Describe common biases in decision making. Describe the opportunities provided by technology for businesses. Explain the roles of emotion and fairness in decision making. Interpret reflective and expedient decision making.

Apply critical thinking skills to analyze business situations.
Apply principles of quantitative and qualitative research to business cases.
Apply the standard of APA style to all research and writing tasks.
Appropriately use effective communication techniques.
Describe common biases in decision making.
Describe the opportunities provided by technology for businesses.
Explain the roles of emotion and fairness in decision making.
Interpret reflective and expedient decision making.
Recognize situations that present potential ethical issues, and develop solutions for those issues.
Summarize the role of decision making in business

Slick Systems, referred to as “SLIC,” has hired you as an IT consultant for their Windows network services infrastructure. You are required to supply SLIC with a solution which addresses the integration and configuration of their Active Directory updates. 

Slick Systems, referred to as “SLIC,” has hired you as an IT consultant for their Windows network services infrastructure. SLIC is a new advertising firm. They have hired staff, are established in two locations, and have a need to get their internal IT services configured. They have an IT staff, but they do not have the in-house expertise to address their current infrastructure needs.

You are required to supply SLIC with a solution which addresses the integration and configuration of their Active Directory updates.  Cost is not a significant concern – SLIC wishes to implement the “right” solution to address their acquisition of a new company and its Active Directory forest which is comprised of a single domain.  More specifically, SLIC is based out of Chicago, IL and they have a Windows Server 2016 domain that is operating at the Windows Server 2016 functional level.  They recently acquired New Age Cinema Group which is based out of Baltimore, MD, which has a domain running Windows Server 2012 domain controllers.

There are several details about SLIC which will have an impact on your proposal:

  • SLIC has a total of 220 employees in their Chicago and Baltimore sites. Each department will have individuals at each site.
    • Executives (18 total with 10 in Chicago, 8 in Baltimore) – manage and run the company
    • Customer Sales Department (60 employees with 30 in Chicago and 30 in Baltimore) – perform market research and maintain accounts
    • Public Relations (PR) Department (98 employees in Chicago) – advertising
    • Human Resources and Finances (24 employees in Chicago) – perform HR and financial duties
    • IT (20 employees with 10 in Chicago and 10 in Baltimore) – manage IT for the company
  • Networking equipment is already in place for both sites, which are separate Active Directory Domains.
  • Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
  • Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). You may make assumptions about how data should be shared or kept private.

Exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.

After collecting enough information about the target during Deliverable 2 (Reconnaissance and Scanning Plan), you will describe how to use that information to gain access to Haverbrook’s systems. Your one- to two-page plan on gaining access should include:

  • details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.
  • an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.

As you are developing the Gaining Access Plan, keep these questions in mind:

  • How would you escalate your privileges?

How would you establish a command and control communication channel?

Define information and information technology and provide examples of each. Describe the role of management information systems in supporting a company’s business functions.

  • Define information and information technology and provide examples of each.
  • Describe the role of management information systems in supporting a company’s business functions.
  • Select two types of information systems a company might need and explain why those systems are important.
  • People, information, and information technology are key resources in an organization. Place these three resources in order of importance to an organization (1 being most important, 3 being least important), and explain why you have ordered them as you have.
  • Describe the role of the knowledge workers, or people, in a company in ensuring the management information systems are used effectively.
  • Define the terms hardware and software.
  • Identify three types of hardware required to support a company’s operations and describe how they support those operations.
  • Identify three types of software required to support a company’s operations and describe how they support those operations.

Explain how multiple requests of cloud consumers can be managed in the cloud environment at the state of using multiple virtual machines. 

Suggest an architect for the front and back end system. Illustrate how it can be connected to the public cloud.

Discuss all the needed requirements for the implementation of file system distribution to be adopted by Al Bashayer Meat Company S.A.O.C in the cloud environment.

Explain how multiple requests of cloud consumers can be managed in the cloud environment at the state of using multiple virtual machines.

In the future, if Al Bashayer Meat Company S.A.O.C has decided to be one of the service providers for their clients (meat distributors), discuss all necessary​mechanisms that the company needs to adapt to ensure a high level of quality and monitoring of services delivery.

How can the company isolate the network traffic that is associated with cloud clients? Justify your answer. f. Since Al Bashayer Meat Company S.A.O.C, has the intention to be a cloud service provider for their distributors. Discuss the right mechanism that can be adopted to ensure that all consumed IT resources are properly measured.

Based on the above scenario, what is the best way/s to identify predefined scaling conditions? Explain your answer with supportive diagrams.

In your design, how do you ensure that the workload is equally balanced among the created cloud services, and what is the best balancing method that can be adapted? Is there any drawback expected for the proposed method? Justify your answer.

As a cloud provider, explain how Al Bashayer Meat Company S.A.O.C will ensure 24/7 service delivery to their clients without any failure

Explain what is required for this data center to be transformed to a hybrid type of cloud computing.

Discuss the appropriate approach of adapting one of the service models such as​(SaaS, IaaS , PaaS)​ in your design.

You are required to supply SLIC with a solution which addresses the integration and configuration of their Active Directory updates.

