Conduct an Internet research to gather information about the company/ manufacturer MICROCHIP TECHNOLOGY.

Conduct an Internet research to gather information about the company/ manufacturer MICROCHIP TECHNOLOGY. Summarize it’s major products, and it’s application areas. Please include at least TWO REFERENCES. Please NO PLAGIARISM.

Evaluate how your system implements disaster recovery.

Using your chosen system selected in Written Assignment 1, evaluate and provide details on one of the following two options:
Option 1: Evaluate how your chosen system implements incident response. Be sure to include:
Incident response team
Criteria in determining a security-relevant incident
Phases in the incident response process (Both NIST and SANS have outlined phases, if you need assistance with this.)
Option 2: Evaluate how your system implements disaster recovery. Be sure to include:
Business impact concerns (which data/functions are the important to the organization)
System recovery objectives and time frame
Continuity of operations (COOP) and how the system can continue to function to complete the mission
Contingency plans
Alternate site (hot, warm, cold)
Location of alternate site (distance away from primary site)

What kind of medium was used for communicating that particular recommendation or intervention?

The table is based on the type of interventions\ or something similar that has been mentioned or used in the articles (papers) in the form of rec0mmendation/feedback.

The table shall also include the importance level of that intervention in 3 factor scale i.e. (Important/Not Important/Less Important).

Finally, the table should be developed based on following questions (this shall help in shaping the table):

  1. What kind of medium was used for communicating that particular recommendation or intervention?

If it was through internet or mobile technology then,

  1. What was the information, type and content of information?
  2. What was the severity of those interventions? Were they influencing/persuasive/motivational?
  3. What was the outcome of that intervention, i.e. how much energy was conserved?

This table should be developed based on following questions:

  1. What building type has been studied?
  1. What was the orientation of the building? (As this can help in deciding the factors including environmental/climatic and others may influence users to decide on switching their lights/heating/AC systems ON/OFF)
  1. Which behaviour the users changed? Was it HVAC/Lighting/Vertical Mobility or Auxiliary Equipment?

Discuss your professional aims and your proposed practicum objectives with your Practicum Preceptor to ascertain if the necessary resources are available at your practicum site. 

Review your FNP or AGPCNP Clinical Skills and Procedures Self-Assessment Form you submitted for your Week 1 Assignment 2 and think about areas for which you would like to gain application-level experience and/or continued growth as a nurse educator. How can your experiences in the practicum help you achieve these aims?  This is your opportunity to refine and finalize your goals and objectives for your practicum experience.
Review the information related to developing objectives provided in this week’s Learning Resources.  Your practicum learning objectives that you want to achieve during your practicum experience must be:
Specific
Measurable
Attainable
Results focused
Time bound
Reflective of the higher order domains of Bloom’s taxonomy (i.e., Application level and above)
Note: Please make sure your objectives are outlined in your Professional Experience Plan (PEP).

Discuss your professional aims and your proposed practicum objectives with your Practicum Preceptor to ascertain if the necessary resources are available at your practicum site.
Assignment:

Record the required information in each area of the Practicum Experience Plan, including 3-4 practicum learning objectives you will use to facilitate your learning during the Practicum experience.

Identify the common targets of ransomware.

Ransomware and Virus Protection

Overview

You work as an information security specialist for a large financial company and your CISO has asked you to investigate recent ransomware attacks. The CISO wants to ensure that the company is well protected against these types of attacks.

Instructions

Write a paper in which you answer the following:

  1. Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.
  2. Using Google, search for a recent attack involving ransomware that has occurred within the last three months. Explain the type of business, how the attack was detected, and the outcome of the attack.
  3. Determine the best practices that should be implemented by the security department to help reduce the risks posed by ransomware. Propose what users and system administrators should do when a potential infection is suspected.
  4. Compare and contrast viruses, worms, and Trojans. Indicate which of these you consider to be the greatest danger to computer users and/or the greatest challenge for security personnel to protect against.
  5. Use the Internet to identify three commercially available antivirus software products for corporate use. Compare the features of each and describe which one you would recommend (and why).
  6. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

 

The specific course learning outcome associated with this assignment is:

  • Design security plans to keep companies safe from ransomware attacks.

 

 

 

 

 

 

Evaluate major cybersecurity and ethical challenges and risks related to the misuse of abuse of personal or private information.

The student will write an 8-10 page research-based paper in current APA format that focuses on the specified topic for that week. The paper must include citations from at least 15 scholarly sources in addition to the course textbooks and the Bible.

Textbooks: Valacich, J. Information Systems Managing in the Digital World. Pearson. 2018.
Chapter 10.

Overview
Technology brings significant risks and challenges along with its benefits. Wise public administrators need to know about those risks and constantly be vigilant to prevent misuse of information by themselves, their organizations, or external forces.

Item
Learning Outcomes
Upon successful completion of this module, you will be able to:

Evaluate major cybersecurity and ethical challenges and risks related to the misuse of abuse of personal or private information.
Articulate Biblical principles that inform how we should use information.

What are the ethical questions the technology presents for our society?

