IT470 week 7

Week 7 discussion topic

Share and explain what is the point of virtualization? Also feel free to explain to add what devices or areas in the computer that are virtualized or how it is virtualized?

Feel free to share diagrams, small videos, or links that can help understanding the topic. Ask questions if you need help understanding anything.

not more than 350 words. use diagrams, videos etc. to help explain.

Grading Rubric for Discussion Board (attached)

The main response to the DQ must be loaded to UniCheck for Plagiarism validation. Find the loading folder under week 7.

Data base fundamental

 

Databases store, organize, collect, and retrieve data, and, given the amount of data some databases store, how they’re built can seem disjointed and confusing. To overcome these obstacles and make databases useful, computer scientists developed complex algorithms and database designs to create efficient and accessible databases. Relational databases are an example of this type of solution. They store data in tables that are related by different unique keys so that relevant data is stored together, but different data combinations can still be retrieved using the unique identifying keys.

In this assignment, you will explore these topics by creating a simple query to retrieve data, normalize a sample database, and design an entity relationship diagram (ERD). 

For further instruction, read the attach document.

Discussion: ITS-833: Information Governance – Data Cleansing and De-Duplication

Discussion Week 1 – Data Cleansing and De-Duplication

Word count: 300+ words

Organizations are struggling to reduce and right-size their information footprint, using data governance techniques like data cleansing and de-duplication. Why is this effort necessary?  Briefly explain and support your readings, using APA-style citations.

  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post

Textbook:

For this assignment, please read chapters 2,3,4, and 5 from the below textbook.

Textbook Chapter 2 – Information Governance, IT Governance, Data Governance: What’s the Difference?
Textbook Chapter 3 – Information Governance Principles
Textbook: Chapter 4 – Information Risk Planning and Management
Textbook: Chapter 5 – Strategic Planning and Best Practices for Information Governance

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

Business Process

Discuss what is a business process? Pick one specific IT industry and explain what business process they are implementing? Suggest what kind of new technology can that industry deploy as a change? Discuss the pros and cons of the selected technology. And discuss various factors that businesses should consider prior to implementing or deploying new technology. Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

The above submission should be 3 pages in length. The total length does not include the APA-approved cover page or the references.  There should be at least three APA-approved references.

final project report

 

  • Write a 1500-2000 words-long project report.
  • Your final report should outline the key findings of your data analysis as well as suggestions for how your intended audience should respond to your findings.
  • Your project report should include 4-8 charts. You can use the charts you have submitted in project showcase. 
  • Your final report is expected to be brief rather than a long, detailed report. 
  • Your project report should not include a table of contents or bibliography.
  • Your project report should be written as if it were addressed to your intended audience (CEO of a company or a manager) rather than to your statistics professor.
  •  At the top of your first page, include a brief description of who the intended audience is.
  • Include in your report a clear recommendation for your audience of  what steps (i.e. hire an advertising manager, rent a new facility, advertise more, shut down the business, etc.) they should take in response to your analysis.
  • R programming should be used for analysis and coding, with a brief explanation of code included in the.qmd file.
  • explain the algorithm used for the analysis and why it was chosen for the dataset
  • should analyze using either regression or classification models and explain the outcomes

Python

  Write a function that checks whether your game character has picked up all the
items needed to perform certain tasks and checks against any status debuffs. Confirm checks
with print statements.
Game Character has the following item list: [pan, paper, idea, rope, groceries] Game Character has the following status debuffs: [slow] Task 1: Climb a mountain – needs rope, coat, and first aid kit, cannot have slow
Task 2: Cook a meal – needs pan, groceries, cannot have small
Task 3: Write a book – needs pen, paper, idea, cannot have confusion
 

Features for a research paper

The ability to write and format a research paper is an essential part of your academic career, and proficiency in this will help you write reports in your professional career as well. There are many things to consider when writing any document, including layout, formatting, spelling and grammar, images, etc. It is critical that you have a good understanding of these items in order to present your ideas according to the standards of your class, professor or supervisor. Assume you were to create a research paper for one of your classes or a professional report for your employer, in addition to the aforementioned features, which functions of Word would you utilize and why?

100 words minimum 

Application Security Discussion (400 words)

Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.

Answer the following question(s):

  • Does a multilayered defense guarantee that attacks will not be successful? Why or why not?