Slick Systems, referred to as “SLIC,” has hired you as an IT consultant for their Windows network services infrastructure. SLIC is a new advertising firm. They have hired staff, are established in two locations, and have a need to get their internal IT services configured. They have an IT staff, but they do not have the in-house expertise to address their current infrastructure needs.

You are required to supply SLIC with a solution which addresses the integration and configuration of their Active Directory updates.  Cost is not a significant concern – SLIC wishes to implement the “right” solution to address their acquisition of a new company and its Active Directory forest which is comprised of a single domain.  More specifically, SLIC is based out of Chicago, IL and they have a Windows Server 2016 domain that is operating at the Windows Server 2016 functional level.  They recently acquired New Age Cinema Group which is based out of Baltimore, MD, which has a domain running Windows Server 2012 domain controllers.

Active Directory Infrastructure

  • Describe features of Windows Server 2016 that will allow SLIC to integrate the newly acquired company’s domain into their existing forest.
  • How will Forest Functional Levels be implemented?
  • How will cross-forest trusts be implemented?
  • How will replication be handled?

Active Directory Certificate Services (AD CS)

  • Will AD Certificate Services used in both domains need to be modified?

Active Directory Rights Management Services (AD RMS)

  • What use of AD Rights Management Services can be implemented?

Active Directory Federation Services (ADFS)

  • AD Federation Services

Active Directory:

  • What forest/domain model should Opening Windows implement? What is the domain name?
  • Where should the domain controllers be place? Should RODC be part of the consideration?
  • FSMO Roles placement
  • Plan for AD backup and recovery

Group Policy:

  • Is Group Policy needed?
  • What settings might be considered via Group Policy?

Other Windows 2016 Server features:

  • Will WEB APPLICATION PROXY (WAP) be utilized?

Evaluate at least five types of costs associated with developing these applications (the consumer and provider mobile applications for THS) based on both the in-house and purchased software development options discussed in your text.

In your paper, you will develop business process modeling (BPM) diagrams and use case tables as illustrated in your textbook. By developing BPM diagrams and use case tables, you become more familiar with the type of end user requirements needed in the two mobile applications that you are focusing on for your final project: the consumer and provider mobile applications for THS. You will analyze and discuss the content of your BPM diagrams, use case tables, and evaluate strategies for developing these mobile applications.
In your paper,
• Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
• Develop two required BPM diagrams:
o One for the THS providers (such as doctors, nurse practitioners) showing existing and planned use of the mobile platform for reviewing patient/consumer clinical results.
o One for the THS providers showing existing and planned use of the mobile platform for placing test orders to treat patient/consumers.
• Develop three separate use case tables for each of the BPM diagrams that you developed in this week’s discussion and assignment:
o One for the THS providers (such as doctors, nurse practitioners) showing existing and planned use of the mobile platform for reviewing patient/consumer clinical results.
o One for THS providers showing existing use of the mobile platform for placing test orders to treat patient/consumers.
o One for THS providers showing planned use of the mobile platform for placing test orders to treat patient/consumers
• Articulate the content of both the BPM diagrams and use case tables for both consumers and providers in detail.
• Analyze two different scholarly papers that address mobile consumer applications in the health industry and mobile applications used by providers in the health industry.
o The two scholarly papers that you analyze must be researched and may not include resources in the course.
• Discuss your proposed end user requirements illustrated in your BPM diagrams and use cases for the consumer mobile application for THS.
• Discuss your proposed end user requirements illustrated in your BPM diagrams and use cases for the provider mobile application for THS.
• Evaluate at least five types of costs associated with developing these applications (the consumer and provider mobile applications for THS) based on both the in-house and purchased software development options discussed in your text.

Explain the challenges of Cybersecurity in the IoT ecosystem and describe practical assessment approaches and explain what it means to build Risk Resilience for Cybersecurity

You will have to write at least ​3 pages document​ that will be composed of Introduction, Discussion and Conclusion sections. You can choose any of the below 3 topics:
1. Explain the challenges of Cybersecurity in the IoT ecosystem and describe practical assessment approaches
OR
2. Describe Ransomware and give the main point of recent Ransomware incidents
OR
3. Explain what it means to build Risk Resilience for Cybersecurity

How can Artificial Intelligence technology be used to improve customer experience for tourism in South African game and nature parks?

Approved Research Question – From Lecturer and Notes

How can Artificial Intelligence technology be used to improve customer experience for tourism in South African game and nature parks?

Then you could do for sub-questions
What are challenges for customers of South African game and nature parks? (This could be done with a survey or something?)
How is AI used to improve customer experience in general? (This is actually a background question … perhaps do a SLR?)

And then you could perhaps build a model or framework or something as the answer to the main question.

What types of firewalls are used and for what purposes? Are intrusion detection and/or intrusion prevention systems present? Who monitors them?

Assignment: Interview a network administrator at your workplace to learn about the type of security controls in place on that network. What types of firewalls are used and for what purposes? Are intrusion detection and/or intrusion prevention systems present? Who monitors them? What different methods are used to protect the networks that operate the organization’s record-keeping systems? Does the security level vary on different network segments?