Assignment Lab 6

 

Technology Acceptable Use Policy (AUP) 

FileName: AUP_YourLastName.docx

Upload the file for grading below

You are the owner of a new technology corporation, Acme Technology, LLC., and charged with the responsibility of writing new Acceptable Use Policy (AUP) for the organization.  Based upon  Week 6 readings of Chapters 16, 17, 18 and 19, write the text of the AUP that you propose.  Consider defining major the terms, stating organization policy related to the terms, stating organization penalties for violations, applicable state, and federal laws from which you derive the language.  (See Chapter 4 of the course materials)

You are writing this policy from scratch, please review the following three corporation’s (Amazon, Microsoft and Dell Corporations) samples of AUPs to assist in the process.  

Upon sucessful completion of the New AUP, Upload: AUP_YourLastName.docx for grading purposes.

Please NO PLAGIARISM

Need 1 and a half page 

Need it in APA FORMAT with References 

bharg discussion

 Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business.  Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy. 

PAPER

 

Write an essay of at least 500 words comparing or contrasting ISO v. NIST database security frameworks.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format, not in bulleted, numbered, or another list format

BSweek5

In 250 words 

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords 
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords 
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password explain each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

rewrite my stor

base on my story (attached file below)

Rewrite your story for clarity/structure/grammar/etc. Also make sure you address any issues we discussed in the storytelling lecture.

Make the stories more fun to read. If there is anything about a story that is boring or confusing, rewrite it. This may include unnecessary or missing scenes, too many characters, tedious or confusing parts, etc. Additionally, point out any issues of clarity (all the material covered in the clarity lectures). Point out any grammar issues you notice too, but don’t focus on them.

Do not change the main idea of the story.

Tips:

The story is their story, not yours:

+ the story is definitely not about the interview process

+ the story probably doesn’t even involve you

Stories can take place over a lifetime, but cant be the same as describing the lifetime (think of history class)

Stories should let us understand the characters

+Give them a voice, don’t just describe what happened to them

Dont end the story with a moral lesson: it doesn’t feel like real things happing to real people.

Discussion

 What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement? 

Information Technology and Organizational Learning Assignment:

Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

asignment

 

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the interactivity choices:

  1. Start by identifying all the interactive features deployed, listing them under the headers of either data or presentation adjustments
  2. How suitable are the choices and deployment of these interactive features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential interactive features and functions, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-7