BI Week 15 Assignment

Complete the following assignment in one MS word document:

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted eferences (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion 1. Compare the IoT with regular Internet.

Discussion 2. Discuss the potential impact of autonomous vehicles on our lives.

Discussion 3. Why must a truly smart home have a bot?

Discussion 4. Why is the IoT considered a disruptive technology?

Exercise 3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

Exercise 4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

Exercise 6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

Writing Assignment 2

  

Discuss the difference between VBA and VB.Net. What are the differences and use scenarios for each?

· Prepare a quality, substantive journal post that addresses the objectives of the 

assignment and the expectations set forth in the grading rubric. 

· 300 words minimum is required. 

Use APA format  

Malicious Activities 2.0

The three major types of malicious activities that organizations’ information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.

mad discussion

 From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

FTK imager lite & Autopsy

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

· No Plagiarism 

· APA Format required

· Each Answer Should be 350 words without References.

!!! NEED 2 ANSWERS FOR ABOVE QUESTIONS WITH 0% PLAGIARISM!!!!

!!! One Answer using FTK IMAGER LITE Tool !!! 

!!! Second Answer using Autopsy Tool !!! 

End search 2

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

2000 words

ITISP W 1 D

 Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?