Organization that adopted Cloud Computing

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements: The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 5 pages in length with the content excluding Title and reference page. The Title and Reference pages do not count towards the page count requirements.

Please refer attachment for the rubric scoring guideline.

Bank Enterprise Information Security Policy

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel
· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers
· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer
o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel
· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking
Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures
Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]
RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.  

Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.

Analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Discussion Post 3 and Assignment

 1) Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. ( 250 to 300 words)

2) What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.

3)  Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

4)How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status

Journal Assignment

 Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.  

Chapter-4: Re-Architecting the Firm: The Core and the Edges

 In chapter 4, the author describes four types of costs that blockchain technology can reduce. 

Assignment:

Which of the four cost types, if reduced through blockchain technology, would most impact the organization for which you currently work?  

What would be the most visible impact on your job role? How could you minimize any negative impact? 

Write Two pages APA format document 

 

Journal Structure:

  • Title
  • Introduction
  • Content
  • Conclusion
  • Reference list

assignment

 

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-9

cloud compuiting professional reflection

 

Write a brief reflection on this course and on how it will aid your professional career and development in 300 words.

  • How will this course impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this course prepare you for further studies related to your chosen professional career?

1 discussion and 1 case study

Discussion 8.1

What is the role of United States Cyber Command?  

100 words only for discussion.

Case Study 8.1

 Give a real-world case of Cyberwarfare and explain the techniques used.

Writing Requirements

  • 6-10 pages in length  (excluding cover page, abstract, and reference list)

Digital Forensics

1/2.  

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

2/2.

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case? 

MIN 300 WORDS FOR EACH QUESTION (1&2). PLEASE MAKE SURE NO PLAGIARISM.