Preview the document

read the articles and answer in 200 word.

Read two articles Legal Status of SE.pdfPreview the document (published in 1995) and Push to Make SE respectable.pdfPreview the document (published in 2000). Post a message of at least 200 words to meet the following requirements:

1. Tell us your understandings on software engineer’s working condition and social status in the last three decades. You can also include link(s) to article that is related to this discussion.

2. Provide constructive comment on at least one other student’s posting. “Agree with you”, “good thoughts” etc. are not counted as constructive commenting and do not count.

ERM Certification

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

 Use proper citations and references in your post.

You can refer below URL :

 https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

BSWP Week 5

  

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

· such as common names, real words, numbers only

· require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necessary.

Linux Implementation Proposal: Client Response Memo

 Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

How Will My Work Be Evaluated?

In writing a clear and concise memo in response to senior management queries, you are demonstrating your communication skills, technical expertise, and responsiveness to customer/client needs and concerns.  

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas. 
  • 2.3.2: Incorporate relevant evidence to support the position. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 
  • 12.3.2: Describe the implementation of controls. 
  • 12.4.1: Document how IT controls are monitored. 

Operational Excellence

APA format

plagiarism free

Assignment 1(1 page)

Discussion: This week we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important.

Assignment 2(1 page)

Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc. Define each of the maturity stages and performance dimensions. What are the key concepts from each section? (Information Technology and Organizational Learning) Chapter 12.

Assignment

 

To  successfully run any business or operation, one must have and utilize a  business strategy. Company leaders utilize business strategies  to achieve their organizational goals (Jamsa, 2013). The author lists  seven plans that may comprise an organization’s business strategy.

(1) List FIVE of Jamsa’s plans that business executives may use to achieve their business goals. 

(2) In 450 – 600 words (excluding Title Page and Reference List), explain some possible benefits of using EACH of the FIVE plans you choose and possible issues if each plan is not used.

  • List each of the five plans as a Level 1 Heading
  • Title page required
  • Abstract required
  • Write in third-person only
  • Proper APA 7 referencing is required 
    • in-text citation
    • References List

Order # 12531

Title: Network Security

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine that you are responsible for creating a security and privacy plan for a small doctors’ office that has 4 doctors and 10 staff. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Include the following in your 5–6-page security and privacy plan:

•Create an enterprise-wide network security plan for an organization.

•Describe the most common vulnerabilities, risks, and issues that your plan will address.

•Describe a plan for standards to protect the users from harming the network and system, both intentionally and accidentally. Discuss how these will be enforced.

•Include policies that protect the hardware and physical aspects of the network.

•Identify hardware areas that need to be secured.

•Describe steps that will be taken to ensure the security of the operating systems and network files.

•Discuss measures that are necessary to protect the transfer of data to and from the network.

•Apply the concepts from the assigned practice lab activity.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.