What is considered a systematic review of literature? Why is it important to incorporate into your support of evidence?
What is considered a systematic review of literature? Why is it important to incorporate into your support of evidence?
Follow the steps and instructions given in the IST 634 Assignment file
Instructions:
You will complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly. You will download it from this site.
You will code the following and submit it in one file. Use the information in the Lessons area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.
“
Joshua Kreider
Week 8
26DEC2020
“
Month 1 is January
Month 2 is February
….
….
Month 12 is December
For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
• Describe the organization’s environment, and evaluate its preparedness for virtualization.
• Explain Microsoft (or another product) licensing for virtualized environments.
• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.
• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.
Describe IAD’s set of top strategies to fit these goals of “Confidence in Cyberspace” guide.
Describe PKI, what is it? What components/parts/parties is it constituted of?
Describe Four Major Concepts of Cryptography.
Writing Requirements
REFRENCES SHOULD NOT BE OLDER THAN 2015
REFRENCES SHOULD NOT BE OLDER THAN 2015
Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.
This week you will use the Bureau of Labor Statistics website to search for income data on the occupation you are seeking. Visit the following website: https://www.bls.gov/bls/blswage.htm (Links to an external site.)
The BLS has wage information for hundreds of jobs and data can also be found by state. There is much information here so take some time to browse around.
Once you arrive at the site, complete the following steps to gather the data you need to answer the discussion questions.
Part 1
Part 2
Step 3
Include the following in your discussion post:
What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.
Minimum 600 words
This assignment should be in APA format and have to include at least two references.
Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?
Discussion Topic: Define the advantages and disadvantages of securing cloud-based solutions.
Paper:
Write a paper on securing the cloud. The following are the items to discuss in the paper:
Paper requirements:
** RESEARCH PAPER**
please address the following in a properly formatted research paper:
1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
2. Are there other frameworks mentioned has been discussed in the article that might be more effective?
3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?
Your paper should meet the following requirements:
Be approximately five to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
**DISCUSSION POST**
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.