technology. The ability to scale as well as stored and manage data increases by using cloud. Regulatory compliance states the modification and the steps that the organization should actively take to reach its goals. Good regulatory compliances needs to be maintained while moving to cloud so that any necessary precaution and post cloud changes can be made to the organization thus moving it closure to the goal and target. “There are straight-forward ways of modeling future ownership and the progression of value creation using a combination of capitalization table analysis and the venture capital method of valuation” (Sammut, 2020).

Protecting the crucial and sensitive data while moving to cloud is the major concern of the organization and database administrator is an intrinsic component of the authorization and control process towards regulatory compliance. DBA don’t necessarily need to know who can access the system but are necessary for database security and checking security breaches and attacks. DBA most importantly needs to know about the architecture of the cloud and the various components being actively used by the organization while moving to cloud. An understanding about the difference between on premises and cloud services including the computing stack is also a requirement for DBA. Along with that, the dba should also know how to utilize all the components of the cloud both from the point of view of administrator and developer. “While current Passive optical network (PON) standards can provide data transmission capacity of tens of Gbps, in the near future, the use of more wavelengths with rates higher than 10 Gb/s could see the overall capacity increase towards hundreds of Gbps” (Afraz, 2018).

DBA also plays the crucial role in managing the budget for the cloud database and thus should have the related information as well as knowledge about application design and impact of cloud database followed by the cost of impact. Studies suggest that it is not recommended to move all the data at once to cloud, at least not initially. The DBA thus needs to work for few days in the hybrid setting of cloud and on-premises arrangement. DBA should know the traditional skills to manage on premises activities and also the advanced skill to deal with the cloud activities and database. The initial movement of database to cloud should only include the crucial and the important effective data and thus DBA should use his understanding to decide what data should be moved to cloud followed by planning for the remaining data and deciding their time to move to cloud. Dba needs to be aware about each component of cloud, the organization services and the cloud services to maintain good regulatory compliance when moving to the cloud. “Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured” (Krishna, 2018).

Assignment

 

Portfolio Project: Find a process within a business that you feel can help that business gain a competitive advantage.

Create a word document that contains at least the following:

Start by introducing the project:
* Explain the process you will be reviewing and want to modify.
* Explain the business and industry where this process exists.
* Give an overview of the current process and how it works.

Based on the materials within this course, explain a new technology that should be deployed.
* Be very specific.  Note the exact technology as well as the specific application of that technology (i.e. technology might be Smart Automation – while the specific application might be light dimming technology).
* Identify the pros and cons of the new technology. 
* Identify how the new technology would impact the business/industry and the process that was selected to be modified.

What are the various factors the business should consider before deploying the new technology.
* Are their cost considerations. 
* What other project are impacted or might impact the deployment. 
* What are 5 to 10 things the business should consider before implementing and explain how important it would be to use the new technology (i.e. use some type of scale like ‘Critical’ vs ‘High Priority’ vs … vs ‘Good to have’).

The project must be at least 3 pages in length, double-spaced, 12-font.  This total length does not include the APA approved cover page and the reference page(s).  There must be at least 3 APA approved references, with citations, to support your work.

week 5

 Minimum words 600 words

In  the following scenario you are the CISSO of a Major E-commerce  Organization. The organization has decided to migrate their entire IT  infrastructure and associated processes to the cloud. Considering the  ecosystem of the cloud and the ever-present threats, you’ve been tasked  to develop a secure implementation plan which includes the ability for  threat modeling and simulations.

  • Paper should be developed in accordance to APA
  • Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

Concept Paper

In other words, in week 4 you are going tell the reader (the instructor) why you think your topic for your final project is worth doing. You are going to justify this as a proposal. Here is the purpose of writing a concept paper:

Purpose of a concept paper

The topic for your week 4 concept paper will be the same as your final project; they are linked together. The week 4 concept paper justifies the writing of your final project.

 

Requirements

Submit a 3 page concept paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):

 

Coversheet

Introduction.

Problem Statement.

Relevance and Significance.

References (at least five).

Pre-approved research topics:

 

Authentication/Digital signatures

Data collections tools (hardware & software)

E-business/e-commerce security

End user security issues.

Government vs. commercial organization security issues.

HIPAA

Identity Theft

ID&IH Management and Legal Issues

Instant Messaging security.

Intrusion detection.

Sarbannes Oxley

Security Threats & Vulnerabilities

Wireless technology security

Support and Software Deployment

Please respond to the following:

  • Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?

Linux Implementation Proposal

 

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies.