Cloud Computing Discussion 4

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.   

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

cs

 

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Find the absolute value of the difference between 12 and the remainder of the division of your student ID by 12.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

IA week15 P15

 

Hello,

i need this paper by 12/14 afternoon.

Strictly No plagiarism please use your own words.

Topic : Security standard organizations, What do standard organizations do? -Information Assurance.  Recommend 4-5 pages (body), including a cover page and reference page (does not count toward 4-5 pages), at least three references and in APA format with 12pt font DOUBLE SPACED ONLY! If you do more than double space you WILL lose points! 

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Term Paper

   

1. DEFINITION

This study is an individual work.

In this assignment, you will research applications of experimental design. Through a review of relevant literature, you will find two articles that present practical applications of DOE in industry (i.e. manufacturing, healthcare, banking, entertainment, construction, energy). The studies may target the same or different industries. You will submit one report that addresses the following in your own words:

· Identification of the industry

· Brief problem summary

· Factors studied

· Responses observed

· Experiment design strategy used

· Findings

Each study must be described in a separate section of your report addressing all the items listed above. The articles must include a practical application example. In your search you should focus on more recent publications (published in the year 2012 and beyond are acceptable).

Note that studies with only simple statistical analysis, for example two sample comparisons, are not acceptable for this assignment. The studies you report on must include experimental design methods such ANOVA, factorial design, fractional factorial design, etc.

Your literature material may consist of the following:

1- Peer reviewed research papers (journal papers or conference proceedings) 2- Case study and/or white papers

There must be two publications discussed in your report, and at least one of them must be a peer- reviewed paper.

2. SUBMISSION REQUIREMENTS

· Use a word processing software to prepare your paper

· Provide complete references, use of Harvard citation style for your entries is strongly recommended, but APA citation style may be used if preferred.

· Submit all your documents including the articles referenced (includes reference papers)

   

3. ASSESSMENT

Text Box: Category Advice

   

Problem Statement (30%)

Design (30%)

Experiment

  

· Explain the problem(s) introduced in the reference papers clearly and concisely

· List and discuss the questions addressed

· Explain the methodology(s) introduced in the reference papers clearly and concisely

· Explain choice of factors and levels

· Describe the response variables

· Define the experimental design chosen

   

& Findings · Discuss findings/results presented in the reference papers

· Structure your paper in a clear, easy to follow format

· Include data important to your discussion within the text

· Provide references for any information in your work that is not yours

· Provide your paper in one document prepared using word processor

  

Written Report (10%)

  

software

· Visual Displays (tables, graphs, etc.):

o Use clear headings to identify purpose

o Label the plot (meaningful title, properly labeled axis including units)

o Include meaningful and easy to understand legend if needed

Include captions that are explanatory of information presented (table caption starts the word “Table” followed by table number; figure caption starts with “Figure” followed by figure number) 

MIS Assignments

 

View the following video on  Information Security Concepts in LinkedIn Learning: 

Information security concepts

https://www.linkedin.com/learning/cisa-cert-prep-5-information-asset-protection-for-is-auditors?u=74653834 ( if you have LinkedIn account)

or using the video in this Google Drive link: 

https://drive.google.com/file/d/1Nh-BtPM5lUolb–Iok5bcchDedOsxQs-/view?usp=sharing

Provide discussion answers to the following statements below.  The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive. 

1. Explain the three IS Concepts in the AIC Triad.

2.  Explain, in your own words, the following terms:  

2a.  vulnerability

2b.  threat

2c.  exposure

3.  Explain the difference between privacy and security.    

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research Paper: InfoTech Import in Strat Plan (ITS-831)

Research Paper: Server Virtualization

Word count: 600+ words (Minimum 2 pages of content)

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

Describe the organization’s environment, and evaluate its preparedness for virtualization.

Explain Microsoft (or another product) licensing for virtualized environments.

Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Chapter 6, “Architecture and Infrastructure”.

Text book: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

plagiarism check required Good work APA format References within 8hrs

Assignment

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Assignment Link: http://book.visualisingdata.com/chapter/chapter-4

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.