security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

Be approximately 4 pages, not including the references and title page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.

Compilers(Question about Computer Science)

  

1 Consider the following grammar (describing LISP arithmetic):

X -> ( E ) 

E -> O | O T

O -> + | * | – | /

T -> n | X

X == executable, E == expression, T == term, n == number

terminals == ( ) n + * – / 

Find FIRST, FOLLOW and LR(0) sets for this grammar.

Is the grammar LR(0)? Is it SLR?

2.Give a rightmost derivation of the string (x+a)*x using:

S=> E

E=> E+T | T

T=> T*F | F

F=> i | (E)

The lexical analyzer returns a token i==identifier for variables ‘x’ and ‘a’.

Display the parse tree, the syntax tree, and the expression DAG.

3. The algorithm for DOM in the text is based on data flow analysis, but it is often desirable to find the DOM tree from the control flow graph without t need to do data flow. Describe a possible algorithm based on breadh-first search to find DOM given a control flow graph. (An overview description in Englishis sufficient, you do not need a formal specification or code of an algorithm)

cc-10

 
Describe in 500 words discuss the scope of a cloud computing audit for your business. 

Operational Excellence – Paper

ITS 631 Paper #1 (Chapters 1 – 5 Bourgeois)    Niccole Hyatt, PhD Professor

100 Points Possible  Open Textbook and Resources

Individual Effort Only!

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. How can they be overcome? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? What are the disadvantages? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

5 Pages 

Quantitative Research Design Prompts

Description

This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.

Instructions

After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.

The selected question to write

3B: Threats to Validity

In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.