discuss on Capacity-Based Options (Operational Excellence)

 

After reading chapter 13, In your own words, discuss Capacity-Based Options

Please make sure to provide references used. Minimum 400 to 450 words or more with APA format. 

Text book attached. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud computing paper

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?

• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion – Data Science and Big Data Analytics

 

In this week’s reading, the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Discuss the following with your classmates:

1. Based on what you know about conducting information systems research, how could this project/article be improved?

2. What other research areas or specific projects can you think of would be a good fit for the methodology the authors described in Section II?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cmsc 335 final project

 In addition, a zip file is included that includes several Oracle Java files that use different types of Swing components as well as threads. I recommend going through the reading and the examples to become familiar before attempting the final project. Assignment Details As a new engineer for a traffic congestion mitigation company, you have been tasked with developing a Java Swing GUI that displays time, traffic signals and other information for traffic analysts. The final GUI design is up to you but should include viewing ports/panels to display the following components of the simulation: 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

 

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.

Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.

The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.

For this part of the project:

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 6–10 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Reasonableness and Risk

  

Assume you are the president of a small data brokerage company, which gathers information from

consumers on the web and sells it to other companies for marketing purposes. The integrity of data is

critical to your company’s success. The company makes an average profit of $100,000 per year. It costs

$50,000 per year to secure company data and systems.

Answer the following question(s):

1. Would you continue protecting the data at this cost? Why or why not?

2. You want to expand the company but doing so will cost $75,000. Would you reduce data security,

and therefore the cost, in order to expand? Why or why not?

Fully address the questions in this discussion; provide valid rationale for your choices.

Required Resources

§ Course textbook

§ Internet access

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 1–2 page

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Infrastructure Specifications

 Respond to the questions below in a 4 pages Word document. 

 

DTGOV is a public company that was created in the early 1980s by the Ministry of Social Security. The decentralization of the ministry’s IT operations to a public company under private law gave DTGOV an autonomous management structure with significant flexibility to govern and evolve its IT enterprise.

At the time of its creation, DTGOV had approximately 1,000 employees, operational branches in 60 localities nation-wide, and operated two mainframe-based data centers. Over time, DTGOV has expanded to more than 3,000 employees and branch offices in more than 300 localities, with three data centers running both mainframe and low-level platform environments. Its main services are related to processing social security benefits across the country.

DTGOV has enlarged its customer portfolio in the last two decades. It now serves other public-sector organizations and provides basic IT infrastructure and services, such as server hosting and server colocation. Some of its customers have also outsourced the operation, maintenance, and development of applications to DTGOV.

DTGOV has sizable customer contracts that encompass various IT resources and services. However, these contracts, services, and associated service levels are not standardized—negotiated service provisioning conditions are typically customized for each customer individually. DTGOV’s operations are resultantly becoming increasingly complex and difficult to manage, which has led to inefficiencies and inflated costs.

The DTGOV board realized, some time ago, that the overall company structure could be improved by standardizing its services portfolio, which implies the reengineering of both IT operational and management models. This process has started with the standardization of the hardware platform through the creation of a clearly defined technological lifecycle, a consolidated procurement policy, and the establishment of new acquisition practices.

Technical Infrastructure and Environment

DTGOV operates three data centers: one is exclusively dedicated to low-level platform servers while the other two have both mainframe and low-level platforms. The mainframe systems are reserved for the Ministry of Social Security and therefore not available for outsourcing.

The data center infrastructure occupies approximately 20,000 square feet of computer room space and hosts more than 100,000 servers with different hardware configurations. The total storage capacity is approximately 10,000 terabytes. DTGOV’s network has redundant high-speed data links connecting the data centers in a full mesh topology. Their Internet connectivity is considered to be provider-independent since their network interconnects all of the major national telecom carriers.

Server consolidation and virtualization projects have been in place for five years, considerably decreasing the diversity of hardware platforms. As a result, systematic tracking of the investments and operational costs related to the hardware platform has revealed significant improvement. However, there is still remarkable diversity in their software platforms and configurations due to customer service customization requirements.

Business Goals and New Strategy

A chief strategic objective of the standardization of DTGOV’s service portfolio is to achieve increased levels of cost effectiveness and operational optimization. An internal executive-level commission was established to define the directions, goals, and strategic roadmap for this initiative. The commission has identified cloud computing as a guidance option and an opportunity for further diversification and improvement of services and customer portfolios.

