What vulnerabilities and threats are you most worried about from an organizational perspective?

What vulnerabilities and threats are you most worried about from an organizational perspective?
How do you plan on hardening your web application environment to ensure your organization has high availability and reliability…and can depend on your web application when questioned by upper management, as well as, your end users, thus ensuring trust that your organizational data will be secure and your organization will continue to operate at an optimal level?

What is Kitsch? why was this assigned, and how does it relate to fiber?

Please read Celeste Olalquiaga’s Rodney and Me, the first chapter of Artificial Kingdom: A Treasury of the Kitsch Experience, and write a 1/2 to 1 page response. Consider questions, What is Kitsch? why was this assigned, and how does it relate to fiber? What is my relationship to kitsch?

What are the pros and cons of in-house development versus purchasing a system?

The essay answers for both 2 and 3 should be 500 words each in order to completely answer the questions.

Assignment:

1.(30) Forest Point Construction (System Planning)

At Forest Point Construction, your boss says that he can estimate the total project time based on his personal experience. You are trying to convince him that he should use project management techniques to handle a complex project. To prove your point, you decide to use a simple example of a commercial steel building construction project, with eight steps. You create a hypothetical work breakdown structure, as follows:

Prepare the site (3 days), and then set the building footers (3 days).
Finish the foundation (5 days), and then assemble the building (3 days).
When the building is assembled, start two tasks at once: finish the interior work (5 days) and set up an appointment for the final building inspection (15 days).
When the interior work is done, start two more tasks at once: landscaping (7 days) and driveway paving (3 days).
When the landscaping and driveway are done, do the painting (2 days).
Finally, when the painting is done and the final inspection has occurred, arrange the sale (2 days).
What is the correct total time?.
Create a Gantt chart that shows the WBS.
What is the critical path?

2. (35) Atrium Bio-Medical Supply, Inc. (System Analysis)

Atrium Bio-Medical Supply is a medium sized regional supplier of medical and laboratory equipment. Since starting the company 12 years ago, Victoria Dawn has built Atrium into a competitive supply company across several metro areas, but her growth potential is limited because the firm does not have an integrated sales and logistics system. Victoria asked you to evaluate Atrium’s options for acquiring a new system.

Tasks

What options does Atrium have for acquiring a new system?
What are the pros and cons of in-house development versus purchasing a system?
If the decision is made to purchase a new system, what are three options for customizing the software?
Based on Part C of the Systems Analyst’s Toolkit, what financial analysis tools should you use to evaluate the software acquisition options for Atrium? Explain how you would apply each of the tools.
.

3. (35) Nothing But Net

Nothing But Net is an IT consulting firm that specializes in network architectural design. As a newly hired systems analyst, you have been asked to explain the advantages and disadvantages of a variety of networking concepts. Your answers will be incorporated into a FAQ section of the new marketing brochure.

Tasks

Should an organization choose a new system based on client/server architecture? Why or why not?
Explain the pros and cons of thick or thin client characteristics.
What is the difference between physical and logical topology? Provide examples.
Will mobile devices replace desktop system units and traditional laptop computers? How would networks have to change if that were to happen?

What approach should the organization take in developing the Cybersecurity Management program? (What standards or frameworks should be used?)

Before you begin read: https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf

Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance.  Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program.

You will need to research the Department of Energy’s Cybersecurity Maturity Model and then compare it to the NIST Cybersecurity Framework and other frameworks listed in the course readings. After you have done so, write a position paper in which you recommend a cybersecurity framework or maturity model as the basis for assessing the cybersecurity program for Padgett-Beale Financial Services. Assessments will be performed on an annual basis beginning one year after the company launches its new operations.

  • What approach should the organization take in developing the Cybersecurity Management program? (What standards or frameworks should be used?)
  • What laws and regulations must be addressed by the Cybersecurity Management Program in a financial services firm?
  • What are the best practices that should be put into place to assess the maturity of PBI-FS’s cybersecurity management program?

Research IaaS or SaaS providers, and pick one with robust features for a medium-sized business with multiple locations.

Research IaaS or SaaS providers, and pick one with robust features for a medium-sized business with multiple locations.

