EH week15 DB2

 

Hello,

i need this paper by 01/06 afternoon.

Strictly No plagiarism please use your own words.

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. 

The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized. 

Discussion/Research Questions (300 words)

  1. Briefly explain your views on what the zero trust architecture is attempting to solve? 
  2. How do you build a Zero Trust Architecture?

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

predictive versus adaptive SDLC 2.0

 

 Share your thoughts and opinions on predictive versus adaptive SDLC in this week’s discussion.

  • Flesh out your thoughts and interact with your classmates. Post  your initial response by the middle of each week and then return on a  couple of other days to see what’s going on with the discussions. The  more you interact, the more you learn from your peers, and the more you  share with them about what you know. You will also be showing your  instructor what you have picked up.
  • 5 pages

IT 203 week 5

 

For your week 5 assignment, 2 pages 

Submit a Word document in APA format that describes the collaborative software system listed next to your name . Explain key features and benefits for users. Also, include a few screen shots of dashboards and a link to the system’s home page.

topic

 Team Viewer 

ET WK6 paper

Threat Modeling —— 5 FULL PAGES

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

InfoTech in a Global Economy 2.1

 Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

New ERP system and network

 

The customer is very happy with their new ERP system and network. The performance of the network and user applications exceeded their expectations. The CIO stated he was very happy they went with PostUTech’s custom solution and that the alternative Cloud SaaS service he evaluated just didn’t seem mature enough for their needs. Discuss your thoughts on future Cloud Use for this customer with your team members.

  • Why is “The Cloud” a hot buzzword? What advantages does it offer? 
  • What are some of the challenges faced by Cloud technology and why might it not be the right solution for every business?
  • Give an example of a SaaS cloud provider. Would this be a good option for your customer in the future?  Try to use a different example from your team members.