Week Seven Discussion
Week Seven DiscussionUse the Web to search for methods to prevent XSS attacks.Write a brief description of more than one method..Post between 200 and 300 words.
Week Seven DiscussionUse the Web to search for methods to prevent XSS attacks.Write a brief description of more than one method..Post between 200 and 300 words.
Chapter 3. Project Selection and Portfolio Management Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:
Text
Title: Project Management
ISBN: 9780134730332
Authors: Pinto
Publisher: Pearson
Edition: 5TH 19
Sub: intro to data mining
After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.
In an APA7 formatted essay answer all questions above. There should be headings to each of the questions above as well. Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page).
400 words and provide references
Review the research paper on Methods for Evaluating Mobile Health Apps in this website,
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5748471/
And, answer the following questions
Question 1: What are methods for evaluating health mobile apps?
Question 2 : Download and compare the following two Mobile Health Apps based on Content .
Spok Mobile App vs PatientTouch System Mobile App. Both apps are available for free download
1. Assignment 1
Chapter 10
Discussion Question 1: Based on the current state of art of robotics applications, which industries are most likely to embrace robotics? Why?
Discussion Question 2: Watch the following video: https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on the impact of AI on future jobs. What are your takeaways from the video? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs? Write a report.
Exercise 1: Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.
Exercise 7: Conduct research to identify the most recent developments in self-driving cars. Write a report.
Chapter 11
Discussion Question 1: Explain why it is useful to describe group work in terms of the time/space framework.
Discussion Question 2: Describe the kinds of support that groupware can provide to decision makers.
Discussion Question 3: Explain why most groupware is deployed today over the web.
Discussion Question 4: Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.
Exercise 4: Compare Simon’s four-phase decision-making model to the steps in using GDSS. Write a report.
Textbook: Business Intelligence and Analytics
ISBN: 9780135192016
Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.
Discuss a current business process in a specific industry (The current business process itself and the industry in which the business process is utilized).
After explaining the current situation, take the current learning from the course and:
1. Explain a new technology that the business should deploy. Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
2. Note the pros and cons of the technology selected.
3. Note various factors the business should consider prior to deploying the new technology
The above submission should be 3 pages in length. Remember the total length does not include the APA-approved cover page or the references. There should be at least three APA-approved references to support your work. Please refer to Textbook: Business Intelligence and Analytics
ISBN: 9780135192016
Using the industry where you currently work or have worked before, write a 3-page proposal recommending your choice between Android or iOS. From a user and developer’s perspective, which would you recommend to your company and why?
Your assignment must follow these formatting requirements:
Compare and contrast the following service models: Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). Technical product descriptions may be used as references for this submission however they may account for no more than half of the total references.
The requirements for your paper are:
• Describe the service models SaaS, IaaS, Paas, including:
o An example of each
o The pros and cons associated with each model
• Explain the similarities and differences between the three models
• APA formatted including title page, reference page, and in-text citations.
Modify the Week Three Java™ application using Java™ NetBeans™ IDE to meet these additional and changed business requirements:
The application will now compare the total annual compensation of at least two salespersons.
It will calculate the additional amount of sales that each salesperson must achieve to match or exceed the higher of the two earners.
The application should ask for the name of each salesperson being compared.
The Java™ application should also meet these technical requirements:
The application should have at least one class, in addition to the application’s controlling class.
The source code must demonstrate the use of Array or ArrayList.
There should be proper documentation in the source code.
Write 2- to 3-page security design and approach brief in which you:
• Define the concept of a shared responsibility model in cloud security.
• Expound on why the shared responsibility model is unique to the cloud environment.
• List common security threats in the cloud environment that GTR would want to consider.
• List three security services.
• Explain how the security services would help mitigate threats.
The Research Paper on
Social Media Analytics for Business in technology, education or hospitality
Part 1: Research BIA and BCP (0/1 completed)
Note: In this part of the lab, you will review internet resources on BIA and BCP in order to form a basis for their purpose and usage. Understanding the reason behind a business continuity management policy is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.
