Information Technology Incident Report and Summary (Twitter Incident)

 Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis of the case. Ensure to read the rubric and identify the following critical elements. This paper covers the Twitter hack that occurred earlier this year. I will definitely need this by Saturday morning to allow time for me to review and provide any further information or updates.

Introduction (Twitter Hack)

Case Analysis

Incident Impact

Recommendations

Global Considerations

Summary

Risk Management and Mitigation Planning

 

Assignment Content

  1. You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2® database to SQL Server 2016. The migration will lead to the expansion of the cloud data centers worldwide.

    The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

    Part A:
    Create a 1- page (does not include title or reference pages) Information Guide Handout to present to upper management, comparing risk management practices to use in the migration that includes:

    • How risk mitigation strategy planning can reduce the likelihood and/or impact of risks
    • How often risks will be reviewed, the process for review, and who will be involved
    • The roles and responsibilities for risk management
    • Adequate references to support your findings, information, and opinions
    • A recommendation for the best risk management practice for this migration
    • Part B:
      Using the sample shown below, create a 4- to 5- page (does not include title or reference pages) Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

      Risk Information Sheet

    • Risk Description
    • Probability
    • Impact
    • Rationale
    • Risk Mitigation
    • Details/Outcome
      Please note the following:
    • The risk description should fully describe the risk.
    • The probability is the likelihood which the risk will occur (i.e., low, medium, or high).
    • The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).
    • The rationale should explain the reasons for your probability and impact assessments.
    • The mitigation strategy should explain how each risk will be addressed.
    • There should be one risk information sheet for each risk identified.
    • Include APA-formatted citations when necessary.

Cyber law

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass. 

cloud computing

Describe the various types of virtualization.

List the pros and cons of virtualization.

Be sure to include at least 2 scholarly sources and use APA format.

Automated tool for SQL Injection

 Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end. 

Cloud Computing and Digital Forensics

1.) Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the  Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?

Post between 200 and 300 words. Use your own words

I need a essay on moodle, isims and their integration

I need a essay on moodle, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of moodle.

This essay is also based on isims, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of Isims.

The essay should include how these systems are integrated.

Asymmetric cryptography – Component of cryptography

In the final discussion posting please describe what components of cryptography impacted you the most.

I would prefer about asymmetric cryptography and the math underlying it.  Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 30-35  lines should be good enough.

1 Discussion and 1 case study

Discussion 2.1

“In general, clustering is the use of unsupervised techniques, for grouping similar objects.” Please discuss this and what is your understanding of ‘unsupervised techniques.’

( With Refrences )

Case Study 2.1

  • Read the Case Study: Case 3.1 – Customer arrival at Bank 98
  • Write a summary analysis and answer the questions

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.