The roadmap addresses the following key points:

  • Business Benefits – Concrete business benefits associated with the standardization of service portfolios under the umbrella of cloud computing delivery models need to be defined. For example, how can the optimization of IT infrastructure and operational models result in direct and measurable cost reductions?
  • Service Portfolio – Which services should become cloud-based, and which customers should they be extended to?
  • Technical Challenges – The limitations of the current technology infrastructure in relation to the runtime processing requirements of cloud computing models must be understood and documented. Existing infrastructure must be leveraged to whatever extent possible to optimize up-front costs assumed by the development of the cloud-based service offerings.
  • Pricing and SLAs – An appropriate contract, pricing, and service quality strategy needs to be defined. Suitable pricing and service-level agreements (SLAs) must be determined to support the initiative.

One outstanding concern relates to changes to the current format of contracts and how they may impact business. Many customers may not want to—or may not be prepared to—adopt cloud contracting and service delivery models. This becomes even more critical when considering the fact that 90% of DTGOV’s current customer portfolio is comprised of public organizations that typically do not have the autonomy or the agility to switch operating methods on such short notice. Therefore, the migration process is expected to be long term, which may become risky if the roadmap is not properly and clearly defined. A further outstanding issue pertains to IT contract regulations in the public sector—existing regulations may become irrelevant or unclear when applied to cloud technologies.

Roadmap and Implementation Strategy

Several assessment activities were initiated to address the aforementioned issues. The first was a survey of existing customers to probe their level of understanding, on-going initiatives, and plans regarding cloud computing. Most of the respondents were aware of and knowledgeable about cloud computing trends, which was considered a positive finding.

An investigation of the service portfolio revealed clearly identified infrastructure services relating to hosting and colocation. Technical expertise and infrastructure were also evaluated, determining that data center operation and management are key areas of expertise of DTGOV IT staff.

With these findings, the commission decided to:

  1. choose IaaS as the target delivery platform to start the cloud computing provisioning initiative
  2. hire a consulting firm with sufficient cloud provider expertise and experience to correctly identify and rectify any business and technical issues that may afflict the initiative
  3. deploy new hardware resources with a uniform platform into two different data centers, aiming to establish a new, reliable environment to use for the provisioning of initial IaaS-hosted services
  4. identify three customers that plan to acquire cloud-based services in order to establish pilot projects and define contractual conditions, pricing, and service-level policies and models
  5. evaluate service provisioning of the three chosen customers for the initial period of six months before publicly offering the service to other customers

As the pilot project proceeds, a new Web-based management environment is released to allow for the self-provisioning of virtual servers, as well as SLA and financial tracking functionality in realtime. The pilot projects are considered highly successful, leading to the next step of opening the cloud-based services to other customers.

Answer the following questions in a substantive manner: 

  1. Why did DTGOV choose a Tier 3 facility instead of a Tier 1? 
  2. Why is it important for the data centers to have standardized hardware? 
  3. Are there any special security considerations based on the main type of business DTGOV handles? Explain. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Advance Project #6 – Unit Testing Bank Simulation

Congratulations!! You have been selected to create a banking simulator. After meeting with the clients, you have agreed on requirements and even have developed a basic design of the program. Basically, the software must be able to create accounts, deposit, withdraw, and transfer funds, and deal with fees, interest, etc.

You have decided to embrace Test-Driven Development (TTD) for this project. This means that, now that the requirements and design have been developed, the next step is to design unit tests for all the classes identified in the design. (Normally you might develop the tests at the same time as starting the implementation, but for this project, we are only developing unit tests.)

View the UML class diagram for the bank simulation. (You can learn about UML from the class resources.)

Requirements:

In this project, you will be given a list of classes and their public methods, for a simple (not realistic) banking simulation program. Your group’s task is to create a thorough set of unit tests. In order to run your tests, you will skeleton classes with stub methods; you should not attempt to actually create a banking simulation program! To save time, I have provided a Zip file with the skeleton classes. You should probably add all those, and a package for your unit tests, before your initial commit.

Download BankSimSkeleton.zip.

Since there is no real code to test (only stub methods), it is expected that all your tests will fail. Keep in mind you are only to create unit tests, not a working program.

