Journal entry

 – ‘Pick one of the following terms for your research: coercive forces, institutional environment, inter-organizational relationships, joint venture, legitimacy, niche, organizational ecosystem, retention, strategic alliance, or trade association’. 

–  The paper should have a definition, Summary and Discussion ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index. 

CYB

  

Consider this scenario: A cyber-attack occurred in a healthcare organization, resulting in significant data loss. You have been called as an information security management consultant to recommend an incident response plan for this incident and will need to present it to the executive board of the healthcare organization.

Develop a 10- to 12-slide multimedia-rich presentation of your recommended incident response plan to mitigate or reduce impact to the organization, and do the following:

  • Define the incident response plan goal       and scope for this cyber-attack.
  • Analyze the impact and severity of the       cyber-attack by applying a business impact analysis (BIA) to the       organization, including mission performance, regulatory requirements, and       compliance.
  • Identify the communication       requirements, including criteria for escalation and organization       reporting and regulatory requirements.
  • Explain the process for responding to       this incident.
  • Describe the relationship with other       organization processes and methods, such as BCP/DR. You may base this off       your Wk 5 Team assignment.
  • Recommend prioritization, resource       requirements, and any opportunity created by the event.

Use appropriate images and charts where applicable.

Include a slide with APA-formatted references. Note: Cite your Team assignment if you use it as a reference.

research

 Select one of the following research areas to investigate: 

1) Software Engineering and SDLC (Software Development Life Cycle) 

2) Software Engineering and Software Development Models 

3) Software Engineering and Data Verification 

4) Software Engineering and Data Validation

 5) Software Engineering and Software Quality 

6) Software Engineering and Data Analytics 

Heterogeneous System Architecture

  1. What is the difference between between homogenous and heterogenous system architecture?
  2. Where are heterogenous system architecture applied?
  3. Why is coherence and consistency between FPGA cache, GPU and CPU in heterogeneous architecture beneficial? 
  4. What are the advantages and disadvantages of NUMA structure?
  5. Analyze the differences between distributed memory versus local memory (NUMA, NoC etc) in context of GPUs

week-12

 Do some research on Threat Response software. Find one particular software package to investigate..What does the software do?.What are it’s major features?.What kind of training is required.How much does the software cost?

Block Chain – Journal

Journal Instructions

In chapter 4, the author describes four types of costs that blockchain technology can reduce. Which of the four cost types, if reduced through blockchain technology, would most impact the organization for which you currently work?  What would be the most visible impact on your job role? How could you minimize any negative impact?

visualization or infographic

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?