Professionalism assignment help -PLease use attached template

 

You will complete the Portfolio template, which will cover the areas listed below. Your information should be supported with research throughout the portfolio (minimally 3 sources to support work throughout the assignment). Be sure to explain each area below in detail:

  1. Title page that includes assignment title, your name, course, section number, and date
  2. Introduction: In this section, in 2–3 paragraphs, you will explain who you are and your chosen professional field as well as a brief overview of how you perceive yourself professionally.
  3. Lifelong professionalism and how you will maintain your image: You will give an overview in 2–3 paragraphs of how you will focus on continuing to maintain your professional image in the future of the career you have chosen to pursue.
  4. Short-term goals: 2–3 short-term professional goals (written as SMART statement). Explanation of a plan to meet each goal (1 paragraph per goal) and rationale for why the goal will support your professionalism (1 paragraph per goal).
  5. Long-term goals: 2–3 long-term professional goals (written as SMART statement). Explanation of a plan to meet each goal (1 paragraph per goal) and rationale for why the goal will support your professionalism (1 paragraph per goal).
  6. Education Plan: At least 3 ways that you can maintain your knowledge throughout your degree. Explain why each way would be important to your career (minimum of 3 paragraphs).
  7. Budgeting Plan: Explanation as to how you will budget to ensure all future education (should connect to the education plan) as well as future career marketability needs are met. (minimum of 3 paragraphs).
  8. Reference Page: Sources should follow APA formatting guidelines with corresponding in-text citations within the body of the portfolio.

Assignment Format

  • Detailed explanations for each part should be included.
  • Information should be organized clearly throughout the presentation
  • Support from outside source material should be included in the presentation
  • Template must be used for assignment

Week 2 Discussion: Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Paper Operational Excellence

Hitachi 

Prepare a Paper that describes the assigned company. – Hitachi

  

a. Technological advances of the organization that makes the product or service viable. (2 pages)

i. What technology advances are key to this company?

ii. What is the physical layout of the company’s facilities? Does this impact their use of technology?

————————————————————————————————————————————–

b. Why are their solutions good for consumers and the business? (1 page)

i. Describe any policies that they have for their customers, suppliers, shareholders, employees, and society at large. Are there any conflicting policies?

  

c. Business model to market the product or service (1 page)

i. Is the model different in various global markets?

Total 4 Pages and prepare 4 Slides 

a – 2 slides ppt 

b and c 2 slides ppt 

Need help in homework12012020

Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section that discusses both limitations and emerging concepts. 

The paper needs to be approximately 7 pages long, including both a title page and a references page. Be sure to use proper APA formatting and citations to avoid plagiarism.

Discussion 1

As stated in the text, “people and organizations are responsible for the results, good or bad, of the use of IT” (p. 576). For this discussion you will analyze the role of ethics in IT and business.  In your initial post, using an example of your choice, explain the differences between law and ethics.

Analyze the impact of ethical issues on IT, and provide an example of an ethical issue that has impacted an organization as well as an ethical issue that might impact you personally.  Explain the potential legal and ethical challenges associated with advancing technology, using at least one example from your research. Explain whether or not you believe the laws have caught up with technology. Support your position with examples from credible sources. 

Your initial post must be a minimum of 300 words.

Ethical Hacking_Week15

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Prim's Algorithm

  

The problem we can solve using a priority queue is that of computing a minimum spanning tree. Given a fully connected undirected graph where each edge has a weight, we would like to find the set of edges with the least total sum of weights. Using the scenario: 

You are an engineer and you are trying to figure out the best way to arrange for internet access in your Town. There are N (3 ≤ N ≤ 25) blocks in your town connected by M (N ≤ M ≤ 25) various streets and you can walk between any two streets in the town by traversing some sequence of roads. 

However, you have got a limited budget and have determined that the cheapest way to arrange for internet access is to build some fiber-optic cables along existing roadways. You have a list of the costs of laying fiber-optic cable down along any particular street, and want to figure out how much money you will need to successfully complete the project, meaning that, at the end, every street will be connected along some sequence of fiber-optic cables. 

As a computer scientist, you heard about Prim’s algorithm in one of your programming classes. This algorithm is exactly the solution to your problem, but it requires a priority queue.

  

· Write a program to create using a priority queue to implement a solution of Prim’s algorithm.

  

Input data describing the graph will be arranged as a list of edges (streets and their fiber-optic cost) and for the program we will covert that to an adjacency list: for every node in the graph in the town, we will have a list of the nodes (streets) it’s connected to and the weight (cost of building fiber-optic cable along). 

adj[0] → (1, 1.0) (3, 3.0)

adj[1] → (0, 1.0) (2, 6.0) (3, 5.0) (4, 1.0) . . .

Policy

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

Cloud Vender Presentation

 

In this project, you will develop a detailed comparative analysis of  cloud vendors and their services. A comparative analysis provides an  item-by-item comparison of two or more alternatives, processes,  products, or systems. In this case, you will compare the pros/cons of  the cloud service providers in terms of security, ease of use, service  models, services/tools they provide, pricing, technical support, cloud  service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers.  Include their service models (i.e., SaaS, PaaS, IaaS),  services/tools/solutions (i.e., compute, storage, database, developer  tools, analytics tools, networking and content delivery, customer  engagement), pricing, accessibility, technical support for companies,  global infrastructure.
  • One to two slides on a recommended cloud service provider based on  the comparative analysis and the cloud vendor’s abilities to meet the  service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

   

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers,  client audiences, and management. By summarizing your results and  recommendations in an effective presentation, you are demonstrating how  you use your technical knowledge to convey your ideas to others in a  professional setting. Your ability to express recommendations to  decision makers with the right mix of technical detail in an accepted  format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Physical Security

 

 Topic: Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend.  

Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.