discussion-counter

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Enterprise Risk Management

Description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Cloud_Computing_week_13

Discussion Topic – Please respond to each of the following topics in different sections, labeling each section. You will perform ONE (1) reply to this post as you have always done, but answer all of these questions/comments. You are required to respond to at least two (2) other class responses. You must provide a response to all topics to receive credit.

Topics:

  1. Define and describe total cost of ownership. List at least 10 items to consider when determining a data center’s total cost of ownership.
  2. Define and describe a capital expense. How are capital expenses different from operational expenses?
  3. Define and describe economies of scale and provide a cloud-based example.
  4. Define and describe “right sizing” as it pertains to cloud computing.

 

Paper:

write a paper on governing the cloud. The following are the items to discuss in the paper:

  • Compare and contrast functional and nonfunctional requirements and provide an example of each.
  • Discuss why a designer should avoid selecting an implementation platform for as long as possible during the design process.
  • Discuss various trade-offs a designer may need to make with respect to nonfunctional requirements.
  • Discuss why the system maintenance phase is often the most expensive phase of the software development life cycle.

Paper requirements:

  • Minimum 1600 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of six (6) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Excel question

 

See assignment 10-45 

Provide the answers to all the descriptive statistics, stated in the problem.  

Correct output is required.  Also, presenting the work in a very professional and visually appealing manner is required to get full credit.  

Do Not send the final results in a protected view.

Make sure your formulas are included in the worksheet,  This allows me to change the numbers and confirm that the new answer is calculated correctly.

 10-45. Because of the employees’ increased use of IS resources for private purposes at Campus Travel, you have announced that a new acceptable use policy will be implemented. You have set up a website for the employees to provide feedback to the proposed changes; the results of this survey are stored in the file EthicsSurvey.csv. Your boss wants to use the survey results to find out what the greatest concerns in terms of ethical implications are for the employees, so you are asked to do the following: 

■ Complete the spreadsheet to include descriptive statistics (mean, standard deviation, mode, minimum, maximum, and range) for each survey item. Use formulas to calculate all statistics for the responses to the individual questions.  (Hint: In Microsoft Excel, you can look up the necessary formulas in the category “Statistical”; you will have to calculate the ranges yourself.) 

■ Format the means using color scales to highlight the items needing attention.

 ■ Make sure to professionally format the pages before submitting them to your instructor. 

information-seeking

Present and discuss your methodology regarding the information-seeking from different databases that can be used to find the information in a selected domain in Computer Science or Information Systems. Present the fixed references by indicating from which databases you have obtained them.

Support your discussion with at least five references

Discussion

 

This is a required assignment worth 20 points (20-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation.  

Security architecture and design final paper

  

Respond to each question below. Remember to cover all aspects of the question.

Successful security architecture needs upper management to support for effective security standards and protocols. However, there are possible disadvantages to upper management involvement. List and describe the tradeoffs in business between rigorous security and delivering products to customers. Go beyond merely the automated solutions, or the technical checks that can be done without much human support.

Examine how capturing, standardizing, applying patterns, and standard solutions help to increase efficiency and maintain delivery teams’ velocity. Provide at least 3 real-world examples which describe and examine how they provide the velocity. Do not simply provide a list of things teams can do but for each idea, define the idea and explain its relevance. 

Schoenfield lists several components of a successful security architecture practice, such as broad support across the organization, recruitment and training of security architects with the right kind of aptitude and interest, effective security requirements that enhance but do not slow down the innovation process, and finally, indicators that the security architecture team is being well utilized and adding value to project development. Describe what each of these components are and explain how each is relevant to security development. Include detail and examples.