Read various sources to learn more about your information system, or about information systems in general. Explain what you learned from your research and what you know from your own experience with the system, in your own words.

DEFENSE TRAVEL SYSTEM ASSIGNMENT 2

Your essay must be at least 1500 words (approximately 4-5 pages). Microsoft Word has a word count feature, and you can usually view the word count in the bar at the bottom of Word. If necessary, search Google for help on how to view the Word count in Microsoft Word. Download the attached template, which contains additional instructions (and make sure you follow all instructions in the template!). The template document is also formatted correctly for your essay, so you are encouraged to write directly in the attached document (replacing the paragraphs of instruction with your paragraphs addressing each section). Also note that the template is organized into the specific sections you are required to write about in your essay. Leave all centered sub-headings in the essay, and do not change the wording of them — they are important for organizing your essay and facilitating grading by the rubric.

Write only in your own words. You are encouraged to read various sources to learn more about your information system, or about information systems in general, but due to the brief length of the essay, you are discouraged from directly quoting from your sources. Instead, explain what you learned from your research and what you know from your own experience with the system, in your own words. List the references you consulted in your research at the bottom of your essay in APA format (minimum of 3 references).

In Analysis Essay #2, you will address the following:

  1.  a brief reminder of the name and purpose of your chosen information system,
  2.  description of networking, communications, and security components of your information system,
  3.  impact of the information system on the users and/or the organization,
  4.  competitive analysis of the system, including how the system helps users and/or the organization address its business processes (or personal tasks, if not a business system)
  5.  3 well-developed recommendations for improving and enhancing your chosen information system, and
  6.  conclusion. Specific details about what to include in each section can be found in the attached template.

Describe a soft skill you need to work on developing. What are some tips you’ve picked up that you plan to put into practice? How will this skill help you in your career? One assumed soft skill is downloading software. This is something you’ll be expected to do regularly in an IT role. What sort of things might you need to know in order to download software on the job?

DEVELOPING SOFT SKILLS

Employers want their employees to have certain soft skills like communication skills, critical thinking, time management, etc. Respond to the following in a substantive post (2–3 paragraphs):

In one paragraph, describe some soft skills you possess. How did you gain these skills? How might you recommend to others to improve these skills?
In another paragraph, describe a soft skill you need to work on developing. What are some tips you’ve picked up that you plan to put into practice? How will this skill help you in your career?
One assumed soft skill is downloading software. This is something you’ll be expected to do regularly in an IT role. What sort of things might you need to know in order to download software on the job?

Provides the research title, author, student number and word count. Explain to the reader why the research is noteworthy. Provide an overview of the debate around the topic. Alyses the outcome of your primary and secondary research. Explains what can be learnt from the research.

Social media affect on mental health

• Title Page — Provides the research title, author, student number and word count.

• Contents Page

• Abstract – a self-contained, short, and powerful statement that describes the wider focus of the project.

• Background— This should explain to the reader why the research is noteworthy.

• Research aim/question and objectives — This will clarify the key focus of the research.

• Literature Review—This will provide an overview of the debate around the topic.

• Focus of your research

• Method — Th is details how you intend to go about achieving your aim and objectives.

• Findings—This an alyses the outcome of your primary and secondary research.

• Conclusions – This explains what can be learnt from the research.

• Recommendations—This provides a platform for what should happen next.

• Bibliography

• Appendices

Identify the problem to be solved Identify why the problem should be solved Propose the solution you have generated in the appropriate level of detail Show the benefits of your solution Call the audience to action for your project Construct your proposal in paragraph format with properly formed headings.

Changing the training programs/manuals of current IT training within the entire school

The purpose behind a proposal is to develop skills that show a high degree of consideration for your audience, and establish a strong persuasive argument that is well articulated. A well formulated proposal will also outline and define the goals you are going to complete for the client you have chosen. There is a sample proposal that has been posted to the corresponding module to help you with formatting. Feel free to experiment with style, but make sure you keep in mind “good” technical communication and make sure that the document is readable and efficient.

You are to compose a proposal, which outlines a PROBLEM with the SOLUTION being the CREATION of a DOCUMENT that will persuade your client to accept and potentially fund your project.

Make sure that your proposal is doing the following:

Identify the problem to be solved
Identify why the problem should be solved
Propose the solution you have generated in the appropriate level of detail
Show the benefits of your solution
Call the audience to action for your project
Construct your proposal in paragraph format with properly formed headings. Simplicity with this type of document will be key to the client’s acceptance. Make sure that you include any lists of items that you may need in the document, because that can help to draw the focus of the client. Add any headings that you feel would be beneficial for keeping your client on track with your ideas. For some projects these items might not be necessary in the initial stages, but including them shows attention to audience awareness.

Once you have written the proposal make sure that you highlight the following items as they are some of the most essential for this particular document:

The purpose statement in the introduction
The statement that indicates what you are proposing in your plan
Sources for where you found the cost
Who is responsible for each cost
Your cost table introduction
Total cost of the project
The introduction to the timetable
The measure of success in the Expected Results section
The call to action
You must cite any sources you use and make sure to include some method of documentation that will suit your purposes.

What is the definition of Success in a Project? What is Earned Value Analysis? What is the purpose of Variance analysis? Discuss two of the performance Indeces.

Earned Value Management

Discuss the following in Essay form using attached references as a guide with at least one citation per discussion point:

Discussion Points:
1. What is the definition of Success in a Project?
2. What is Earned Value Analysis? What is the purpose of Variance analysis?
3. Discuss two of the performance Indeces.

Write an essay discussing Project Success Factors covered in attachments. Discuss at least two of the project metrics (Chapter 21), measurements, single value indicators (metric), and/or controlling variances. Relate your experiences to the course concepts.