Naturally a real banking system needs persistent data (CRUD) to hold account data between runs of the program and many other features. Normally you would need to test that functionality as well. To keep this project simple, no persistence classes or methods need to be tested, and are not mentioned in this project’s requirements. No exception handling is included in this project either.

In other words, this simulation is not terribly realistic. (As a matter of fact, it is not a great design either!) For a first project where you must create unit tests in a group, it should be complex enough as is. Keep in mind the requirements for testing on financial software is high, so be sure to have sufficient tests for the simulator (and not just a few “happy path” tests).

Note that of the six classes shown, some may not have any methods except trivial ones, and thus do not require any unit tests. Some of the methods shown might be considered trivial by your team; you shouldn’t include tests for those either. Additionally, some methods cannot be tested easily using JUnit, such as methods that display a GUI. Don’t try to test such methods, although some of them are shown in the requirements. Testing such functionality requires advanced tools and techniques, such as GUI testers and a mocking framework (e.g., Mockito).

I have also omitted nearly all getters and setters, toString, compareTo, clone, and other such methods from the requirements, but of course a real program must have them as needed. You can actually see those methods in the skeleton classes, for example the “Account.getBalance()” method. In general, such methods are trivial to implement and do not need unit tests, although it is likely you will need to use getters and possibly setters in your unit test methods. However, if your team feels any of those methods merit a unit test, add appropriate unit tests for them. (It isn’t as if adding additional tests is ever a bad thing, just that often it’s a waste of time.)

The Classes to Test:

For the initial version, we can find many candidate classes but in the end only a few are needed to meet the requirements for a simple banking simulation. These classes and their more important methods are described below. Note all classes are in the package banking.

Take some time to example these classes and their methods. See how they can be used in your tests. For example, to create a SavingsAcccount to test you need to create a Customer first, since the only method to create accounts is Customer.addSavingsAccount. Similarly, you will need a Bank object to create a Customer.

Class Bank

Class Bank is responsible for the main method, managing customers, and keeping track of various fees and interest rates; only the fees and rates have setter methods (only one shown in the class diagram).

Bank ( name )

Creates a new Bank object with the given name

static void main ( String[] args )

Handles initialization tasks (such as persistence, if that was implemented in this project, which it is not)

void addCustomerGUI ()

Add a new customer to the bank, using a GUI

String addCustomer ( String lastName, String firstName )

Add a new customer to the bank; return the customer’s ID

Customer getCustomer ( String customerId )

Get a Customer object, given a customer’s ID

List<Customer> getCustomer ( String lastName, String firstName )

Get a List of Customer objects, given a customer’s last and first names. (In general there may be multiple customers with the same names; for testing, assume customer names are unique.)

SortedSet<Customer> getAllCustomers ()

Generates a report of all current customers, in customer ID order, and returns a SortedSet of customers

void removeCustomer ( String customerId )

Deletes a customer from the bank. (In reality, just marks the customer as non-current.)

SortedSet<Account> getAllAccounts ()

Generates a report of all current accounts by all customers, in account ID order, and return a Sorted Set of accounts

Getters, setters, toString, and other methods as needed

You need to test any non-trivial methods your group decides are a good idea.

Class Customer

Class Customer is responsible for managing a customer’s details, including that customer’s accounts. Fields include a reference to the owning bank, a unique customer ID, Customer’s first and last names, and a SortedSet of transactions (not a List for no particular reason). Only the customer’s name fields have setters.

Customer( String lastName, String firstName )

Creates a new Customer object from a name. Note for this project, we assume names are unique.

SavingsAccount addSavingsAccount ( double initBal, String description )

Creates and returns new savings account, with the specified initial balance and account description

Account getAccount ( String accountId )

Returns an Account with the given account ID, or null if no such account

SortedSet<Account> getCustomerAccounts()

Returns a read-only SortedSet of the customer’s active accounts (if any)

void removeAccount ( String accountId )

Removes an Account with the given account ID; in a real program, you don’t delete info, just mark it deleted.

double YtdFees ()

the total fees paid by this customer for year-to-date

double YtdInterest ()

Returns the total interest paid to this customer for year-to-date

Getters, setters, toString, and other methods as needed

You need to test any non-trivial methods your group decides are a good idea.

abstract class Account

Class Account is responsible for managing the details of any type of account, including an accountId, customerId, description, account creation date, the current balance, and the account’s transaction list. Only the account description has a setter.