Requirements:

  • Sources: 2 References to Support your answer
  • Citation Style: APA format
  • Length: 2 – 3 para graphs

DIGITAL TRANSFORMATION

Task

REPORT

Avoid any !copy-paste” prac2ce to prevent possible problems of plagiarism. This is an individual assignment.

Background

Encyclopedia Britannica is a general knowledge English-language encyclopedia formerly published by Encyclopædia Britannica, Inc., and other publishers (for previous edi2ons). The Britannica was the longest running in-print encyclopedia in the English language, being printed for 244 years. The 2010 version of the 15th edi2on, which spans 32 volumes and 32,640 pages, was the last printed edi2on.

Explain in detail:

  1. What were the main factors that led the Encyclopedia Britannica’s board of directors to decide to stop prin2ng it?
  2. How did Encyclopædia Britannica, Inc adapted its core business model to the Age of Informa2on? Did they succeed?
  3. Has Encyclopædia Britannica, Inc. implemented a business or digital transforma2on strategy?
  4. What are the implica2ons of this adapta2on to other businesses whose business plans are similar to Encyclopedia Britannica’s?

FormaliQes:

  • Font: Arial 12,5 pts.
  • Text alignment: Jus2fied.
  • The in-text References and the Bibliography have to be in Harvard’s cita2on style.
  • Word count: 2500

  1. It assesses the following learning outcomes:
  • Outcome 1: Understand and appraise how digital transforma2on impacts businesses and enables new models.
  • Outcome 2: Apply the strategic planning process to a firm’s digital transforma2on.
  • Outcome 3: Cri2cally evaluate digitaliza2on in different contexts and areas of applica2on.

Private Sector Case Study:

  

By reading below case study describe the risk that was exploited. Also, tell how you think that exploit could be avoided using proper technology and security policies

Private Sector Case Study:

A franchisee of a national hamburger chain in the southern United States was notified by Visa U.S.A, Inc. and the U.S. Secret Service of the theft of credit card information in August 2008. The franchisee has a chain of eight stores with annual revenue of $2 million. The chain focused on the technology of its point-of-sale (POS) system. A leading vendor that allowed for centralized financial and operating reporting provided the POS system. It used a secure high-speed Internet connection for credit card processing. The company determined that neither the POS nor credit card authorization connection was the source of the breach. Although the POS was infected, the source of the breach was the network. Each of the franchisee’s stores provided an Internet hotspot to its customers. It was determined that this Wi-Fi hotspot was the source of the breach. Although considerable care was given to the POS and credit card authorization process, the Wi-Fi hotspot allowed access to these systems. It was determined the probable cause of the breach was malware installed on the POS system through the Wi-Fi hotspot. The malware collected the 232credit card information, which was later retrieved by the thief. This was a PCI DSS framework violation. The PCI DSS framework consists of over 200 requirements that outline the proper handling of credit card information. It was clear that insufficient attention was given to the network to ensure it met PCI DSS requirements. For discussion purposes, the focus is on the network. The PCI DSS outlines other standards that may have been violated related to the hardening of the POS server itself. The following four PCI DSS network requirements appear to have been violated: • Network segregation • Penetration testing • Monitoring • Virus scanning PCI requires network segments that handle credit cards be segmented. It was unclear whether there was a complete absence of segmentation or if weak segmentation had been breached. PCI DSS outlines the standards to ensure segmentation is effective. If the networks had been segmented, this breach would not have occurred. PCI requires that all public-facing networks be penetration tested. This type of testing would have provided a second opportunity to prevent the breach. This test would have uncovered such weaknesses within a Wi-Fi hotspot that allowed the public to access back-end networks. PCI also requires a certain level of monitoring. Given the size of the organization, monitoring might have been in the form of alerts or logs reviewed at the end of the day. Monitoring could include both network and host-based intrusion detection. Monitoring may have detected the network breach. Monitoring may also have detected the malware on the POS system. Both types of monitoring would have provided opportunities to prevent the breach. PCI requires virus protection. It was unclear if this type of scanning was on the POS system. If it was not, that would have been a PCI DSS violation. Such scanning provides one more opportunity to detect the malware. Early detection would have prevented the breach. The PCI DSS requirements are specific and adopt many of the best practices from other frameworks such as ISO. The approach is to prevent a breach from occurring. Early detection of a breach can prevents or minimize card losses. For example, early detection of the malware in this case study would have prevented card information from being stolen. Some malware takes time to collect the card information, which must then be retrieved. Quick reaction to a breach is an opportunity to remove the malware before any data can be retrieved.

500 words and APA format with references needed.