Assignment Content
Technology has an impact on society and on individuals even if we don’t realize it because we’re so immersed in our technology-centric society. This assignment gives you the opportunity to reflect on and explore the role of technology in our lives.
Imagine you have been asked to submit a peer-reviewed paper for a technology journal.
Select 2 of these technologies that you have experience with:
Smartphones
Video games
SIRI or Alexa Artificial Intelligence
Self-driving cars
Smart cars
Google or Apple Maps
Mobile banking
Uber or Lyft ride sharing apps
Note: If none of these technologies apply to you, work with your instructor to find two technologies that do.
Write a 700- to- 1,050-word reflection on the two technologies you selected (350 to 700 words per technology).
Assess each of the technologies as it applies to you and include the following:
What are the issues the technology causes for our society?
What opportunities does the technology provide for our society?
What are the ethical questions the technology presents for our society?
How can and does the technology influence human activities?
Determine your stance on each technology after you have assessed the technologies. Do the positives of each technology outweigh the negatives?

Explain how virtual machines can provide flexibility and disaster recovery capabilities will change the executive team’s initial resistance to migrate to a virtual environment.

***References – must be from 2015 to 2020
References must be verifiable from Google Scholar
***All numbered items below must be fully researched
Part One
2 Pages – 2 References
***Case Study Attached, must use to answer questions below***
Complete the following for this assignment:
1. Research and provide a written recommendation for virtualization using VMWare.
2. Research VMWare applications for data center virtualization, data management, and virtual storage.
3. Explain how virtual machines can provide flexibility and disaster recovery capabilities will change the executive team’s initial resistance to migrate to a virtual environment.
4. Based on your research, provide a recommendation for a proposed target platform for a typical host machine, including the number of central processing units (CPUs), the amount of memory, the number of network interface cards, and the amount of local storage required.
5. Based on your research of reported virtualization metrics, provide a rough estimate of the number of physical machines that can be virtualized in a host machine for a typical data center environment
6. Justify your selection by identifying the problems that these methods will solve and the benefits that will be achieved by using these methods.

Provide surveillance of the Sprint network to quickly identify and analyze network events using Netcool and other Systems Management Tools

Information Technology Specialist:Technology savvy problem solver, possessing great attention to detail. Adapt at moving into new environments and extrapolate from existing experience to quickly adapt to new technologies. Possess first rate Oral, written communication, and collaboration skills to work in concert with diverse groups effectively.QUALIFICATION HIGHLIGHTS:• Information Technology• Administration• Customer Service• TelecommunicationsEMPLOYMENT:Sprint 12502 Sunrise Valley Drive Reston, VA 20191Network Support SpecialistII / NOC 09/2010 to Present• Provide network support, monitoring, and isolation of company’s global network supporting Sprint wireline TDM and Ethernet WAN’s• Provide surveillance of the Sprint network to quickly identify and analyze network events using

Netcool and other Systems Management Tools • Serve as liaison between various support groups during system outages, and work with third party vendors or service providers to remediate outage issues• Resolve end-user problems and makes necessary modifications to Cisco and Juniper devices• Adhere to strict Service Level Agreements for fault resolution• Ability to work in a fast pace environment and prioritize work• Coordinated with senior level engineering group and site contacts for resolving all technical issues.• Provide quality, timely and accurate end-to-end support and documentation of all activities . This includes (but not limited to) phone, email, instant message and documentation/tracking of the incident through Citrix ticketing system•Monitor and track scheduled network maintenance activities using applicable tools analyzing the duration and potential impact to customers and ensuring they are consistent with approved time constraints for these activities• Excellent analytical and communication skills, works well individually or performs as part of a team.

Create a single .CSV file that would include all the data provided by the API in two or more requests.

Data that you may want to use in a data mining project may come from different sources, it may also be in different formats. Those sources may be static (data is not changing) or dynamic when the time of data acquisition is important as data in the same source may change. A common example of dynamic sources is API. Besides various ways to use them for systems interfaces, APIs can be seen as sources of data when a certain type of request (e.g. GET type in RESTfull APIs) is executed. Note that many APIs provide data in JSON format.

Directions
Pick any API from the list: https://github.com/public-apis/public-apis (Links to an external site.) which may potentially be meaningful for your field of study (e.g. business). Note, that some APIs require a complex authentication while others don’t (Auth: NO). Also, select an API that would represent data that changes at least daily by its nature (e.g. exchange rates may change daily, while Uber rides data change very frequently).

Load sample data from the selected API at least two times (chose an interval between those requests based on the pace of the data change). Create a single .CSV file that would include all the data provided by the API in two or more requests. Make sure to label each record provided by an API with the time of the request. Also, include column(s) that will show the difference of at least one value that occurred between the requests.

For example, if a Weather API returns a JSON file with the current temperature in 10 cities, convert data to .CSV, which when combined would have at least 20 records (2 for each city based on two requests), add an additional column with the time of the request, and a column showing the difference between the temperature during the second and the first request.

Use an appropriate tool to conduct the assignment (Python, SAS, etc.).

Submit a Word document that includes the description of the API and its data, description of the steps you had to do to complete the assignment, the selection of the tool. Also, attach a computed .CSV file.