CIS498 Week 6 Assignment – Infrastructure Design

 Week 6 Assignment – Infrastructure Design
Overview
This is the third in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical e-commerce start-up company of your design.
You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In this third course project deliverable, you will create an infrastructure design that considers the key elements of software, hardware, security, and business process flow for your e-commerce startup company. You will also use graphical tools to create a supporting data flow diagram (DFD) for your infrastructure design. The infrastructure design provides an opportunity to visualize the key elements and how they are connected for maximum effectiveness.
    This assignment consists of two-parts:
    Part 1: Infrastructure Design
    You will create an 8–10-page infrastructure design document to include key technical elements for your hypothetical e-commerce company’s information systems infrastructure.
    Part 2: Updated Gantt Chart
    You will use Microsoft Project to again update the supporting project Gantt chart begun in your first course project deliverable:
  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the infrastructure design document.
  • Note:
  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
  • Instructions
    Part 1: Infrastructure Design
    Create an 8–10-page infrastructure design document in which you:
  1. Identify the major hardware and software components of your hypothetical e-commerce company’s information systems infrastructure.
  2. Design your e-commerce company’s hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
  3. Document the potential security vulnerabilities and a security design for your e-commerce company.
  4. Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
  6. Part 2: Updated Gantt Chart
    Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.
    Formatting
    This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
  • The preferred method is for the infrastructure design portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
  • Learning Outcomes
    The specific course learning outcome associated with this assignment is:
  • Propose a design to address hardware, software, and security aspects of an entity’s information systems infrastructure.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

NIST Cybersecurity Framework (CSF) & ISO 27001 Certification Process

 Assessment Description

In this assignment, students will review the NIST cybersecurity framework and ISO 270001 certification process. In a visual format (such as table, diagram, or graphic) briefly explain the differences, similarities, and intersections between the two. Then, present the following in 750-1,000 words:

  1. A brief description of the NIST Cybersecurity framework
  2. A brief description of the ISO 270001 certification process
  3. The number of controls/sub-controls used in the NIST CSF and ISO 270001 certification process framework to support the protections around computer and cyber forensics
  4. An explanation as to why organizations should seek this framework and/or certification to base their security program strategy and decisions upon
  5. An explanation as to why ISO 270001 has rapidly become an industry best practice/standard against which organizations are basing their cybersecurity programs (including value-add, cost, and pros/cons)

Make sure to reference academic or NIST official publications (most current year available via the Internet) or other relevant sources published within the last 5 years.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Human Interaction – computer science

Interactive design is a combination of many businesses, technical, psychological, educational, artistic, and engineering disciplines. Which of the discplines presented (see diagram in Preece text for full scope) do you feel is most important to HCI? 

– 1 page

– apa with references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Health and Genetic Privacy

HIPAA.  Most people in the U.S. today have heard of this acronym even if they don’t know what it means.  Given that medical professionals are required to ask patients to review and sign HIPAA disclosures about the sharing of their privacy data, this week we’ll focus on electronic medical records (EMR).  Your task is to research the EMR issue and identify the “good, the bad, and the ugly” of EMR practices.  

  1. What’s the “up” side of using EMR?
  2. What’s the “down” side of using EMR?
  3. Is it easier to commit a crime with EMR?
  4. Is it easier to detect EMR crimes than it is paper-based crimes?
  5. Will EMR reduce costs or increase them?
  6. How do EMR systems impact HIPAA?

Be specific.  Find and cite specific examples.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

system analysis

1. Define the role of the Systems Analysts versus the Business Analyst.
2. Define the Systems Development Life Cycle.
3. Define the concept of Organizations as Systems.

-1page

-apa with references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 5 – Apply: Cryptography Knowledge Base Article

Assignment Content

  1. Because of growth within your organization, information and policies are in many locations and often poorly maintained. Your company has decided to start a knowledge base for each department that can be accessed by any employee on the company’s intranet. Your manager is aware of your success at the career fair and security presentation at the high school and has selected you to author the first article from your department on cryptography, encryption, and cryptanalysis. 

    Write 2- to 3-page knowledge base article for your company’s intranet about encryption and cryptanalysis basics. 

    Define cryptography, cryptanalysis, and cryptology. 

    Explain the role and importance of cryptography for your company’s cybersecurity.

    Summarize threats to the company from cryptanalysis. 

    Identify at least 5 specific tools or techniques used in cryptography. Briefly explain each tool or technique you selected, including information like its attributes and the solution it provides.

    Format your references according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dissertation – Journal Reflection on Topic Ideas

Note : Please read and write homework 1 and 2

Home work:1

 Share your topic idea(s) here. Here are some things to consider:

  1. Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic. These are examples).  
  2. What is the cited problem? The problem you want to address has to come from the literature, and be cited, who are saying there are problems.
  3. What is the population you would like to address?
  4. What methodology are you planning on using? (If you are unsure, do you plan on a quantitative or qualitative study?  You will determine your methodology in 839).
  5. Locate at least one article related to your topic. What was the research question in the study? Who were the participants in the study? What findings were reported?

Share your topic idea(s) by going to the “Week 1 Assignment – Journal Reflection on Topic Ideas” link above. 

Homework 2:Please fill attached timeline and I will fill up dates 

Completion of the dissertation primarily rests upon you, the doctoral student. However, research indicates that self-regulated learning strategies predict the elapsed time along the dissertation journey (Dunn & Rakes, 2015; Kelley & Salisbury-Glennon, 2016). One such strategy is the creation of a timeline. This cyclical process has the learner plan out a task, monitor their performance along major milestones, reflect on their progress, and then use the reflection to adjust the timeline. However, to be effective, this strategy needs to be personalized for each learner’s purpose (Zimmerman, 2002).

Using the attached template as a guide, you are to create such a timeline – a roadmap, if you will, along your dissertation journey. Incorporated within the timeline are major milestones. Build into the timeline goals for each milestone with specific dates. You may also want to include specific contact information as well as possible obstacles that may arise. This will be a tool you will bring to each consultation with your professor/chair. Most importantly, it is to be a useable point of reference along your dissertation journey.

References

Dunn, K., & Rakes, G. (2015). Exploring online graduate students’ responses to online self-regulation training. Journal of Interactive Online Learning, 13(4), 1–21.

Kelley, M., & Salisbury-Glennon, J. (2016). The Role of Self-regulation in Doctoral Students’ Status of All But Dissertation (ABD). Innovative Higher Education41(1), 87–100.

Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into Practice, 41(2), 64-70.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

HW

 300 words 

Topics: Building Secure Web Applications

Topics: Policy Legal Ethics

  • How did this Topics help prepare you for future endeavors, both academically and in the workplace?
  • What was the best and worst parts of your overall experience?
  • What surprised you about this internship?
  • What, if any, were any dissapointments?

Prepare your paper in WORD using APA format. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Prohibited Use

 

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 3: Develop the Prohibited Use section of your ISP

In this week’s Lab you will develop the section on Prohibited Use of your company’s information system (IS) in the Information Security Plan to include:

·  Prohibition of illegal conduct

·  System and Network Activity restrictions

o  Copyright infringement

o  Proprietary information disclosure

o  Unauthorized use for personal business

o  Malicious programs

o  Account disclosure

·  Email and Communication Activity restrictions

o  Unsolicited emails

o  Harassment

o  Chain letters

o  Spam

·  Blogging and Social Media Activity restrictions

o  Representation of the company on blogs or social media

o  Separation of personal and professional comments

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research a unique news story or article related to Access controls.

 Research a unique news story or article related to Access controls. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please full cite you source. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now