Account ( Customer cust, double initBal, String description )

Constructor for abstract class, taking a customer, initial balance, and an account description.

abstract void deposit ( double amount )

Add money into account

abstract void withdraw ( double amount )

remove money from account

static void transfer ( Account fromAccount, Account toAccount, double amount )

Transfer funds between two accounts of a single customer.

List<Transaction> getTransactions ()

Returns a List of all transactions for this account.

Transaction getTransaction ( int transactionId )

Returns the specified transaction.

Getters, setters, toString, and other methods as needed

(For example, getBalance.) You need to test any non-trivial methods your group decides are a good idea.

class SavingsAccount extends Account

Class SavingsAccount is an Account, but includes monthly interest payments. A field defaultInterestRate holds the assigned monthly interest rate, and has both a setter and a getter.

SavingsAccount ( double initialBalance, String customerId, String description )

Create a new savings account with the specified initial balance, for the specified customer, and with the given account description

void addInterest ()

Adds a transaction “INTEREST PAYMENT” based on this account’s monthly interest rate.

Getters, setters, toString, and other methods as needed

You need to test any non-trivial methods your group decides are a good idea.

class Transaction implements Comparable<Transaction>

Class Transaction objects represent any deposit, withdrawal, or other transaction on an account. (Note transfers are implemented as a pair of transactions.) This class contains files for a transaction ID, a timestamp (the date and time of the transaction), the type of transaction, the amount, and a description. None of these fields have setters.

Transaction(TransactionType type, double amount, String description)

Create a new transaction

Getters, setters, (for example, to get and possibly set the id, transaction timestamp, type, amount, and description), toString, and other methods as needed

You need to test any non-trivial methods your group decides are a good idea.

enum TransactionType

Enum TransactionType lists all possible transaction types: DEPOSIT, WITHDRAWAL, INTEREST, CHECK, FEE, PENALTY, and ADJUSTMENT.

Potential Changes (Requirements not part of the provided RFP):

To be determined, but there are sure to be lots of them.

Project Procedure:

You will need to create skeleton classes with stub methods for all classes and methods in the design. (A Zip with the skeletons is provided for you, as a starting point.) They should compile and run, but do nothing. Do not implement any methods! 

Once you have created that skeleton (it shouldn’t take long), you can write and then run the JUnit tests. Naturally, it is expected that all the tests will fail, since the stub methods don’t do what they are supposed to do. While developing tests, you may decide additional classes and/or methods are needed. If so, include skeletons/stubs for those as well. Do not forget to include any such design documents (if you change or add to the design) in your projects documentation 

A great way to proceed is propose tests for everything, and then you can merge the best ideas of those. (If you don’t do that, design the tests for each public class member.) In addition to producing a list of tests, you should also document which methods you have decided not to test, and state why. (Not necessary for missing getters, setters, toString, etc.)

Hints:

In this project, I will be grading the quality and thoroughness of your unit tests, and the quality of the accompanying documentation (which methods you didn’t feel it necessary to test, as described above). I will also be checking if you have tests you shouldn’t, such as a Getter method that does only “return value;”. You should review the Testing resources provided on the class web page, which include the testing lecture notes, links to JUnit API and other documentation, and examples and demos.

Short JUnit Refresher:

With JUnit, you use the methods of the class org.junit.Assert, such as assertEquals or assertFalse, inside of test methods which are marked with the “@Test” annotation. These test methods, along with other methods and fields, are part of a class known as a test suite.

