Determine the appropriate IT deployment methodology with achievable milestones.Identify the controls needed for confidentiality.

Windows Upgrade Proof of Concept

In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine from this project for the Project 3 presentation, so do not delete the VM.

Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

How Will My Work Be Evaluated?

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.

2.3.5: Articulate the implications, consequences, and potential limitations of proposed conclusions and solutions.
10.1.4: Determine the appropriate IT deployment methodology with achievable milestones.
11.1.3: Install software.
11.2.1: Configure technology according to stakeholder specifications and requirements.
12.6.1: Identify the controls needed for confidentiality.
13.1.1: Create documentation appropriate to the stakeholder.

What is significant about the need for an upgrade to Windows 10? How will it benefit the client? Are there any concerns that the client has about the upgrade? How will you address them?

Windows Upgrade Plan Resources

If you haven’t done so already last week:

Download the Windows Upgrade Plan Template and follow the instructions in the document.

Delete the instructional text from the template before you submit.

Client Specifications for Tetra Shillings Accounting

When developing your plan, keep in mind the following information about the client:

All desktops and laptops are currently running Windows 8.1 Enterprise.

About half of the laptops are less than a year old and will be retained for the upgrade.

All other laptops will be replaced with new hardware in time for the upgrade.

All desktop systems will be replaced with new laptops.

Your windows upgrade plan for Tetra Shillings Accounting should be based on Microsoft solutions and best practices and include the following points:

The advantages of upgrading to Windows 10, including at least three Windows 10 features that will provide the most benefit.

Recommendations for a version of Windows 10 for the upgrade and the install method(s) to be used.

At least two automated deployment options.

Plans to minimize disruptions to business operations.

A strategy that will keep operating systems updated.

Two IEEE references.

How Will My Work Be Evaluated?

For this assignment, you are asked by your manager to develop a plan for upgrading the computers for a client from Windows 8.1 to Windows 10. This will require you to review the business needs of the client so that you fully understand the requirements for the upgrade to be successful. For example, what is significant about the need for an upgrade to Windows 10? How will it benefit the client? Are there any concerns that the client has about the upgrade? How will you address them?

By documenting your choices and the overall recommendations in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.3: Present ideas in a clear, logical order appropriate to the task.

1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.

1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.

2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.

2.3.1: State conclusions or solutions clearly and precisely.

10.1.2: Gather project requirements to meet stakeholder needs.

10.1.3: Define the specifications of required technologies.

11.1.1: Explain appropriate preparation procedures.

Are there other products that could be alternatives to offerings in the chosen industry? Are there other products that could be alternatives to offerings in the chosen industry?

Qualitative Evaluation of the Industry’s Strategic Position

Choose an aspect of the information technology industry that has not been previously used as an example in this course. Use Porter’s five forces to make a qualitative evaluation of the industry’s strategic position. Be sure to explain each of the five forces as well as explain how they relate to your chosen industry.

Note: The satellite tv industry will be the subject for this assignment.

Remember to include the following elements :

Are new entrants being attracted to the market, and are there barriers to entry in the industry?

Are there other products that could be alternatives to offerings in the chosen industry?

What degree of bargaining power do the buyers have in terms of putting the industry under pressure to provide more products or less cost?

What is the importance of raw materials, components, labor, and services that are required for the industry, and are there substitutes for those inputs? Discuss the possibility of switching suppliers, if necessary.

Intensity of competitive rivalry: Does the industry have a sustainable competitive advantage?

What is the purpose of the document? To propose immediate actions to the attack or propose policies to defend against/mitigate same? Or do we need to improve existing policies?

Cyber security issue

FAQ and Supplementary Information
1. Do the page or word limit include references?
2. What referencing style would you like to see for both parts of the Assignment?
5. What is the purpose of the document? To propose immediate actions to the attack or propose policies to defend against/mitigate same? Or do we need to improve existing policies?
6. Should our recommendation/policies be based on the topic covered in the first few weeks of lecture or do we need to research further and include same in the document?
7. If we need to define new policies, how many do we need to for this assessment? 3-4?

Describe POTENTIAL SYSTEM ATTACKS AND THE ACTORS THAT MIGHT PERFORM THEM.

Cyber Threats and Attack Vector

The CEO has decided that an in-depth training on this topic is needed from a top-down perspective to educate employees company-wide.

Include relevant information from your C-Suite Presentation in Topic 4 at the beginning of the report.

• Describe POTENTIAL SYSTEM ATTACKS AND THE ACTORS THAT MIGHT PERFORM THEM.

• Define the DIFFERENCE BETWEEN A THREAT AND A VULNERABILITY.

• Provide at least TWO DIFFERENT ATTACKS THAT EACH THREAT ACTOR MIGHT PERFORM against the hospital, FROM LEAST SERIOUS THREAT TO THE MOST SERIOUS. You MAY NOT USE THE SAME ATTACK ON MULTIPLE THREAT ACTORS, so choose carefully which threat actor is most likely to perform which attack.

 

Do you think it right for the Federal Government to request backdoor access to encrypted devices or unwarranted access to personal communications on these services? How would granting access this impact their business?

Allowing Backdoor Access

Companies like Google, Apple, Microsoft, Twitter, Amazon and Facebook offer up free services to customers all across the globe.

In light of recent events, do you think it right for the Federal Government to request backdoor access to encrypted devices or unwarranted access to personal communications on these services? How would granting access this impact their business?

Analyze how the IT problem you described might be applicable to the business SnackMagic If that IT problem occurred in your business, what might have been the business impact?

The intent of IT governance is to align the business strategy and IT investment, mitigate risk associated with IT, optimize the use of IT resources to contain costs, and create new business value based on IT solutions. These goals are accomplished by focusing on the processes associated with managing IT.

A) Changes in a business often involve IT changes, and modifications to systems may introduce problems. Find an article describing an internal failure regarding IT. Y

B) The COBIT IT governance framework groups 40 IT managing processes into five categories based on the IT lifecycle:

Evaluate, Direct and Monitor
Identify which of the five categories in the COBIT 2019 IT governance framework above applies to the problem you chose. Then, identify which of the processes in the COBIT category could have helped to avoid or manage the problem. Explain your analysis.

C) IT problems often occur when changes are made to meet new business needs or when external factors impact the demand for the amount or type of IT services. COBIT is a governance framework that seeks to take a holistic approach to decision-making by engaging major stakeholders in the decisions regarding the use of IT. Discuss whether involving more key stakeholders in the decision-making process would have impacted the IT problem you described above.

D) Analyze how the IT problem you described might be applicable to the business Snack Magic If that IT problem occurred in your business, what might have been the business impact?

Explain how your team will use the tools. For instance, will one person be in charge of the group calendar or will anybody be able to schedule meetings and invite participants?

Put together a paper to be used to design a power point to use at the kick-off meeting with your new team to introduce the collaboration and productivity tools they will be using.

Explain how your team will use the tools. For instance, will one person be in charge of the group calendar or will anybody be able to schedule meetings and invite participants? Consider how team members will get training or help, if needed. Include one slide with a process map depicting the steps for expense reporting and explain how collaboration tools could make this time-consuming process easier and/or faster.

Why could BAE not take an existing IT infrastructure and simply increase its scale and expect it to work? Be specific and provide detailed explanation for your response.

Answer all questions below:
1. Why could BAE not take an existing IT infrastructure and simply increase its scale and expect it to work? Be specific and provide detailed explanation for your response.

Read and use the attached Disaster at Denver International Airport document, and research the Internet as a reference to address all questions. Use the attached Discussion Board Response Rubric as a guide.