Module 7 Case Study

Jane Doe is the network administrator responsible for security for a small defense contractor. Her company does handle some low-level  classified material. She has implemented a strong security approach that includes the following: 

– A firewall has all unneeded ports closed. 

-Virus scanners are placed on all machines. 

-Routers between network segments are secured. 

-All machines have the operating systems patched monthly.

-Passwords are long, complex, and change every 90 days.  

What other recommendations would you make to Jane Doe? Explain the reasons for each of your recommendations. 

Your Case study should be complete, organized, supported by references.  There should also be citations from your references to support your suggestions.

Please use APA format and do not use old book references. Please use online newer websites as references. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud will impact future operating systems

create a post where you discuss how the cloud will impact future operating systems.

Initial posts should be a minimum of 400 words that cites sources and follows APA formatting.

Also, respond to at least two peers’ posts. Responses should be substantiative and clear and further the conversation by stating what you learned from the post and asking questions. A suggested minimum is 150 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 6: Formal Letter

Within a few days after a job interview, you should write and send in a letter of thanks. In most cases, it is okay to send this letter via email. However, if time permits, a handwritten letter is always better.

Using the job described in the ad you targeted in your budget assignment, pretend you already interviewed with the supervisor and write a thank-you letter in response. Your letter should be professionally written as discussed in this lesson. Use the letter to incorporate at least one of the following thank you letter concepts:

  • Stress how well you fit in with the company culture, especially now that you know more about it having gone through the interview.
  • Build on the strengths of the interview and emphasize the match between you and the job.
  • Bring up anything you thought of after the interview that is pertinent to the employer’s concerns.
  • Do damage control to carefully address anything that went wrong in the interview.
  • Restate your understanding of the next step in the process.
  • Restate your enthusiasm for the job.

You should pretend that you are submitting the letter via email, but you will submit it here as part of a Word document. The thank-you letter you write for this assignment should:

  • be in standard business letter format, single-spaced, 12 pt font, and 1 inch margins.
  • be relatively brief. Three (3) paragraphs is fine, although it can be longer.
  • not contain typos/misspellings. Like the resume, in the work place, a thank-you letter is highly judged if there are typos or misspellings.
  • refer to an attachment that contains references. You do not need to attach anything, just tell the reader there is an attachment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

InfoTech Import in Strat Plan (ITS-831-31) (Phd Information Technology)

Note :Discussion is already submitted and I need to responses for my friends postings

Discussion 1 (Week 1): Business Strategy Options Menu: Forum

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

————————————

Student post 1

 

The Information Systems Strategy Triangle is a straightforward structure for understanding the effect of IS on associations. From the Information System Strategy Triangle, we can see that the IS technique triangle comprises of Business Strategy, Organizational Strategy and Information Strategy. A Business Strategy is a very much verbalized vision of where the business tries to go and how it hopes to arrive. It is the structure by which a business conveys its objectives. Hierarchical methodology is worried about imagining a future for your privately-run company, making an incentive according to your clients, and assembling and continuing a solid situation in the commercial center. Data Strategy implies the equipment, programming, application, database, method, individuals, arrange.

As we probably am aware, the Successfully firms’ business procedure drives both their authoritative and IS methodologies. It implies that they should try to adjust business, authoritative, and IS methodologies. IS Strategy is influenced by different techniques (SHANRINAZ, 2009) a firm employments. Hierarchical and Information Strategy are then needy upon the Business Strategy. Changes in any procedure requires changes in the others to look after parity (elastic band!). Business, IS and authoritative procedures must be continually balanced. IS technique consistently includes outcomes on business and authoritative methodology.

On the off chance that a customary assembling organization that needed to exploit the Internet and the Web, the plan of action of the organization has transformed from the conventional to E-trade make. Electronic markets permit coordinating contending organizations to control how a market in a specific business territory works. This can have key ramifications because of way this controls the natural risk and openings. Web business can possibly supplant conventional deals directs in both the business-to customer and business-to-business areas. Also web based business can create new business openings, for example the offer of electronic substance has given another channel to the dissemination of music, and it might be contended, given an alternate item. Generally speaking, the plan of action has changed, so the activity of the association additionally would be changed.

As a business technique is created it ought to be utilized to illuminate the systems regarding the divisions that make up the association, along these lines the Organizational and IS methodology of an organization would be affected by the business procedure. At the point when an organization needs to change its plan of action from customary to E-trade, the Organizational and IS methodology will likewise change following the Business Strategy (SHANRINAZ, 2009) with the goal that the IS Strategy Triangle can keep balance. Selection of internet business techniques infers that new innovations must be aced and better approaches for working will be experienced. An association must dissect the prerequisites and guarantee that it can meet them with the goal that the association can have a high accomplishment in its business.

Reference:

SHANRINAZ, M. (2009). Management and Informatiob Systems. IEEE.

——————-

Student post 2

 

Importance of business strategy driving organizational strategy and IS strategy

The business strategy should be used to drive organizational strategy and Information System strategy in an organization. The business strategy offers support to all operations in an organization aiming to achieve the business goals (Pearlson, Saunders & Galletta, 2019). Organizations need to define and follow their business strategies adequately to acquire an effective organizational strategy and IS strategy. Business strategies lead the organizational and IS strategies to the missions of the organization, thereby deploying initiatives of these strategies based on the company’s business strategies. Companies should align all their decisions regarding vendor policies and employment as well as software and application decisions and other IT components (Pearlson, Saunders & Galletta, 2019).

          Business strategies also need to drive organizational and IS strategies to perpetuate the balance requirement for successful operations and to prevent these strategies from being adversely affected by the company’s changes. Business strategies also ensure that the organizations are protected from the harmful unintended consequences that may result from implementing IS and organizational strategies (Oktavia, 2014). Business strategies also ensure that the organizational and IS strategies are in line with the objectives of the organization to realize maximum benefits.

What might happen if the business strategy was not a driver?

          Failure to use the business strategy as a driver to organizational and IS strategies may cause severe consequences to a company. The IS and organizational strategies may fail to support the company’s goals, thereby leading to misaligned resources in the company (Pearlson, Saunders & Galletta, 2019). Also, the IS and organizational strategies may fail to support the business strategies, thus affecting the productivity and performance of the organization in the market (Oktavia, 2014). Failure to use business strategies as a driver hinders collaboration between the company strategies, thus failing to support business functions.

References

Pearlson, K. E., Saunders, C. S., & Galletta, D. F. (2019). Managing and using information systems: A strategic approach. John Wiley & Sons.

Oktavia, T. (2014). The Correlation between Business Strategy and Information System Strategies For Education Institution: Concept And Design. Journal of Theoretical & Applied Information Technology66(3).

—————————–

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Blockchain: Exploring Hyperledger Fabric

  

Zero Plagiarism and APA format and mandatory three question need to ask to other students as mention below.

Mandatory to use book and Resources below one only:

Gaur, N., Desrosiers, L., Novotny, L., Ramakrishna, V., O’Dowd, A. & Baset, S. (2018). Hands-On Blockchain with Hyperledger: Building decentralized application with Hyperledger Fabric and Composer. Packt Publishing.

In chapter 2, the author describes Hyperledger Fabric and its components.

· Create a new thread 

  • Choose one of the Hyperledger design principles described in       chapter 2 that you found to be most interesting.
  • Explain why you found your chosen design principle to be       interesting, and why it is important to a successful enterprise       blockchain implementation.

I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and      add these to the end of your thread.

o The questions must be taken from material you read in Chapter 1 or 2, and each question should start a discussion topic.

o You’re not trying to test each other, but you are trying to start a discussion.

  • Finally, go to three other students’ threads and post      comments, answering at least one of their questions.

o For EACH comment you post, use the 3CQ approach (described above.)

o When someone asks you a question, answer it!

ALL threads and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

· Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

· I agree with you about …

· I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

· I can connect with you about …

· I once read a story about …

· I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

Remember that ALL discussions must use the 3CQ approach to interaction.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Analyzing & Visualizing Data – Topic PPT

Initial Post

For this assignment, you will identify a computer system you have recently had experience with and prepare an attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

Begin with an description of the organization and the computer system you have chosen.

Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.

Draw from the assigned readings (and independent research) to identify what topics should be included.

If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Reply Post

Reply to 2 – 3 posts on your classmates’ posting providing your thoughts on the security issue. Provide your response on whether you (as a manager) would approve/disapprove the project based on the results of the resentation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 9- Exe Project

Your university is holding a fund-raiser and will be hiring a band to entertain spectators.  You have been selected to serve as the event project manager and have created a Work Breakdown Structure and duration estimates for the activities involved in site preparation for the event. Construct a network activity diagram based on the following information:

  1. Conduct both a forward and backward pass using AON notation.  What is the estimated total duration for the project?
  2. Identify all paths through the network.  Which is the critical path?
  3. Which activities have slack time?
  4. Identify all burst activities and merge activities.

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

AWS project

 

AWS Account Creation – 100 points

1.  Create an AWS Educate account.  Take a screen shot of Your Classroom Account Status.  Get started at this link: https://www.awseducate.com/registration#APP_TYPE
2.  Follow the instructions in AWS for how to launch an Amazon EC2 Instance, and launch an instance of: Microsoft Windows Server 2016 Base.  Connect to the instance using an RDP client (i.e. Microsoft Remote Desktop), create a file on the instance desktop with your name, and take a screen shot.
Launch a Linux Virtual Machine with LightsailLaunch a Linux virtual machine with Amazon Lightsail.Amazon Web Services, Inc.

3.  Follow the instructions in AWS for how to launch an Amazon EC2 Instance, and launch an instance of: Ubuntu Server 16.04 LTS (HVM), SSD Volume Type.   You may also use: Ubuntu Server 18.04 LTS (HVM), SSD Volume Type.
How To Launch An AWS EC2 Server And Set Up Ubuntu 16.04 On ItIn this tutorial, We will Learn How to Setup an AWS EC2 Instance from Scratch. We will Configure the Ubuntu 16.04 OS on The Server and Some Essential Configuration Too.Mobisoft Infotech
4. SSH in to your Ubuntu instance and take a screen shot of your SSH session. 
Click on the “AWS Account Creation” link above to submit your MS Word document containing the three screen shots. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assingment1: Research Paper Big Data Analytics

  The  recent advances in information and communication technology (ICT) has  promoted the evolution of conventional computer-aided manufacturing  industry to smart data-driven manufacturing. Data analytics in massive  manufacturing data can extract huge business values while it can also  result in research challenges due to the heterogeneous data types,  enormous volume and real-time velocity of manufacturing data. For  this assignment, you are required to research the benefits as well as  the challenges associated with Big Data Analytics for Manufacturing  Internet of Things.  Your paper should meet these requirements:  

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ShreeAssingment1: research paper

 The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things. Your paper should meet these requirements:  

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now