Final Project

This is an individual project

Select a company below.

1. using the attached template, prepare a Disaster Recovery Plan.  Instructions are on the first page of the  Disaster Recovery template.

2. prepare a diagram of your disaster recovery solution.

List of Companies:

  • Time Warner 
  • Aetna 
  • American Express
  • Nike
  • Macys
  • Toys R Us
  • Computershare
  • DirectTV 
  • UPS
  • Johnson & Johnson 
  • Fidelity Investments 

Post your disaster recovery plan and diagram of your disaster recovery solution in PDF’s in the Discussion Board.

Grading – 25 Points broken down as follows:

– 20 Points – Contents of Disaster Recovery Plan

–   5 Points – Disaster Recovery Solution Diagram

Classification Model

 Give an example of a case where you would assign higher cost to False Negative (FN) then False Positive (FP) 

One page in APA

Cloud Computing

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Discussion: IT Security – Phishing

 

You arrive at work, open your email, and see this:

Employment Opportunity!!!

This Job is currently recruiting. A Job that will not affect your presents employment or studies, fun and rewarding. You get to make up to $300 weekly, I tried it and i made cool cash, If You are interest you can visit their website at http://getacoolJobreallyfast.work to apply and read more about the job.

Best Regards,
Human Resources and Benefits
Pyramid Placement Agency
5555 Fifth St.
Anytown, US 11111
HR&[email protected]

There are many things in this example that let you know this is not a real opportunity for employment, but more likely an opportunity for someone to gain access to your computer and your company’s private information. However, real-world attempts are not always this obvious and can take many forms. Social engineering, phishing, malware, spoofing, hacking, and card skimming are all risks to our personal and business information.

In your discussion post, consider the scenario presented here, or a real-world example of phishing, as you respond to the following:

  • Describe indicators you can use to identify a phishing email.
  • Explain the importance of employee knowledge concerning phishing attempts.
  • Provide several recommendations for information security practices that could be implemented to limit the risks and impact of phishing emails.

When responding to your peers, provide an additional suggestion for an information security practice they did not identify, and explain how your suggested practice would deter or reduce the impact of phishing within the company.

To complete this assignment, review the Discussion Rubric.

Cloud Computing technologies for Netflix

select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization. 
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. 
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short? 
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Minimum 6 Paragraph for Intranet in your organization.

Minimum 6 Paragraph for Intranet in your organization.

Intranets serve a variety of important uses within organizations. From communication venues such as private messages and blogs to organizational directories intranets enable  some incredible advantages to organizations.  Describe an experience in which you have utilized an intranet, be detailed about the purpose and tools utilized. 

1. Minimum 6 Paragraph

2. DO NOT include a title page. 

3. Minimum 3 references and please cite in APA format.

Risk Assessment Matrix and Continuity Plan

 

Assignment Content

  1. This week you take on the role of the Senior Network Engineer for the organization you chose in Week 1. As a Senior Network Engineer, your responsibilities may include designing the network infrastructure, resolving network issues, addressing user needs, and suggesting improvements to network performance.

    As a Senior Network Engineer for your chosen organization, one of your responsibilities is to formulate the IT Divisions Risk Assessment Plan, resolve network issues, address user needs, and suggest improvements to network performance for the NexGen Network in the Middle East.

    Research information about your chosen organization to complete this week’s assignment.

    Complete a 4- to 6-page (does not include title or reference pages) Risk Assessment in Microsoft® Word that includes:

    • A Risk Assessment Matrix
    • Identify five potential risks:
    • Describe each risk.
    • Determine the likelihood of each risk.
    • Outline the impact each risk has on the organization you chose.
    • Explain a mitigation strategy for addressing the risk.
    • Continuity Plan
    • Plan for business continuity
    • Plan for IT disaster recovery
    • Include risks and concerns to consider during recovery
    • Include APA-formatted citations when necessary.

Assignment

 

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

CC W 5 A

Write a 3-5 page double space paper about how this course is relevant  to your current or future job.

Course – Cloud Computing

Job – Salesforce Developer / Software Developer / Software Programmer

3 – 5 pages are mandatory