Describe what kind of business your fictional company is in. Do they sell a product? A service? A new government  agency?

Identifying Your Company and Your Role

You have accepted a job from the chief information officer at a small business with 30 employees. The company moved into a new building last year and quickly expanded. The CEO has asked the CIO to serve as executive stakeholder of the project steering committee, which is headed by the lead project manager of the PMO that the company is contracting with.
For this activity, you will establish the fictional company, executives, and team members that you will refer to.

What is the name of this e-commerce company?What is the fictional name of the CEO, and what is the fictional name of the CIO?
In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government  agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.

Write a well researched 4 page essay not including title page and references on Risk Management in a project.

Risk Management

Write a well researched 4 page essay not including title page and references on Risk Management in a project. Your Essay should cover the following risk management steps:

I. Abstract
II. Introduction – what is risk in a project. This is a definition of risk as it relates to a project
III. Risk Analysis Process
a. Identification
b. Assess the Risk
c. Develop a Risk Response plan
d. Monitor and review risk
IV. Conclusion
V. References

How are cloud computing and the internet of things connected?How are the IoT devices installed and configured?

Determine the implications involved in the design of an internet of things (IoT) software application

Create a white paper using APA format with citations. You may use the White Paper Guidelines document in the Supporting Materials section. Your white paper must address the following:

IoT Devices: Select at least two of the IoT devices introduced in the scenario. Then describe the IoT devices and potential use cases. You may reflect on:

(1) How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?

(2) What features does each IoT device offer?

(3) How are the IoT devices installed and configured?

(4) How could this IoT device be used in schools and classrooms?

Background Information: Explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices. In your explanation, you should also address:

(1) How are cloud computing and the internet of things connected?

(2) How is data from the IoT devices collected and stored?

(3) What are the vulnerabilities, risks, and other issues involved?

(4) What are the layers of an IoT architecture?

 

 

Write an article on Project Management. Your article should give a short history of Project management, define a project and discuss Project Lifecycle.

Project Management

This week, you are required to write an article on Project Management. Your article should give a short history of Project management, define a project and discuss Project Lifecycle.

Your essay should address the following areas covered this week;

Abstract paragraph
Introduction to Project Management – what is a project
Difference between Projects and Operations Management
Benefits of Project Management
Project Lifecycle
Phases of a Project
Conclusion
References
Your essay will be a minimum of four (4) pages. Additionally, you must cite as per APA 6th Edition rules for references, the article used as the basis for the summary. Your essay must have an APA cover page. Academic writing normally includes more than 1 citation with the related reference.

Describe in detail the recent cybersecurity issue that you selected. How was the enterprise impacted? What could have been done to prevent the incident?

In 2017, one of the biggest cyberattacks ever to occur was caused by the failure of the management and IT staff at a well-known, very large enterprise to take the necessary action to prevent the hacking the personal information of over 800 million customers. The ability of the black hats to penetrate the technology portal at mega-giant Equifax and steal personal information was determined to be the simple failure to apply a patch to fix a known risk referred to as the Apache Struts vulnerability. An alert had been promulgated and the employees at Equifax knew of the vulnerability, and even ran some scans, but never applied the patch that would have prevented the reconnaissance and penetration of the data farm at Equifax. The credit-reporting agency had two months to apply the fix before the cyber criminals began stealing the data.

Discuss
For this assignment, research a recent cybersecurity issue that had a considerable impact on an enterprise.

Describe in detail the recent cybersecurity issue that you selected.
How was the enterprise impacted?
What could have been done to prevent the incident?

Compose a scholarly paper that explores five topics relating to information systems utilized by management in today’s global On-Demand economy.

Research Project Submission 1 Due

In this course, you will compose a scholarly paper that explores five topics relating to information systems utilized by management in today’s global On-Demand economy. Before you begin to develop your paper, you will select five IS-related solutions from the list provided in this activity.

Working on this Research Project paper will help you better understand the Information Systems managers frequently use in various types of organizations. You will also enhance your professional growth by researching five IS-related solutions using primary sources outside of the course textbook.

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks.

The growth of mobile technologies and the IoT have played a significant role in the On-Demand Economy environment. A downside to the proliferation of such technologies is the cracks and doors into the corporate and agency networks that have been opened along the data path, allowing for an increased level of black hat intrusions and reconnaissance.

Case Study Assignment
Download the APA Style Template Download APA Style Template and review the Case Study Requirements section.

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks. Your approach here should be to seek out scholarly source data relating to examples of the various cybersecurity measures that top management and IT departments might provide for employees and contractors, including data access enforcement, network intrusion detection and prevention systems, and real-time responses to incidents and attacks. You could focus your research on any one of the various types of defenses such as anti-malware applications, Intrusion Detection Systems , Intrusion Prevention Systems , biometric access, rogue app monitoring, mobile kill switch, or remote wipe capability technologies.

Create a formula for the cell located in Column B, Row 8 that calculates the lowest value for the Jet Fuel pricing available from the five vendors.

Practical Exercise Due

Using the MIN function, create a formula for the cell located in Column B, Row 8 that calculates the lowest value for the Jet Fuel pricing available from the five vendors.
Using the MIN function, create a formula for the cell located in Column C, Row 11 that calculates the lowest value for the Avgas pricing available from the five vendors.
Using nested IF functions, create a formula for the cell in Column B, Row 9 that places the name of the vendor determined to have the “Best Jet Fuel Price.”
Select Align Right for the data in the cell located at Column B, Row 9.
Using nested IF functions, create a formula for the cell in Column C. Row 12 that places the name of the vendor determined to have the “Best Avgas Price.”
Select Align Right for the data in the cell located at Column C, Row 12.
Select All Borders for the cells in Columns A, B, and C, Rows 1 through 12.

What does hashing data mean and how is it used in criminal justice? How does a digital forensic analyst find data in files that may be lost, and do they need to consider any restrictions caused by cyber law or the 4th Amendment to the Constitution?

Resources should be summarized or paraphrased with appropriate in-text and Resource page citations.
Data can be stored in various places and there are significant reasons to understand it. Please answer the following:

Choose three areas where data can be stored and describe the storage location and describe the positive and negative issues of data being stored in those locations.
What does hashing data mean and how is it used in criminal justice?
How does a digital forensic analyst find data in files that may be lost, and do they need to consider any restrictions caused by cyber law or the 4th Amendment to the Constitution?
Describe three laws that concern digital/computer crimes, and provide some substance for why they were created.
Format Requirements

Paper must be double spaced, 11 or 12 pt font and 1” margins all around. Submission must be in .DOC or .DOCX format.
All APA 7th edition format requirements must be followed . Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information. These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.

Compare and contrast SELinux and AppArmor. These are the two security systems built into Redhat and Debian respectively. Formulate an argument as to why one might be better than the other.

Linux Research Paper

Compare and contrast SELinux and AppArmor. These are the two security systems built into Redhat and Debian respectively. Formulate an argument as to why one might be better than the other.

Justify your findings with references. A minimum of three sources should be included in the paper. Research papers on the technical side should be written in APA format. The paper should be 4 – 5 pages, excluding the title page and abstract. Follow the convention of 12-point font double spaced.