IT345 7 discussion

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources

 

Topics:

  • How well can we predict the consequences of a new technology or application?
  • Who should make the decision for a business on what technology the adopt?
  • What does the term “need for reasonable judgement” mean?
  • Do sites like Wikipedia hold any credibility?

ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack

Article:

             Reading Assignments       

Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security  Risk Management With Bounded Rationality in the Internet of Things. IEEE  Transactions on Information Forensics and Security, 14(11), 2958-2971.

Borek, A. (2014). Total Information Risk Management: Maximizing the  Value of Data and Information Assets (Vol. First edition). Amsterdam:  Morgan Kaufmann 

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=e000xna&bquery=Total+Information+Risk+Management%3a+Maximizing+the+Value+of+Data+and+Information+Assets&type=0&searchMode=And&site=ehost-live&custID=s8501869&groupID=main&profID=ehost  

The readings this week discusses broad context of risk and  investigative forensics. Part of risk management is to understand when  things go wrong, we need to be able to investigate and report our  findings to management. Using this research, or other research you have  uncovered discuss in detail how risk and investigate techniques could  work to help the organization. ERM helps to protect an organization  before an attack, where as forensics investigate technique will help us  after an attack – so lets discus both this week.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)

Java

1. Describe the key architecture points in a high capacity enterprise solution processing over 100/000 TPS?

2. What are the key breakage points in the architecture? How would you improve upon them?

3. Describe a defect that you encountered in your code that impacted production. Why was it not caught pre-deployment? How did you handle the remediation of this fault?

Project portfolio

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Cloud Discussion 15

 Review in 500 words or more the video above called Cloud Security Myths. 

 Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes. 

paper-1

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • 9 pages
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.  

750 words: Select an organization that has a Global platform and describe the following.

Portfolio Project: Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  

Perform the following activities:

1. Name the organization and briefly describe what good or service they sell and where they operate.

2. Note how they are a differentiator in the market.

3. Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

4. Explain what actions the company took to achieve operational excellence.

Preview the document

read the attachment and answer the question.

Read the attached Ethics-V.pdfPreview the document which continues the discussion on the professional codes of software engineering ethics.

Then proceed to answer the questions inside the reading:

  • Questions 8.1 and 8.2
  • Case Study: Questions C1-C4

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_5_FL where FL is your first and last name initial and Submit.