Practical Connection Assignment: Operational Excellence

  

Practical Connection Assignment: Operational Excellence

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Cloud Computing

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

IT Discussion

Essay on what non-executives need to know regarding technology.  Especially in regard to innovation technology.  Please note some key foundational factors that non-executives need to know and understand regarding technology.  Also, note how non-IT departments interact with IT and how the change in the market will change how business is performed. 

 Your response should be 250-300 words.  

testing

 1 page

  1. Search the internet for best practices on testing new technologies (focus on ensuring that the technology works as it is needed). This needs to include current theories, models, and techniques in the analysis, design, implementation, and testing of secure network infrastructures across LANs and WANs (since all solutions depend on to some extent the network).
  2. From your research, select the 3 tips that you feel are the most likely to help and your reasons why.
  3. Include in your report the ways that you would keep the project on schedule.

Cloud Computing and Digital Forensics

Review in 500 words or more the video below called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

paper ERM

 how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Question 2

   

https://cacm.acm.org/news/238978-22-texas-towns-hit-with-ransomware-attack-in-new-front-of-cyberassault/fulltext

https://cacm.acm.org/news/238978-22-texas-towns-hit-with-ransomware-attack-in-new-front-of-cyberassault/fulltext

https://cacm.acm.org/news/238987-app-allows-inspectors-to-find-gas-pump-skimmers-faster/fulltext

https://cacm.acm.org/magazines/2019/9/238974-inspired-by-the-home-of-the-future/abstract

https://cacm.acm.org/magazines/2019/9/238964-an-interview-with-andrew-odlyzko-on-cyber-security/fulltext

https://cacm.acm.org/magazines/2019/9/238961-can-you-locate-your-location-data/fulltext

a. Select an article from the above list, preferably one that details ethics in technology-related concern or one that explains a new technology or service. 

b. Summarize the article (3 paragraphs) and include a concluding paragraph that explains how you as IT professionals would use this information.

security architecture solution as a diagram

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Job search 3.0

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?
  3. 1000 words

What are the Consequences of Software Piracy?

 

For this assignment you will prepare a write a two-page essay on a current technology issue.

You may choose one of the technology issues from the list. Research your topic using a popular search engine or other resources. Print out at least three articles that you will use as sources for your project. Read and highlight the important and pertinent facts that you want included in your project.

Write a two-page essay (double spaced) on the topic. As with all of the issues, there are positive and negative points to consider. I want you to present facts derived from your research, and then state your opinion on your topic. You must have 3 references.