Week 15 Discussion

 Discussion  (Chapter 13): Research  Apple Home Pod. How does it interact with smart home devices?  Alexa is  now connected to smart home devices such as thermostats and microwaves.  Find examples of other appliances that are connected to Alexa and write a  report. 

Apply: Configuring and Deploying a Private Cloud with System Center

 

Assignment Content

  1. The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

    Using the links provided, research at least 2 of the following codes of ethics:

Assignment (500 WORDS MINIMUM)

  

Web Analytics – Labeling Visitors, Sessions, Pages, and Web Server Log Files vs. Java Scripting

Assignment Instructions:

· Define the importance of custom variables, attached chapter 9 (Advanced Web Metrics with Google Analytics by Brian Clifton) explains the importance of each variable, and how each is restricted to one particular scope level.

· Explain in as much detail as you can regarding the scope of each of these levels; Visitor Level, Session Level and Page Level.

· Compare and contrast web server log files vs. JavaScript tagging

· What would you recommend in terms of the variables you would set for an ecommerce site? Would this recommendation be dependent on the type of business or any other factors?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.

Information Security Fundamentals, Security Policies, and Operations Life Cycle

 

  • This week we learned about Information Security Fundamentals, Security Policies, and Operations Life Cycle. Based on the week’s objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions of Network Security and Business Priorities. Research these topic areas on the internet to support your information and provide links to the resources cited in APA format.

Information Technology Incident Report and Summary (Twitter Incident)

 Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis of the case. Ensure to read the rubric and identify the following critical elements. This paper covers the Twitter hack that occurred earlier this year. I will definitely need this by Saturday morning to allow time for me to review and provide any further information or updates.

Introduction (Twitter Hack)

Case Analysis

Incident Impact

Recommendations

Global Considerations

Summary

Risk Management and Mitigation Planning

 

Assignment Content

  1. You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2® database to SQL Server 2016. The migration will lead to the expansion of the cloud data centers worldwide.

    The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

    Part A:
    Create a 1- page (does not include title or reference pages) Information Guide Handout to present to upper management, comparing risk management practices to use in the migration that includes:

    • How risk mitigation strategy planning can reduce the likelihood and/or impact of risks
    • How often risks will be reviewed, the process for review, and who will be involved
    • The roles and responsibilities for risk management
    • Adequate references to support your findings, information, and opinions
    • A recommendation for the best risk management practice for this migration
    • Part B:
      Using the sample shown below, create a 4- to 5- page (does not include title or reference pages) Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

      Risk Information Sheet

    • Risk Description
    • Probability
    • Impact
    • Rationale
    • Risk Mitigation
    • Details/Outcome
      Please note the following:
    • The risk description should fully describe the risk.
    • The probability is the likelihood which the risk will occur (i.e., low, medium, or high).
    • The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).
    • The rationale should explain the reasons for your probability and impact assessments.
    • The mitigation strategy should explain how each risk will be addressed.
    • There should be one risk information sheet for each risk identified.
    • Include APA-formatted citations when necessary.

Cyber law

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass. 

cloud computing

Describe the various types of virtualization.

List the pros and cons of virtualization.

Be sure to include at least 2 scholarly sources and use APA format.

Automated tool for SQL Injection

 Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end.