Write a 4-6 page term paper discussing business continuity plan In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.

Business Continuity Plan

Write a 4-6 page term paper

In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.

You must have a minimum of 3-5 outside sources.

Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly.

 

 

In a discussion post discuss systems thinking and how management information systems enables the four key components of system thinking?

MANAGEMENT INFORMATION SYSTEMS DIS 1

In a discussion post discuss systems thinking and how management information systems enables the four key components of system thinking?

 

Briefly summarize what your selection discussed and how it relates to values and ethics. Declare your own stance on the topic and provide a rationale for your stance while maintaining a respectful discussion of possible opposing views

Technology that has ethical implications

Find an article, news report, podcast, lecture, or video that deals with technology that has ethical implications.

At the top of your paper, include a full reference to your selection, including an Internet link. write four paragraphs for four bullet points below .

Briefly summarize what your selection discussed and how it relates to values and ethics.

Relate the topic of your reading to at least one of the values and describe exactly how that value comes into play with this topic.

Relate the topic of your reading to one of the ethical frameworks discussed in the Fox & Reece reading.

For example, you can identify which ethical framework the author/s or people depicted in the reading might be coming from. Or you might introduce your analysis of the topic based on one of the ethical frameworks.

Declare your own stance on the topic and provide a rationale for your stance while maintaining a respectful discussion of possible opposing views

 

Write a essay surrounding religious, ethical, philosophical, or moral implications of work related to Data Science / Artificial Intelligence / Machine Learning.

Religious, ethical, philosophical, or moral implications of work related to Data Science / Artificial Intelligence / Machine Learning

Write a essay surrounding religious, ethical, philosophical, or moral implications of work related to Data Science / Artificial Intelligence / Machine Learning. The goal is to argue a specific point about a topic. Try to be narrower in scope.

 

Should we move data and computation to the cloud, and when should we do it?

Data and computation

POST: Should we move data and computation to the cloud, and when should we do it?

The scientific essay should deal with one of the topics mentioned and have a volume of approx. 1000 words. The essay must be written independently without the help of others and be based on relevant and scientific literature. Thoughts taken from other sources must be marked as such.

 

Based on the above scenario, develop a comprehensive security plan that includes physical, application, operational, and remote security elements.

Security Plan

Scenario: All data is considered sensitive, and all email communications are considered sensitive to classified. All digital assets must be secure, including internal/external communications. Formal policies, procedures, and training are essential elements to securing an organization.

You are the CISO for a Fortune 500 corporation.

Based on the above scenario, develop a comprehensive security plan that includes physical, application, operational, and remote security elements.

Also develop and/or adapt a computing use and acceptable Internet use policy for your organization.

 

Do you find yourself siding with a consequentialist or categorical (deontological) approach to moral reasoning in this case? Why?

Consequentialist or categorical

Visit the Moral Machine website provided in the Study Materials for this module and view the short video. Click “Start Judging” at the bottom of the page and go through a few scenarios.

Consider the trolley dilemma that is described in Sandel’s lecture.

In an essay of 500 words, discuss the following:

Do you find yourself siding with a consequentialist or categorical (deontological) approach to moral reasoning in this case? Why?

After reviewing the Moral Machine, describe the observations you can make about yourself in how you are judging moral actions. What ethical questions are being raised for you?

Which scenario do you think is most ethical of the two scenarios described below?

Which type of moral reasoning (categorical or consequentialist) would support your view? Explain.

Consider the legal issues like vehicular manslaughter and liability. Who is accountable? How might laws need to be reexamined to accommodate self-driving vehicles?

Scenario 1

The self-driving car with sudden brake failure will continue ahead and crash into a barrier. This will result in the following deaths of the passengers in the car:

  • 1 man
  • 1 woman
  • 1 boy

Scenario 2

The self-driving car with sudden brake failure will swerve and drive through a pedestrian crossing in the other lane. This will result in the following deaths of pedestrians:

  • 1 man
  • 1 woman
  • 1 dog (Note that the affected pedestrians are abiding by the law by crossichong on the green signal.)

 

Evaluate their current IT infrastructure needs and limitations, then provide at least five process improvements and rationale behind those improvements. Write a 200-400 word process review for this consultation.

Systems administration, creating a company culture for security

  1. Question 1 : Implement solutions based on an organization’s restrictions, like financial resources, number of users, etc.

Assignment: For this writing project, you’ll be presented with three scenarios for different companies. You’ll be doing the systems administration for each company’s IT infrastructure.

For each scenario, present improvements to processes based on the company’s needs and current restrictions. There’s no right or wrong answer to your consultation, but your responses should explain the problem, the improvement, and the rationale behind them. Write a 200-400 word process review for each company presented to you.

Scenario 1: You’re doing systems administration work for Network Funtime Company.

Evaluate their current IT infrastructure needs and limitations, then provide at least five process improvements and rationale behind those improvements. Write a 200-400 word process review for this consultation. Remember, there’s no right or wrong answer, but make sure to provide your reasoning.

