week5

 

  1. Discuss what power in the context of leadership is and how it  relates to bullying within organizations. Also note how this impacts  productivity.
  2. Discuss what organizational culture is and how it impacts work  productivity. Also, note how organizational culture impacts the success  of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

· Share an applicable personal experience

· Provide an outside source

· Make an argument

At least one scholarly (peer-reviewed) resource should be used in  the initial discussion thread. Please ensure to use information from  your readings and other sources from the UC Library. Use APA references  and in-text citations.

cloud computing

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

cyber law

1. Assignment 1  

Complete the following two steps:

A. On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words.

B. Respond to two classmates’ postings. Minimum 100 words per posting.

2.Assignment 2

 

Module 12 Assignment: The Silk Road and the Darknet: The case of William Ross Ulbricht

Module 12 Assignment

 

Module 12 Learning Resources: the Darknet

https://www.investopedia.com/insights/what-dark-net/ 

1. Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court.

2. The minimum word count shall be not less than 500 words.

quicksort algorithm

 (1) Please generate an array with 11 elements, which is the best case at the first iteration of QUICKSORT algorithm and then is the worst case for both subarrays at the second iteration of QUICKSORT algorithm. The last element is used as Pivot.

 (2) Please explain your answer is the worst case and the best case for the first and second iterations.

  2. Please sort the input array [9 -9 15 35 -1 14 20 7] using QUICKSORT algorithm to output an increasing order array. The last element is used as Pivot (please show detailed steps for full credits)  

cloud computing

 

Please develop a recommendation to acquire outsourcing services for the purposes of having a totally external IT operation for one of the companies provided below. Identify the needs of the company based on the scenario to select the appropriate cloud service (PaaS, IaaS, or Identity as a Service). Include the following: define the scope of the problem, review of the cloud provider, estimated cost, describe the services to be provided, and explain the justification.

Paper Requirements:

  • Select a valid cloud vendor
  • Specify which scenario you are addressing by naming the business from the scenario in your paper.
  • Paper length: 2-2.5 
  • Minimum References: 3
  • APA

Select from one of the following scenarios and research a cloud platform to address its needs. The solution must be of the following: PaaS, IaaS, or Identity as a Service

  1. Stark Accounting Inc. – Stark Accounting plans to merge with another company, DGT Inc. As a part of the planning process, Stark wants to identify an appropriate method to provide authentication for both companies during the merge. They both currently use Active Directory (SAML). They are open to a Federated system or moving to a new shared authentication method as long as it does not require centralized hardware in either location.
  2. Emerald Consulting LLC – Emerald Consulting has 5 massive data centers which has a high cost to the IT operations budget. The CTO of the company has mandated a 25% reduction in cost over the next year. As the director of IT, you are required to identify possible solutions to present to the executives showing options to reduces the cost associated with the data centers. Also, the company expects to expand globally which may create more stress on the IT budget.
  3. JML DevOps Inc. – JML is working on a major project with limited funding. The project requires the build on new servers for their developers to create, design, and deploy a new web application. JML does not have any server administrators available to work on the hardware infrastructure which leaves the developers in a critical bind. The project will also need storage for its content as the application will collect over 10Gb of data daily. Although, the project has limited funds, if a solution is found to complete the project in a timely fashion without pulling from the server admins, they are open to additional funding for the project.

Choosing a Methodology

 

Read the Manage Your Health Inc. Case Study and complete the assignment below.

Consider the differences between Agile and waterfall.

Select 1 methodology to use for a project plan for this initiative.

Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:

  • Name of task
  • Duration
  • Predecessors
  • Notes

After completing your simplified project plan, write a 175-word paragraph and complete the following:

  • Define which methodology, Agile or waterfall, is most appropriate for this project. Why? Cite at least 2 sources to support your rationale.
  • Describe the following roles for this project: project manager, project sponsor, business analyst, and scrum master or program manager.

You may create your simplified project plan using Microsoft® Excel® or another software application of your choice. 

Cloud computing within an enterprise risk management framework

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Residency Research Makeup Project

Acme Enterprise Scenario Residency Week

Acme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc. 

Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO. 

Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:

1. Perimeter Security

2. Network Security

3. Endpoint Security

4. Application Security

5. Data Security

6. Operations

7. Policy Management

Acme Perimeter Security

Acme is currently protected by two dual Dynamic Stateful Inspection Firewalls that are configured in active and stand by mode. Acme is also configured to use PAT (port address translation) where 200.200.200.1 represents Acme on the public Internet. Acme translates this public IP through its clustered firewall to the internal IP space of 10.100.0.0/16 giving Acme 65334 useable IP addresses. 

As part of Acme’s infrastructure, it also accesses cloud services for its business office tools through Office 365 and uses Dropbox for end user’s storage. Acme uses a web hosting service for its web front end and ecommerce which is connected to a back-end Oracle Database using enterprise MySQL. The database administrators have full access to all database information, but they lack oversight from anyone else. 

There are two DMZ’s, but they are not utilized. 

Network Security

Acme has a collapsed core design which means all internal LAN routing and Internet access occurs on its distribution level devices. This means, wireless access, web proxy access, access control lists and entries are located at this layer of the infrastructure. Currently Acme is using WPA 2 (wireless protected access 2) for is wireless security. The web proxy is configured with the following: General, Limited, and Exclusive Internet access. Each of these categories dictates what type of Internet access an end user will experience if belongs to one of these groups. 

The Local area network uses the IP block in the following way: 10.100.1.0/24 User VLAN, 10.100.2.0/24 Research and Development VLAN.

Current access control lists are permit 10.100.2.0 0.0.0.255, permit 10.100.1.0 0.0.0.255. All other devices use the rest of the unallocated IP block of 10.100.0.0/16. 

Also, all IP space is statically assigned. There is one default route to Internet but users of complain about access to internal services. 

Endpoint Security

There is a mixture of MAC and Windows systems, XP, 7, and 10. JAMF is used to control and monitor MAC systems, the Windows devices rely on its end users to patch and update systems. The current endpoint security is signature-based MacAfee with no centralized control. 

Application Security

DevOps is responsible for secure coding and development of applications, but it has no formal oversight. Policy for application monitoring tracking is adhoc there are no formalized procedures. The server farm houses all applications, the operating systems range from Server 2003 to 2016. Mobile device management, media server, content management, file server, directory services, database, are all the services being offered from the server farm. This server architecture is all hardware based there are no hypervisor systems in place. 

Data Security

Data has not been classified, identity access management relies on one factor authentication; encryption, digital signatures, PKI rely on self-signed certificates, protection in the cloud is also missing and there is a lack of DLP (data loss prevention). Acme does store financial information in its data center as well as personal identifiable information. 

Operations

Information technology is responsible for security however there is a security team under the IT department. The Chief Information Security Officer reports to the Chief Information Officer. 

Policy Management

Acme has one Information Security Policy that addresses its information security architecture and program. It is not based on any of the existing information security management frameworks such as: IS0 27002, NIST CSF, or COBIT 5. 

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment concepts we have learned about thus far. Each of the areas of the infrastructure mentioned above is where you will concentrate your assessments. After you have completed your risk assessment, you will then provide recommendations for each area that you assessed to reduce risk, exposure, and threat. Also, as part of your final submission demonstrate through a redesign where your mitigations will take place within the architecture. You can use the image below as guide for your risk analysis of each area.

PPT:

 Develop an 8 to 10 slide PowerPoint presentation with notes to summarize your written assignment. Be careful not to copy and paste excerpts exclusively from your written assignment