Practical Connection Assignment

Executive Program Practical Connection Assignment

This assignment is a written assignment where students will demonstrate how this course InfoTech Import in Strat Plan research has connected and put into practice within their own career. 

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course InfoTech Import in Strat Plan have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Blockchain

In chapter 7, the author briefly discusses how to deploy a smart contract. You’re using Ganache in your labs, but you’ll learn in future chapters about public test blockchains and production (live) blockchains. Once you deploy a smart contract, that smart contract code is stored on the blockchain forever (remember immutability?) Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

what is an IoT and Explain its features

 Our IoT definition: a network of connected devices with 1) unique identifiers in the form of an IP address which 2) have embedded technologies or are equipped with technologies that enable them to sense, gather data and communicate about the environment in which they reside and/or themselves. 

 

Features of IOT

The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some of them are listed below:

Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi-directional communication.

Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system.

Integrating: IoT integrating the various models to improve the user experience as well.

Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer.

Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment.

Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other.

Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management.

Integrative Negotiation

 Integrative Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 100 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSISUsing 100-150 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Vulnerability Process and Assessment Memorandum

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Remediation:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality