Assignment-2

 Question: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. 

 For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

– References 

– APA 7 Format

– 400 words

–  No plagiarism 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 Week 8 Assignment – System Implementation

 Week 8 Assignment – System Implementation

Overview

This is the fourth in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again, you updated your supporting Gantt chart to reflect the major and minor tasks uncovered while developing the infrastructure design.

This fourth course project deliverable focuses on the project’s construction phase. In this assignment, you will develop the system implementation plan document. This document will include the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure. This assignment consists of two parts:

Part 1: System Implementation Document

You will create an 8–10-page system implementation document that details the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure.

Part 2: Updated Gantt Chart

You will use Microsoft Project to once again update the supporting project Gantt chart begun in your first course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the system implementation document.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: System Implementation Document

You are to write an 8–10-page system implementation document in which you:

  1. Use graphical tools to design the logical and physical layout of the planned e-commerce company’s information systems.
  2. Use graphical tools to illustrate the possible placement of key infrastructure elements with external connectivity (Internet) and internal connectivity (firewalls, LAN).
  3. Develop the bill of materials and tabulate it in a spreadsheet to include item, description, model number, and approximate cost.
  4. Document the methodology and process to include the engineering, furnishing, and installation of the identified inventory.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart

Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the system implementation document.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the narrative portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 Week 10 Assignment – Comprehensive Project Plan and Executive Presentation

 Week 10 Assignment – Comprehensive Project Plan and Executive Presentation

Overview

This is the fifth and final course project deliverable in the series of five sequential assignments in this course. You are continuing on in your role as the CTO of a hypothetical e-commerce start-up company of your design.

Throughout the course, you have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again you updated the supporting Gantt chart based on the major and minor tasks identified in the infrastructure design document.
  • In the fourth course project deliverable you developed the system implementation document. This document spelled out the EFI technical aspects of your e-commerce company’s information systems infrastructure. Again you updated the supporting Gantt chart to reflect the major and minor tasks identified in the system implementation document.

You are now in the final stage of the project plan development. You will leverage all previous deliverables and integrate them into one document that will serve as the project’s statement of work.

Your goal is for the start-up company’s executive team and the venture capital group to approve and fund your project. The detailed project plan is necessary to accomplish the monumental implementation task. The executive team and investors, however, are only interested in an executive summary in the form of a 10–15-slide PowerPoint presentation. As a result, you are required to create a compelling PowerPoint presentation, supported by the detail in your project plan, which convinces the executive group that your solution is optimal.

This assignment consists of three parts:

Part 1: Comprehensive Project Plan

You will create an 8–10-page final comprehensive project plan. This document will distill down the most salient points from each of the four previous course deliverables into one integrated, cohesive comprehensive project plan that persuades investors of the recommended approach.

Critical Note: Do NOT simply combine the previous four assignments into one 30–50-page document. Instead, your task is to:

  • Review each of the four previous assignments.
  • Select the most critical information from each that investors need to know to make an informed investment decision.
  • Summarize the information you selected.
  • Ensure that the selected information flows from one section to the next in a cohesive and compelling fashion.
Part 2: Executive Presentation

You will create a 10–15-slide compelling executive presentation that convinces the start-up company’s executive team and potential investors to invest in the company. Your recommended solution is the one that can grow this $5 million dollar e-commerce start-up company into a $30 million dollar company within the next two years.

Part 3: Updated Final Gantt Chart

You will use Microsoft Project to update the supporting project Gantt chart begun in your first course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment to produce the final project Gantt chart to include all major and minor tasks necessary to execute the project.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit all three parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions 

Part 1: Comprehensive Project Plan

You are to write a comprehensive 8–10-page comprehensive, final project plan in which you:

  1. Describe the project’s goals, objectives, scope, and control measures.
  2. Relate the value of the proposed solution to the competitive advantage that information technology will afford the e-commerce company.
  3. Provide a rough estimate of the entire project’s cost, including hardware, software, and labor.
    • The work you did to create the bill of materials in the fourth course project deliverable will help you with this.
  4. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Executive Presentation

You are to create a 10–15-slide executive PowerPoint presentation to persuade potential investors to invest in your e-commerce start-up company. In your presentation you are to:

  1. Illustrate the concepts from your 8–10-page comprehensive project plan in an executive presentation.
  2. Create bulleted speaking notes to the executive board in the Notes section of your PowerPoint presentation.

Note:

  • Create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
  • Consider including images, graphics, charts, tables, etc. in your presentation to increase audience engagement.
Part 3: Updated Gantt Chart

Use Microsoft Project to update the previous Gantt chart to produce the final project Gantt chart to include all major and minor tasks necessary to execute the project.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

Comprehensive Project Plan
  • The preferred method is for this portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
Executive Presentation
  • Use a readable size font (24 points or above) on your slides. For your slide notes, the preferred method is to use Times New Roman font (size 12), single-spaced, with one-inch margins on all sides.
  • Include a title slide containing the assignment title, your name, your professor’s name, the course title, and the date. The title slide is not included in the required number of slides.
  • Include a source list slide. Citations and references must follow SWS format. The source list slide is not included in the required number of slides.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 502

 

For this discussion post:

  • Select one of these major cloud service models: IaaS, SaaS, or PaaS.
  • Go to the Strayer University Library to research your selected cloud service model.

Please respond to the following in a post of 150–200 words:

  • Describe key issues when configuring and operating security for your selected cloud service model.
    • Be sure to support your response with examples based on your research and experience.
  • Provide a full citation and reference, formatted according to Strayer Writing Standards.
    • For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Authorized Uses

 

Authorized Uses

Overview: 

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario..

Your Task 

Step 2: Develop the Authorized Uses section of your ISP

In this week’s Lab you will develop the Authorized Use section of your ISP to include:

·  Who can use the technology?

·  Define fair and responsible use.

·  Explain how the company will protect personal as well as proprietary information.  

·  Include access to company systems from ‘outside connections’ (e.g. – public hotspot)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

D

 

Write discussing sqlmap, an automated tool for SQL injection and database takeover in 450 words or more. Why do we need an automated tool for SQL injection? 

Do not copy without providing proper attribution. 

Write in a format not in outline, bulleted, numbered, or another list format.  

t. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Onboarding and Hardware Life Cycle

Think about the time it took to deploy Windows and Ubuntu in VirtualBox. Imagine repeating this process three times, 10 times or 1,000 times. What techniques could be used to speed this process up? Perform some research and recommend what you would do in these three cases.

Aligned Objectives

  • Inventory workstations, laptops, and mobile devices managed by an enterprise
  • Describe how to manage and deploy and hardware life cycle
  • Inventory software running on an enterprise’s hardware

Parameters

300 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Systems Management

 

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 4: Develop the Systems Management section of your ISP

In this week’s Lab you will develop the section on Systems Management which focuses on the user’s relationship to systems management and the responsibilities delegated to both users and systems administrators to avoid confusion. This includes:

·  Authentication and Encryption

·  System Administrator Responsibilities

·  User Responsibilities

·  Auditing

·  Configuration

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DA Week 13

In 600-700 words

Topic:  You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report: 

Include references

  • Briefly describe your company
  • Briefly describe Python
  • Give an overview of Machine Learning
  • Report on:’
    • Implementation plans
    • Technical training
    • Python libraries required
    • How Python will be used
    • Types of reports that will be produced

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit Testing for Authentication and Logging

 Overview: 

This homework will assess your ability to design, code, and prepare unit tests for a simple login application. The application should be a standalone desktop application without any Web components. You can code the application in Java, C#, or C++. 

Assignment: Total 100 points:

Using the readings from weeks 1 and 2 as a baseline, develop a graphical user interface that allows a user to log in to a system. The login screen should contain fields for entering a username and password and buttons to submit the information for authentication and a button to clear or reset the fields. 

You can hard-code the password authentication for now- as the purpose of this exercise is Unit testing. The system should log all attempts into a Log.txt file. The log should include the username, the date, the time, and if the login was successful or not. 

Create multiple Unit tests (use Junit if selecting Java, and Visual Studio Unit Test if using C++ or C#). You should design and implement a comprehensive set of Unit tests – a minimum of 4 that includes testing of the login form with successful/unsuccessful logging attempts and the logging functionality to the Log.txt file. You should run your unit tests and clearly show the results for each test in your submission. 

Deliverables: You should submit your source files, example log files, and a word (or PDF) document providing a detailed explanation of each of the unit tests along with screen captures showing the results of your unit tests. Screen captures are clearly labeled indicating exactly what the screen capture represents.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now