Access control discussion 14

Discuss the major components of information assurance.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

 In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Scrum Question

EXAM REQUIREMENTS

• Submit your answers as a single Word or PDF file, called “ISM 6316 Mid Term – ”.

• Follow APA Style (double-spaced, 12-point font, 1-inch margins).

• This is an individual assignment. It is not a collaborative effort, not a team effort. You are not

allowed to discuss this exam with anyone, classmates or others. If you have any questions or

doubts, contact me by email.

• Submit your answers by the deadline. Each 24 hour period that you miss the deadline, it costs

10 points.

Question 1. (40 points; max 2 pages)

Transitioning an organization from running development projects with the Waterfall approach to

Agile/SCRUM is not an easy undertaking. Reflect on what you think are the biggest challenges that

have to be overcome and how you would approach this transition.

a. Describe four different challenges that organizations face when they want to transition to

SCRUM. For each challenge explain what the challenge is and why this is a critical challenge in

your opinion.

b. Describe for each challenge that you identified above what strategies you would use to

overcome the challenge.

Question 2. (30 points; max 2 pages)

SCRUM was originally intended as a project management approach for software development

projects. However, one may argue that SCRUM can be used as a generic project management

approach that can be applied in the context of any type of project, covering different focus areas

in a company (e.g. marketing, finance, or HR). Reflect on this position. To what extent do you

agree that SCRUM can be used as a generic project management approach? To what extent do you

disagree? Where lay the limits of the applicability of SCRUM to the management of complex

projects?

Question 3. (30 points; max 3 pages)

Visit: https://michaelochurch.wordpress.com/2015/06/06/why-agile-and-especially-scrum-are-terrible/

(A pdf of the blog will be available on CANVAS as well).

As you can tell, not everyone is convinced about the value of SCRUM. Critically reflect on the

opinions presented in the blog. (Please note that you do not have to read/consider the hundreds of

responses to this blog).

a. To what extent do you agree with the author’s point of view? On what issues do you disagree?

b. Based on your experience/understanding of SCRUM, what kinds of adjustments to SCRUM and its

practices or what other initiatives would you explore to address some of the issues that the

author raises?

Digital Forensics Tools and Tech

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

300 words APA format

Cyber Law – Discussion 3

 A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

Post should be 500 words and add references in APA format.

Application Security or Penetration testing methodology

  1. Research 14-1 – Application security or penetration testing methodology.   APA formatting is expected.  Research various application security testing or penetration testing methodologies.  Compare and contrast the pros and cons of each methodology and recommend your preferred approach. 
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

emerging threats and counter measures

 

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cloud Computing in Education – Paper – 13 hrs

The topic of the paper is “Cloud Computing in Education”. Paper should consist of following sections and I have listed the section by resources to.

1. Abstract (1/2 page)

2. Introduction ( 1/2 page)

3. (2 pages)

a. Cloud Computing in Higher Education

b. The Challenges of Cloud Computing in Higher Education

– https://www.librarystudentjournal.org/index-php/lsj/article/view/289/321/#need?CSRF_TOKEN=1451c54f7aa59da7d6999c2281cefc17892a7939

4. Proposed Architecture for HE institutes (3 page)

– section 7 in paper- https://www.sciencedirect.com/science/article/pii/S221256711400224X

5. Advantages of using e-learning in the cloud (1/2 page)

– section 4 in paper- https://www.orizonturi.ucdc.ro/arhiva/2014_khe_6_pdf/khe_vol_6_iss_2_100to103.pdf

6. Conclusion (1/2 page)

Abstract, introduction and conclusion can be grabbed from below links(latest paper is the preference)

https://d1wqtxts1xzle7.cloudfront.net/44685282/IJIRSTV2I10084.pdf?1460530711=&response-content-disposition=inline%3B+filename%3DCloud_Computing_in_Education_Sector.pdf&Expires=1602376924&Signature=Bt2TMamjaN5OrthY7dGqyvrJ4LQ3CgctpRpaZTN~n6PA-dtKcjGjU5Mt3SeKQGTHW-t3IvWgomad29U9ZNWKWJKAAl68XvJtOloYi6VlhAQqttNrb52YNLr-yRPiR7kf5JFBtr1pMJk5KIdrXqMq08~iUGCpK0tjFrIJV~2t-cVjoDwQ12O44Y8ii8~HOB1QJ6zTZRcIHbhzlxFzrPSlJplCgssG0NF7FYIjbB5wnLABeo4ldCrbzyVhmg0YPQ9FzTrYpC0~DuMmSAg5AUM3dyfBOPcHRNexKROg7bZDPR5-FXlBrL5hv1vS~rvzOiQ58cptnRMV4NT4JVrylcJuYA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

https://link.springer.com/chapter/10.1007/978-1-4614-3329-3_2

http://www.ijcte.org/papers/511-G1346.pdf

Discussion 4 Info tech import strat plan

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.