Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.

Evidence Collection Policy

 Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Self-Assessment Checklist

§ I created a policy that addressed all issues.

§ I followed the submission guidelines.

project3

 

Prototyping is an integral part of design thinking and user experience design in general because it allows us to test our ideas quickly and improve on them in an equally timely fashion. A prototype is a simple experimental model of a proposed solution used to test or validate ideas, design assumptions and other aspects of its conceptualization quickly and cheaply, so that the designer/s involved can make appropriate refinements or possible changes in direction.

For Project 3, you will create a high-fidelity digital prototype of the user interface. The prototype will be used in the final project to design and test.

short answer

 For the past several years employers have started to give a lot of weight to applicants who not only have a degree, but who also possess one or more IT certifications. Engage in research on the Internet and discuss whether you feel having both a degree and certification(s), or just one but not both, can affect your career in technology.  Examine some online job boards such as Dice.com, Monster.com, and your local newspaper/want ads to determine the nature of IT certification needs for IT positions in the want ads.  Report your findings.  Based on your research, what are some examples of IT certifications that you might wish to pursue? 

Intro to digital forensic

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else. 

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build the future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses to the following questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? 
  • Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale. 
  • What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms explains laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Required Resources

  • Course textbook
  • Internet access

Submission Requirements

  • Format: Microsoft Word (or compatible) 
  • Font: Arial, 12-point, double-space 
  • Citation Style: Follow your school’s preferred style guide
  • Length: 5–7 pages

Self-Assessment Checklist 

  • I effectively documented the causes for investigation.
  • I effectively documented key points related to the collection, analysis, and presentation of computer forensic evidence.
  • I successfully identified potential sources of evidence.
  • I summarized laws and legal concepts that apply to this case.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Grading Rubric for the Assignment #1:

  • Delivery: Delivered the assignments on time, and correct format: 25 percent
  • Completion: Providing a thoroughly developed document including descriptions of all questions: 25 percent
  • Understanding: Demonstrating a clear understanding of the purpose and writing a central idea with the most relevant facts, details, and/or explanation: 25 percent
  • Organization: Paper is well organized based on the APA format, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent

Exp19_PowerPoint_Ch01_ML1_Time_Management

  

Exp19_PowerPoint_Ch01_ML1_Time_Management

Exp19 PowerPoint Ch01 ML1 Time Management

PowerPoint Chapter 1 Mid – Level 1 Time Management 

  

Project Description:

You belong to a student organization on campus that has asked you to put together a presentation on time management. You created a presentation with some basic content for a school project you will use as starting point. You want to modify the presentation to make it more appealing and better portray the message.

     

Start PowerPoint.   Download and open the file named Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Grader has automatically added your last name to the beginning of the   filename.

 

Apply the Gallery   theme and change the variant to the second variant.

 

Change the theme   colors to Aspect and the theme fonts to Corbel.

 

Add the title Time   Management   in the title placeholder. Type Use Your Time Wisely in the subtitle   placeholder.

 

If you want to use   slides from another presentation, the Reuse Slides features saves   considerable time, as you do not have to copy and paste slides from another   presentation.
 

  Use the Reuse Slides feature to add all slides from Time.pptx into the open presentation. Preserve the order of the   slides. Ensure the Use source formatting or Keep source formatting check box   is not selected so that the inserted slides take on the design and formatting   of the open presentation.

 

Delete Slide 2. Move   Slide 3 so that it becomes Slide 2.

 

Click Slide 5 and add   a new slide. Change the slide layout to Content with Caption on the newly   inserted slide. In the top left placeholder, type What’s Stealing Your Time? (including the ?   mark). Increase the font size of the text to 44 pt and apply Bold.
 

  Click the bottom placeholder and type Identify aspects of your   personal management that need to improve! Increase the font size of the   text to 24 pt.

 

Images can be used to   enhance a presentation and better portray your message.
 

  On the newly created slide (slide 6), insert the Steal.jpg image in the content placeholder on the right. Change   the width of the image to 6.3″

 

Apply the Bevel   Perspective Left, White picture style. Change the Picture Border to Tan,   Background 2. Set the horizontal position of the image to 4.8″ and the vertical   position to 1.5 “.

 

Change the layout of   Slide 4 to Title and Content. Insert the TimeMarches.jpg   image in the content placeholder. Crop the top and bottom of the image so   that most of the white area is removed. Change the width of the image to 7.9″

 

Apply the Moderate   Frame, White picture style. Change the Picture Border to Tan, Background 2.   Set the Horizontal position of the image to 2.7″ and the Vertical   position to 2.5″.

 

SmartArt allows you   to communicate information visually with graphics instead of just using text.
 

  On Slide 5, convert the list to a Vertical Box List SmartArt graphic.

 

On Slide 3, convert   the list to a Basic Block List SmartArt graphic.

 

Check the   presentation for spelling errors. Make corrections as needed on the slides   and notes.

 

To help you prepare   and deliver your presentation you will add speaker notes.
 

  Type the following speaker note on Slide 6: To better manage your time it   will be important to identify aspects of your personal management that may   need to improve. 

 

Save and close Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Submit the file as directed.

Mobile Application

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • Why is mobile development difficult?  Explain
  • How does design & utility make a difference between good vs great websites?
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.

Use in-text citation and list the reference of your supporting source following APA’s style and formatting

Strictly plagiarism free

2 complete pages