Software Company: Network Funtime Company is a small company that builds open-source software. The company is made up software engineers, a few designers, one person in Human Resources (HR), and a small sales team. Altogether, there are 100 employees. They recently hired you as a system administrator to come in and become their IT department. When a new person is hired on, the HR person purchases a laptop for them to do their work. The HR representative is unfamiliar with what type of hardware is out there; if a new employee requests a laptop, the HR person will purchase the cheapest option for a laptop online. Because of this, almost everyone has a different laptop model. The company doesn’t have too much revenue to spend, so they don’t order laptops until someone gets hired at the company. This leads to a few days of wait time from when someone starts to when they can actually work on a laptop. The company doesn’t label their computers with anything, so if a computer is missing or stolen, there’s no way to audit it. There’s no inventory system to keep track of what’s currently in the fleet. Once a computer is purchased, the HR person hands it to the new employee to set up. Software engineers that use Linux have to find a USB drive and add their preferred distribution to the laptop. Anytime someone needs something from HR — whether it’s office related or tech related — they email the HR representative directly. When a new employee gets a machine, they’re given logins to use cloud services. They get a personal orientation with HR to make sure they can login. This requires the HR person to block off a few hours for every new employee. If an employee forgets the login to their machine, they have no way to retrieve a password and they have to reimagine their machine. Employees don’t have a strict password requirement to set for their computers. The company currently has many of their services in the cloud, such as email, word processors, spreadsheet applications, etc. They also use the application, Slack, for instant communication. 2.

Question 2 Scenario 2: You’re doing systems administration work for W.D. Widgets.

Evaluate their current IT infrastructure needs and limitations, then provide at least five process improvements and rationale behind those improvements.

Write a 200-400 word process review for this consultation.

Make sure to provide your reasoning. Sales Company: W.D. Widgets is a small company that sells widgets. They’re mostly made up of salespeople who work with lots of clients. You’ve taken over as the sole IT person for this company of 80-100 people. When HR tells you to provision a machine for a new employee, you order the hardware directly from a business vendor. You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them. You then give them an orientation on how to login when they start. You currently manage all of your machines using Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have to install lots of sales-specific applications manually onto every machine. This takes a few hours of your time for each machine. When someone has an IT-related request, they email you directly to help them. Almost all software is kept in-house, meaning that you’re responsible for the email server, local machine software, and instant messenger. None of the company’s services are kept on the cloud. Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for everyone. The company generates a lot of revenue and is rapidly growing. They’re expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you’re working.

  1. Question 3 You’re doing systems administration work for Dewgood.

Evaluate their current IT infrastructure needs and limitations, then provide at least five process improvements and rationale behind those improvements. Write a 200-400 word process review for this consultation. Remember, there’s no right or wrong answer, but make sure to provide your reasoning.

Non-profit Company: Dewgood is a small, local non-profit company of 50 employees. They hired you as the sole IT person in the company. The HR person tells you when they need a new computer for an employee. Currently, computers are purchased directly in a physical store on the day that an employee is hired. This is due to budget reasons, as they can’t keep extra stock in the store. The company has a single server with multiple services on it, a file server, and email. They don’t currently have a messaging system in place. When a new employee is hired, you have to do an orientation with them for login. You’re also responsible for installing all the software they need on their machine, and mapping the file server to their computer. The computers are managed through Windows Active Directory. When an employee leaves, they’re currently not disabled in the directory service. The company uses an open-source ticketing system to handle all internal requests as well as external non-profit requests. But the ticketing system is confusing and difficult to use, so lots of the employees reach out to you directly to figure out how to do things. In fact, so many things are difficult to find that employees typically ask around when they have a question. There are nightly backups in place of the file server. You store this information on a disk backup and take it home with you everyday to keep it safe in case something happens onsite. There’s also a small company website that’s hosted on the single server at the company. This website is a single html page that explains the mission of the company and provides contact information. The website has gone down many times, and no one knows what to do when it happens.

  1. Question 1 Overview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets. They’ve hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems: An external website permitting users to browse and purchase widgets An internal intranet website for employees to use Secure remote access for engineering employees Reasonable, basic firewall rules Wireless coverage in the office Reasonably secure configurations for laptops Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to malware infections or lost devices. Engineers will require access to internal websites, along with remote, command line access to their workstations.

 

Define state and non-state actors and discuss the types of cyber threats they pose to our nation. Include in your discussion the potential ‘impact’ of each set of actors against our nation.

Cyber threats

1 Page response to each question below. Use any legitimate resource from the web, textbook, lecture, etc. 2-3 sources for each paper.

1. Define state and non-state actors and discuss the types of cyber threats they pose to our nation. Include in your discussion the potential ‘impact’ (life, costs, governmental, etc.) of each set of actors against our nation.

2. Outline and discuss Clarke’s assessment that there are five “take aways” from the genesis of Cyberattacks as he presents in chapter one of Cyber War. Why is it important to understand these take aways and their role in fighting Cyberattacks.

Using this document and your own experience and knowledge of the company, prepare a paper that describes each of the competitive and macroenvironmental factors forming your chosen company’s overall business environment.

Apple company

Provide one example, with supporting details, of how each of the ten competitive and macroenvironmental factors impacts your chosen company

Read the guide for your chosen company, paying attention to note factors that relate to the environmental factors as described in Chapter 3 of the text.

Using this document and your own experience and knowledge of the company, prepare a paper that describes each of the competitive and macroenvironmental factors forming your chosen company’s overall business environment.

Assignment Checklist: Utilize the Unit 1 template.

Provide one example, with supporting details, of how each of the ten competitive and macroenvironmental factors impacts your chosen company.

Rivals New competitors Suppliers Customers Substitutes Laws and politics Economy Technology Demographics Social factors The paper is required to include an introduction, conclusion and be at least two double-spaced pages in length, using 11-point Georgia font.