Controlling the Project

Instructions:
Write an essay discussing Project Success Factors covered in attachments. Your paper should discuss at least two of the project metrics (Chapter 21), measurements, single value indicators (metric), and/or controlling variances. Be sure to relate your experiences to the course concepts. This will be a minimum of four pages.

What the steps of building a project team- Discuss. Discuss two of the five communication factors in effective team performance. How are the five communication factors related to Performance?

Five communication factors in effective team performance

Write a 1 page essay discussing the following 3 points with at least 1 citation per discussion point in APA for a total of 3 references.

1. What the steps of building a project team- Discuss.
2. Discuss two of the five communication factors (below) in effective team performance.
3. How are the five communication factors related to Performance?

To summarize, the research literature (see Hirst ‘ Mann, 2004) identifies five communication factors as important correlates of effective team performance:

1. Supportive Leadership—a leader who is a sound, credible communicator; the leader provides clear direction, keeps the team informed Page 172 about developments in the company, liaises comfortably with key constituencies, and provides accurate and timely feedback to team members

2. Communication Safety—a team in which communication between members is open and constructive

3. Team Reflexivity—a team in which members spend time thinking about what they are doing and how they are working together as a team

4. Task Communication—a project that has clear and agreed objectives as well as clear signposts for successful performance

5. Boundary Spanning—good lines of communication between the team and various stakeholders and constituencies with an interest in the project We postulate that success of the team is to be expected when all five factors are working well.

Research about network viruses, ex: most notorious network viruses, their characteristics, how they work, how much damage they can do, how regular internet users and companies can defend from them.

Network Viruses

Research about network viruses, ex: most notorious network viruses, their characteristics, how they work, how much damage they can do, how regular internet users and companies can defend from them.

Read various sources to learn more about your information system, or about information systems in general. Explain what you learned from your research and what you know from your own experience with the system, in your own words.

DEFENSE TRAVEL SYSTEM ASSIGNMENT 2

Your essay must be at least 1500 words (approximately 4-5 pages). Microsoft Word has a word count feature, and you can usually view the word count in the bar at the bottom of Word. If necessary, search Google for help on how to view the Word count in Microsoft Word. Download the attached template, which contains additional instructions (and make sure you follow all instructions in the template!). The template document is also formatted correctly for your essay, so you are encouraged to write directly in the attached document (replacing the paragraphs of instruction with your paragraphs addressing each section). Also note that the template is organized into the specific sections you are required to write about in your essay. Leave all centered sub-headings in the essay, and do not change the wording of them — they are important for organizing your essay and facilitating grading by the rubric.

Write only in your own words. You are encouraged to read various sources to learn more about your information system, or about information systems in general, but due to the brief length of the essay, you are discouraged from directly quoting from your sources. Instead, explain what you learned from your research and what you know from your own experience with the system, in your own words. List the references you consulted in your research at the bottom of your essay in APA format (minimum of 3 references).

In Analysis Essay #2, you will address the following:

  1.  a brief reminder of the name and purpose of your chosen information system,
  2.  description of networking, communications, and security components of your information system,
  3.  impact of the information system on the users and/or the organization,
  4.  competitive analysis of the system, including how the system helps users and/or the organization address its business processes (or personal tasks, if not a business system)
  5.  3 well-developed recommendations for improving and enhancing your chosen information system, and
  6.  conclusion. Specific details about what to include in each section can be found in the attached template.

Develop a security awareness program for MUSA Corporation. Propose to mitigate the security gaps for the corporation given in the Case Document Word. Explain what security tools and employee readiness strategies will be used.

Case for Final Project

BACKGROUND:

You were just hired as the new chief information security officer for Multiple Unite Security Assurance (MUSA) Corporation whose security posture is low. The first thing your chief executive officer tells you is that they have recently seen a presentation by one of the information security team members emphasizing the importance of having a security awareness program. As a result, you have been asked to develop a security awareness program for MUSA Corporation based on the following 10 security gaps:

  1. No annual cyber security awareness training, which is causing high phishing and social engineering attacks
  2. No configuration change management policy (to reduce unintentional threats)
  3. No intrusion detection/prevention system
  4. Logs are not being collected or analyzed
  5. No media access control policy
  6. No encryption or hashing to control data flow and unauthorized alteration of data
  7. Vulnerability assessment is conducted every three years; unable to assess the security posture status
  8. High turnover and low morale among the employees (due to lack of employee readiness programs and work planning strategy)
  9. High number of theft reports and security incidents; possible unethical/disgruntled employees
  10. No segregation of duties or mandatory vacation policies (to mitigate intentional threats)

To that end, you will make recommendations for enhancing security policies, practices, and processes that are currently contributing to a dysfunctional security culture. Your chief goal is to build a program that will foster a healthy security culture and ensure continuous improvement. Your task is to develop a security awareness program that consists of four major components:

  1. Proposal Introduction
  2. Security Policies Development
  3. Continuous Monitoring Plan

Communication Plan

Assignment

Final Project: Continuous Monitoring Plan

Instructions: You will submit a “Continuous Monitoring Plan” laying out the foundation for continuously monitoring the organization against malicious activities and intentional and unintentional threats. This assignment also focuses on work setting techniques and work planning policies to help employees improve their stress anxiety, fatigue, and boredom.

Questions:

As part of the planned solution, you will

  • Propose to mitigate the security gaps for the corporation given in the Case Document Word (refer to the attached document named “Case Document” and the highlighted #3 inside the attached Case Document file)
  • Explain what security tools (firewall, IPS/IDS, antivirus, content filtering, encryption, etc.) and employee readiness strategies (training programs, rewards systems, physical wellness programs, etc.) will be used.