Prepare a 5-7 page presentation, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. The presentation should include the following:

Three important features of IaaS or SaaS you researched that will be used in Location 2
A concise description of how the new configuration would impact the IP addressing of the LAN of Location 2, including usage of VLANs and any necessary switches and routers to connect to the WAN and all internal devices
A network map of Location 2, including connectivity to cloud providers
A high-level description of how to configure a MPLS Network
A sample config output from a switch used in the design for Location 2 and the commands that would be used for basic switch configuration, VLAN creation, and inter-VLAN routing
A concise description of how the Cisco® Application Centric Infrastructure Enterprise Module (APIC-EM) Path Trace Application could be used to troubleshoot the new configuration

How  do employers use workplace monitoring and why they are using it more often

How  do employers use workplace monitoring and why they are using it more often

The paper should have four parts:

1.A reference in MLA format at that start of the paper that allows anyone to look up the article or story

2.A brief summary of the article or story

3.An explanation of how the article or story relates to the module/chapter of the week

4.Your thoughts or opinions about the article or story(why you chose it/what it means to you).
Modern language association (MLA) StandardsModern Language Association (MLA) standards for format, citations, and documentation of references are detailed below and at the “MLA Style” section of the MLA Web site: Modern Language Association(URL: https://www.mla.org/MLA-Style).

1.Assignments must be printed using a computer printer and printed on standard 8.5 x 11-inch white paper using a portrait layout.

2.Papers must be typed on a computer and printed on standard white paper 8.5 inches by 11 inches, portrait.
3. The text of the paper must be double-spaced using Times New Roman, 12 point only.

4. Leave only one space after periods and other punctuation marks.

5. The margins of the document must be one inch on all sides. Paragraphs are to be indented one-half inch from the left margin (five spaces or press “Tab” once).

6. All pages are to be numbered consecutively in the upper right-hand corner, one-half inch from the top, and flush with the right margin.

7. Use either italics or underlining consistently throughout the document for the titles of longer works and, only when necessary, to provide emphasis.

8.Endnotes are to be on a separate page before the Works Cited page.

9. Please do not plagiarize your sources!

Cite the primary article which you are discussing at the beginning of the essay as shown in the example.

If you use references other than the primary article, you must cite them in a List of Works Consulted at the end of the essay.

If you copy anything word-for-word or copy a unique thought, you must cite the reference and page number(s) if page numbers are used in the source.

Provides at least two strengths, two weakness, two opportunities, and two threats that your car dealership faces.

Scenario: You own a car dealership within a large city. You have many clients; however, you have noticed a slowing growth in car sales. You decide to conduct a SWOT analysis of your car dealership to help with your strategic planning within the changing, competitive market.

To conduct your SWOT analysis, you must write an essay that is a minimum of two pages and fulfills the following requirements.

-Articulates the four elements of the SWOT analysis.
-Summarizes the importance of SWOT analysis in -strategic planning.
-Provides at least two strengths, two weakness, two opportunities, and two threats that your car dealership faces. Since this is a hypothetical situation, you can make up your strengths, weaknesses, opportunities, and threats.
-Explains how you could utilize a Gantt chart within your strategic planning.

Develop a Communications plan, using the template identified in the lecture slides

1. Develop a Communications plan, using the template identified in the lecture slides and from the PMBOK’s Project Manager’s Book of Forms, for the workbook case study (page 38 of lecture slides)
2. Develop a Merged Stakeholder profiling and Engagement plan as per page 42 of the lecture notes

Describe the Role of the “SCRUM Master” and their role in the “Daily Stand-up” a 100 word maximum

Individual Questions

NOTE:  you will need to have Watched the video https://www.youtube.com/watch?v=W_P0rVglv5s and have read the SCRUM guide “The SCRUM Guide, Ken Schwaber and Ken Schwaber, Scrum, 2017” to be able to answer these questions correctly.

Each team member will take one of these questions

Q 3

Part A: For the Data Flow Diagram you developed as individual questions in Workbook 3, create a Scrum Board with identified Products in the Product Backlog

Part B: Describe the Role of the “SCRUM Master” and their role in the “Daily Stand-up” a 100 word maximum

Write a 3-5 page summary discussing Human-Computer Interaction (HCI).

Write a 3-5 page summary discussing Human-Computer Interaction (HCI). Discuss its importance. You can include the history and future of HCI as well.