Part 2: Create a BCP Policy (0/9 completed)
Note: Conducting a BIA entails describing any mission-critical business functions and processes. The next step is to identify all threats and vulnerabilities. Once you have both of these deliverables, you can compare the findings with the organization’s existing policies. What stands out are the areas in your policies needing improvement.
BIAs are a reoccurring analysis, sometimes done once a year. BIAs are revisited because as a business and/or the market changes, the assets and processes deemed critical change. Moreover, recovery times might grow or tighten.
Business Function or ProcessBusiness Impact FactorIT Systems/Apps Infrastructure ImpactsRTO/RPOInternal and external voice communications with customers in real-time Internal and external e-mail communications with customers via store and forward messaging Domain Name System (DNS) server for internal and external Internet Protocol (IP) communications Internet connectivity for e-mail and store-and-forward customer service Self-service web site for customer access to information and personal account information e-Commerce site for online customer purchases or scheduling 24x7x365 Payroll and human resources for employees Real-time customer service via web site, e-mail, or telephone requires customer relationship management (CRM) Network management and technical support Marketing and events Sales orders or customer/student registration Remote branch office sales order entry to headquarters Voice and e-mail communications to remote branches Accounting and finance support: Accounts payable, Accounts receivable, etc.
Note: To best understand the difference between RTO and RPO, ask yourself these two questions:
CriticalRTO: 8 hoursRPO: 0 hoursMajorRTO: 24 hoursRPO: 8 hoursMinorRTO: 1 weekRPO: 3 daysNoneRTO: 1 monthRPO: 7 days
Note: An important difference between RTO and RPO is the purpose behind each one. The RTO determines the business continuity management plan and how much money the business needs to resume operations. The RPO only affects the backup operations.
Policy Statement
Insert policy verbiage here.
Purpose/Objectives
Define the policy’s purpose and objectives. They should mirror the purpose/objectives of a business impact analysis (BIA).
Scope
Define this policy’s scope and whom it covers.
How to Gain Approval for Your Plan
The first step toward implementing your business continuity plan (BCP) lies in gaining executive management’s wholehearted support. You can’t wait to win this approval until after you’ve drawn up and presented your plan to management. You must make clear to management from the beginning the costs associated with any lasting disruptions to business and the pressing need for every business to have a BCP to protect itself.
To win executive management’s endorsement of your BCP, research the costs associated with business disruptions, the costs of implementing a business continuity plan, and the steps for continuity and recovery that are specific to your organization, and then use this data to strengthen the arguments for implementing your plan. Also, ask management what it is looking for. Understand the executives’ short- and long-term concerns and what concrete benefits they are looking for from a BCP. Find out as well how much they are willing and able to invest in such a plan. Remind them that while a BCP requires ongoing upgrades, which will also come with a price tag, to go without such a plan and its upgrades could result in even longer and far costlier business disruptions.
To win executive management support takes proper planning. Too many well-intentioned managers and consultants devote all their time to their plan’s presentation and not enough time consulting with management. Use information from your conversations with management to plan your approach, presentation materials, and time. Remember, you’ll likely get just one try at this.
Standards
Does this policy point to any hardware, software, or configuration standards? In this case, you need to reference the recovery time objectives (RTOs) and recovery point objectives (RPOs) as standards and metrics. List them here and explain the relationship of this policy to these standards.
Procedures
Explain how you intend to implement this policy across the entire organization.
Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.
Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
The C-level executives of the Bankwise Credit Union are confused about the differences between a business continuity policy and business continuity plan and how they work together. It is your job as CISO to create a document to explain these topics.
Use the internet to find further information on the differences between policies and plans in information security in general. Use this information to create a high-level explanation for C-level executives. Provide examples of real business continuity policies and how they could be useful in your organization.