IT204 office 365 Application assignment 2

Note: Unicheck is not used for this assignment since you are re-formatting  instructor supplied text.

Use the text below and format as described. Copy and paste it into your document. The font for the header is Arial Black or another sanserif font. Use Times New Roman for the body. Your press release should fit on one page. You may need to adjust the photo’s size to make this happen. Run spell check to correct misspelled words as there are intentional misspelling and grammar errors in the original.

We will discuss the tools for this assignment in class, you can use online sources as a refresher.

Submit by Sunday 11:59 PM.

Email Richard Lanier with any questions. [email protected]

This is the beginning of the document you will submit.

(1 blank line from the top of the page)

Press Release (Center, 20 point Arial Black font, red color with a light gray fill)

For Immediate Release 1/12/2021 (center, underline, 12 point Arial Black font not bold)

(2 blank lines)

Celebrate the end of Covid! (Times New Roman font, bold 12 point, centered. Indent the following paragraph one tab)

You are invited to atend an a walkathon (Times New Roman font, 12 not bold 1.5 line spacing) to raise money for the capital area food bank. (capitalize and bold and underline the words capital area food bank) All money that is raised will be donated to feed hungry people in the Washington area. Please wear a mask ans social distance.

Date: Saturday, June 19, 2021

Time: 10:00 AM 

Place: The Mall in Washington, D.C. (Use bullets and indent two tabs for the date, time, place)

Contributions accepted. You decide what to give. (Indent two tabs, but no bullet)

Come join the fun! (Bold, 14 point, center, yellow highlight)

(1 blank space.  Make a bullet list for the following. Left align the list, one space, 14 point  not bold)

Exercise while helping people.

Wear comfortable walking shoes.

Free water and snacs will be provided.

Wear a mask and social distance. (add one line)

Insert a photo of someone jogging on the right of the type you just pasted. Rotate the photo and add a picture border.  Add as many lines as needed after the photo to fit the following information. Add a picture watermark titled Press Release.

Sponsored by students of I Global University, Fals Church, va (left align, 12 point type)

For more information, contact

Your name

Your email address

Check the document properties. Who created it? When was it created. Write this at the bottom of the page. Created by ______________ Date _______________.

Add a page border and a watermark. Add a light value background color to the page.

Part 6 – Plan for Business Data and Analytics

 

You are the Vice President of Information Technology at a small, growing business. You have been tasked with developing a plan for maintaining databases for storage of business data and use in business analytics. 

Using the work from Weeks 1-5, create a 20-minute presentation (10-12 slides) to explain your Database Management Plan. Ensure you:  

  • Provide an overview of how databases can be used in a company to store and extract information. 
  • Distinguish how organizational data can be used in the most effective way through developing a database. 
  • Compare how structured and unstructured data are used for data analytics, including concepts like Cloud and Hadoop. 
  • Evaluate and assist company decision makers in understanding the importance of database administration and data governance in relation to building scalable and robust applications. 
  • List the benefits of data administration compared to database administration.  
  • Propose an effective data governance program. 
  • Recommend how individual team roles can contribute to finding ways to build in ongoing monitoring; all roles have an interest in database quality and recovery. 
  • Summarize how your plan will assist the company in overall effectiveness, including the value of analytic results, such as data visualization and finding and applying patterns. 

Your goal is to convince them that by implementing your Database Management Plan, the organization will be able to deliver effective, reliable data management support to meet business needs.

Operational Excellence

 

Organizational Diagnosis Questionnaire.doc 

In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found aboveProvide a detailed analysis of what is working and what is not working.

Your response should be 250-300 words. 

You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (250+ total words) and include at least one APA-formatted external citation/reference.

Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings.

Assignment

 

1). Download and install the “R” Programming tool (CRAN) onto your computer. First install the “Basic” version of “R”, then (2) install the “R” Studio. (3). Download and install the MySQL plug-in for Excel onto your computer. (4). Download and install the Python programming tool onto your computer. Verify successful installation of all tools by attaching one screen shot of each that display your completion of each software installation. A total of  four screen shots (2 for “R”, 1 for MySQL, and 1 for Python) is expected. Save the screen shots as a MS Word document (*.docx).

Either click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename.). Also, please summarize in 1 -6 lines (in the Comment box) how the installation went for you. That is, what problems, if any, did you have and how were they solved?  What things went right for you during the installation?

Tailored vs. Ready-made Software

  

Overview:

In your position as the IT manager at your local hospital, the medical staff of the cardiac ward would like to build an expert system for diagnosis. Your preliminary review shows that the financial investment would be considerable. Your IT Director asked you to write a 2-3 page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• Explain the differences among the alternatives to tailored system development,

which include:

o outsourcing

o licensing ready-made software

o using SaaS

o encouraging users to develop their applications.

• List the business trade-offs inherent in the various methods of acquiring systems.

• Describe which systems acquisition approach is appropriate for the medical staff

of the cardiac ward at your hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

ERM WK3 -S

 Q1. 275 words

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Q2. SEPARATE DOCUMENT —- Research paper – 5 full pages

 Readings: 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

The above article readings  give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

Network traffic analysis

It is expected that your report will be in the region of 1500 words.

You are expected to conduct an analysis of this network packet capture— (will provide) using Wireshark. You are required to present your findings in a factual manner, to convince decision makers of a large corporation on business strategies.