+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

Week 1 Assignment

Week 1 Assignment

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.


Complete your answers on a WORD Document,

Information Systems Infrastructure

 Using the Case study provided in the Learning Resources, write a 2-page paper addressing the questions in the Case. Provide a minimum of one scholarly reference in your paper (cited and referenced in APA format).

-Double space your paper
-The paper must use APA format (6th edition)
-Minimum of 2 pages, excluding any cover page. That is, the 2 pages must be content related. 


 Discussion Points 

1. Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms and identify and briefly describe several that Boeing should have in place to ensure the privacy and integrity of such discussions. 

2. To what extent do the UC benefits experienced by Boeing mirror those of other firms that have deployed UC capabilities over converged IP networks? 

3. To date, Boeing has not implemented the full range of capabilities available through UC systems. If

INFOTECH DQ 1 (Week 1)

 

Week 1 Discussion Forum: Business Strategy Options Menu: Forum

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful qu

Security Policies

Using the guidelines provided in this week's chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).


You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.




Write your answer between 150-180 words using a WORD document.

The Impact Of Innovation

Write a 260- to 350-word article that reviews a recent innovation in health care and its impact on existing systems (e.g., first- and second-movers, wearables, printed organs, genetic testing).




Publish the article on your own social media account (e.g., LinkedIn, Facebook, Pinterest, etc.), or post it on a health care message board of your choice.




Include a citation of your article in your assignment.

Business Intelligence-Discussion

 

A picture is worth a thousand words. While business intelligence tries to make sense of all the data that is collected every day by organizations of all types, communicating the data in a way that people can easily grasp often becomes an issue. In a world where we can produce an astonishing 5.6 zettabytes of data in a year, visualization tools are critical to an organizations success.

Please answer the following question in your initial post:

Why has data visualization become a centerpiece in the business intelligence and analytics business? Is there a difference between data visualization and visual analytics?


Blockchain and HR

 

Find a peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the articles title and author(s) name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the articles author.

5. Discuss the authors point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

Discussion – 2 to 3 paragraph with references

  Your responses are to be at least two paragraphs long and four sentences per paragraph. Update can include information about methodology, new literature discovered, or even questions regarding current progress. Topic selection is Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems can be found at https://www.jstage.jst.go.jp/article/iasme/10/1/10_100103/_pdf. APA citation is the following. Dawson, M. (2018). Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems. Journal of Strategic Management Studies, 10(1), 19-28.  Additional research topics may be provided. Final paper submission is to an academic journal. 

week 11

  

Week 11:

Do a bit of research on penetration testing techniques. Investigate and document the following

Five network penetration testing techniques

Advantages and disadvantages of each

One notable social engineering test

Possible negative implications of penetration tesing

Please write between 200 and 300 words

Week 10:

  

Week 10:

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

Who is likely to attack your site?

When are attacks likely to occur?

What sort of attacks might take place?

How can you best minimize attacks and protect the integrity of your site?

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.