For example, for the scoreDetail method, your test might look something like this:

public class MyTestSuite {

@Test

public void testScoreDetailLegalInput () {

final int[] correctScores = { … };

final Round r = new Round( …);

int [] scores = r.scoreDetail();

assertNotNull( scores );

assertArrayEquals( correctScores, scores );

}

}

That is just one test case, with a single legal Round object. It is likely your tests will need many Round or other objects, so you should check into creating a test fixture. A test fixture is simply one or more methods that get called prior to each test method’s invocation. Such methods can reset (or initialize) various fields in your test suite, so each test starts with a clean slate. In this case, you could create a method that sets up some objects for you:

public class MyTestSuite {

private List<Course> courseList;

private Round legalRound1;

private int [] legalRound1CorrectScores;

private Round badRound;

@Before

public void init () {

courseList = …;

legalRound = ….;

legalRound1CorrectScores = { … };

badRound = ….;

}

@Test

public void testScoreDetailLegalInput1 () {

int [] scores = legalRound1.scoreDetail();

assertNotNull( scores );

assertArrayEquals( legalRound1CorrectScores, scores );

}

@Test

public void testScoreDetailBoundryValues1 () {

}

}

Methods marked with @Before all get called before every @Test method does, every time. You can also create @After methods, to cleanup stuff. (You can also have static methods marked with “@BeforeClass”, which get run once at the start of a test run. You could use that to re-create a sample file, setup a database, or start some server program.)

Remember that both Eclipse and NetBeans have wizards to create test suites (Eclipse uses the term Test Case for the class). The hard part is to come up with a good set of tests. You want confidence that if all the tests pass, the code being tested correctly implements the design.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyber

 

The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, “Key Components of an Information System as Related to the Cyber Domain,” is looking for more information on the cyber domain in hopes of determining the organization’s cybersecurity needs. As a cybersecurity consultant, you believe you can provide the CIO with the information he needs.

Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter:

  • A definition of the cyber domain and its key components or aspects. The cyber domain encompasses cybersecurity, a discipline that involves the following:
    • Securing computer information, communications systems, networks, infrastructures, assets
    • Protecting them against damage, unauthorized use, modification, exploitation
  • The components of an information system, elaborating on the similarities to the cyber domain
  • An approach to implementing information security for the organization you chose and how that approach could be expanded to the larger cyber domain
  • The systems development life cycle compared to the cyber domain life cycle
  • The components of the threat environment for the organization you chose, including an argument that a threat to the organization is also a threat to the larger domain

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

*** INTL647 *** Ass 1 Ass 2 and Ass 3 ***** Make sure 3 word document *****

 Assignment 1 already done please work only assignment 2 

 Assignment 1: Cyber White Paper

Assignment Instructions

Within INTL 647 you are required to identify a cyber-related issue that requires a solution. In this case, you will select a topic or issue as it relates to cyber space. This will form as the basis for developing a Cyber Research Proposal (Assignment #2) and Cyber Issue Paper that focuses on your selected cyber topic (Assignment #3).

You are encouraged to refer to Belcher, Wendy Laura. 2009. “Editing Your Sentences” In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.

The goal of this assignment is to present a clear white paper. Your white paper should be between 4-5 pages in length not including your references.

Assignment 2: Cyber Research Proposal

Topic : Please find the attachment [  Assignment 1 ] and 06-INTL647 -CYBERRESEARCHPROPOSAL.PDF

Assignment Instructions

Within INTL 647 you are required to design a line of research around an assessment of specific cyber issue. In this case, you can select the issue that you identified in your Cyber White Paper assignment (Assignment #1).

You are encouraged to refer to Belcher, Wendy Laura. 2009. “Editing Your Sentences” In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.

The goal of this assignment is to present a clear research proposal. Your research proposal should be between 5-6 pages in length not including your preliminary source list and references. 

Assignment 3: Cyber Issue Paper

 

Assignment Instructions

Your final assignment is where you will weave the first two elements (the Cyber White Paper and Cyber Research Proposal) together, and incorporate your research analysis, to create a coherent issue paper that is 13-15 pages in length. While it is inappropriate (not to mention a violation of university policy) to cut-and-paste from past assignments in old courses into new ones, this research project is evolutionary and builds itself up from a research proposal to a completed product. For this reason, in this class it is permissible to paste the information (as appropriate and as it makes sense) from the first two assignments assigned in this course into your final assignment.

*********************  

You need to provide 3 assignment

This is three different assignment , please post with 3 file.

***** DO NOT post it in ONE FILE ***** 

Make sure 3 word document 

 

Assignment  1    $ 20

Assignment 2     $ 20

Assignment 3     $ 50

You can not do all assignment in same time, I will wait for professor feedback.

As of now do only ASSIGNMENT  2

Please feel free to ask me if you have any question

find the attachment for batter understanding ……

  Topic :

        Data Breaches

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now