Organizational structure

create a one-page essay answering the question noted below.    

  • Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

bidis1

 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Application Security

 

Discuss  the following, supplying citations to support any information that you  provide.  Do not include your opinion, only what you can support with a  citation.  Address the following topics.

  1. Describe operating system hardening 
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment? 
  2. Describe system restoration methods and procedures  
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls 
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence 
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence 
      1. Describe why evidence is collected, 
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format. 
  • Utilize at least five scholarly references.  
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.  
  • Utilize Google Scholar and/or the university library.  
  • Do  not copy and paste bulleted lists.  Instead, read the material and in  your words, describe the recommendation citing the source.  
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment.  
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Algorithms about Concept map

  

The work is to read Chapter 35 and make a concept map for the following topics (skipping the proofs). Make 4 concept maps for below 4 topics.  Each concept map should contain most of the key concepts/ideas discussed in the sections.

· Chapter 35 – Approximation Algorithms (skip proofs)

o Content before 35.1

o 35.1 The vertex-cover problem

o 35.2 The traveling-salesman problem

o 35.3 The set-covering problem

Making concept maps to summarize chapter lectures

How to make a concept map?
1. How to make a concept map? (Links to an external site.)

Online websites to make concept maps
1. Lucidchart (Links to an external site.)
2. Slatebox (Links to an external site.)

Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

500 words: Leadership

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course(Information tech and strategic planning) have been applied, or could be applied, in a practical manner to your current work environment (Health care industry)

overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Testing Project Proposal Paper on Reconnaissance Phase

Reconnaissance project need help to get done. Below is the project requirement. USA 

  • Prepare a business case justifying the need for a penetration test. Remember, the project manager is usually NOT excited about the test and is only doing it to check a box. Make sure they are aware of why it is necessary, and what benefits it brings them. In this business case, be sure to include why Penetration Testing is important from the business perspective, not just the security perspective.
  • Develop a project timeline. Use project management software such as Microsoft Project, Zoho Projects, Team Gantt, or any other similar piece of software to develop a Gantt Chart showing the timeline. This project is due to take 5 weeks (Weeks 2-6 of our course).
  • Define what deliverables the organization can expect from you. At what points in your timeline can they be expected (be sure to include these in your timeline above!), and what will they contain?
  • Discuss the difference between active and passive information gathering. What activities are conducted in each type of information gathering?
  • Discuss what OSINT is and what kinds of tasks it entails.

Paper Requirements:

  • Written Communication: Write in a professional manner using APA 6th Edition and formatting with correct grammar, usage, and mechanics.
  • Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…).
  • APA Formatting: Resources and citations are formatted according to APA 6th Edition.
  • Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
  • Font and font-size: Times New Roman 12pt, double spaced

 

Resources:

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.