What are the basic system administrator responsibilities for managing a client–server network?Discuss

Description

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Focus your discussion on the following:

What are the basic components of a client–server network?

What are the basic system administrator responsibilities for managing a client–server network?

What are the mechanisms used in process management?

What is the boot sequence of a personal computer (PC) in relation to a UNIX or Windows operating system?

Identify the use of a Distributed ledger technology (blockchain, IOTA) for a particular application in a business case.

Description

Identify the use of a Distributed ledger technology (blockchain, Identify the use of a Distributed ledger technology (blockchain, IOTA) for a particular application in a business case.) for a particular application in a business case. Demonstrate the business case then also reporting all design considerations and evaluation strategies employed. Business case could be; Supply Chain

E-Voting

Real state processing

Airline ticket sales

Automated reinsurance

Smart contract system for healthcare management

 

Create a professional PowerPoint presentation for your business recommending a system upgrade.

Given your generic business strategy from week 1 (cost leadership strategy) for Southwest Airlines, if Southwest Airlines can afford only one major system upgrade at this time, describe how one of the following types of systems could contribute to the value of your business and influence the business strategy of cost leadership—choose either: computer-aided design/computer-aided manufacturing (CAD/CAM), supply chain management (SCM) systems, customer relationship management (CRM) systems, or enterprise resource planning (ERP) systems. CAD/CAM systems enable businesses to design and manufacture unique products to differentiate themselves in the marketplace. SCM systems can improve efficiency and reduce costs if a business has a large number of suppliers and products. CRM systems enable businesses to better manage customer information to develop deep relationships with customers. ERP systems help to manage resources (e.g., finance, inventory, human resources) to improve the efficiency of business operations. Even though your business may use many types of systems, focus on one (CAD/CAM, SCM, CRM, or ERP) that is most important for your business strategy.

Create a professional PowerPoint presentation for your business recommending a system upgrade. Make sure you remind your business team of the generic strategy and how the system you are proposing will enhance the business strategy. The presentation should provide a description of the new type of system and describe the types of people in the company who would use or be impacted by the new system. In the PowerPoint presentation you should justify your decision by describing what business improvements your business could make with the new system. The Porter Value Chain and Five Competitive Forces models can be helpful in describing the areas impacted by the new system and how the new system could impact your business’ competitive advantage. Although a cost/benefit analysis would typically be included in this type of presentation, that is not required for this assignment.

Do you think it is ethical for authorities to tap an online service provider and to read people’s email? Why or why not?

Description

(a) Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and to read people’s email? Why or why not?

(b) Identify some of the different types of hackers and viruses and explain how a company can protect itself from hackers.

Instructions: Please read and use the attached Targeting Target document, research the Internet and use three internet references to address all questions. Use the attached rubric as a guide.

Discuss and propose security policies to protect their data and resources in view of their existing risk assessment.

You have been contracted by Globex Corp to discuss and propose security policies to protect their data and resources in view of their existing risk assessment.
Write a proposal for Globex Corp that discusses:

The need for security policies at Globex Corp. The discussion should include how these policies
(as outlined in Q1b.) will enhance Globex Corp security and help to raise their level of cyber
security maturity,

Outline the following security policies:

A security policy that would act to preserve the Confidentiality, Integrity and Availability of their data,
A security policy that would act to protect their data center resources, and A security policy that would act to educate Globex Corp in how they can protect the company’s
data and resources.

As part of the outline for each security policy your proposal should discuss:

The intent and rationale and scope of the policy,

The mandatory requirements for the rules or actions that you think are reasonable to place into this

policy to meet its intent and rationale, Any exemptions that you think are reasonable to place into this policy to meet its intent and rationale.

Your report should have a word count of 4000 words plus-or-minus10%. The reference list is not counted as part of the word count.

What is the relationship between information management, governance, and compliance?Discuss

COMPANY is AMAZON
For this assignment, select a company/organization of any type (for profit, non-profit) and complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and address the items below (you may also consult YouTube.com as a source) This is not a research paper; however provide your source(s):

Answer Questions Below
What are ethics and why are they important to the company selected?
What is the relationship between information management, governance, and compliance?
Why are epolicies important to your company?
What is the correlation between privacy and confidentiality?
What is the relationship between adware and spyware?
What are the positive and negative effects associated with monitoring employees at your company?
What is the relationship between hackers and viruses?
Why is security a business issue, not just a technology issue at your company?
What are the growing issues related to employee communication methods and what can
your company do to protect itself?
How can your company participating in ebusiness keep its information secure?
What technologies can your company use to safeguard information?
Why is ediscovery important to your company?
What are the reasons why your company would experiences downtime?
What are the costs associated with downtime?