Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Term Paper: Planning an IT Infrastructure Audit for Compliance

 

Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment.

The audit planning process directly affects the quality of the  outcome. A proper plan ensures that resources are focused on the right  areas and that potential problems are identified early. A successful  audit first outlines the objectives of the audit, the procedures that  will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to  ten page IT infrastructure audit for compliance in which you:

  1. Define the following items for an organization you are familiar with:
    1. Scope
    2. Goals and objectives
    3. Frequency of the audit
    4. Duration of the audit
  2. Identify the critical requirements of the audit for your chosen  organization and explain why you consider them to be critical  requirements.
  3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.
  4. Develop a plan for assessing IT security for your chosen organization by conducting the following:
    1. Risk management
    2. Threat analysis
    3. Vulnerability analysis
    4. Risk assessment analysis
  5. Explain how to obtain information, documentation, and resources for the audit.
  6. Analyze how each of the seven (7) domains aligns within your chosen organization.
  7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.
  8. Develop a plan that:
    1. Examines the existence of relevant and appropriate security policies and procedures.
    2. Verifies the existence of controls supporting the policies.
    3. Verifies the effective implementation and ongoing monitoring of the controls.
  9. Identify the critical security control points that must be verified  throughout the IT infrastructure, and develop a plan that includes  adequate controls to meet high-level defined control objectives within  this organization.
  10. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include a cover page containing the title of the assignment, the  student’s name, the professor’s name, the course title, and the date.  The cover page and the reference page are not included in the required  assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
  • Describe the components and basic requirements for creating an audit plan to support business and system considerations
  • Develop IT compliance audit plans
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information  technology audit and control using proper writing mechanics and  technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Project: Scan a GitHub Repository using Snyk

  

Final Project: Scan a GitHub Repository using Snyk

Congratulations! You have completed all the modules of this course. Now it is time to test your skills using GitHub and Snyk. In this final module, you will complete a project and submit your work for your peers to evaluate. 

Scenario

You are an aspiring video game developer looking to create cross-platform games using a free, user-friendly game engine. And like many developers, you manage your projects using GitHub repositories. While using the GitHub Explore feature to find public repositories matching your interests, you discover the Godot Engine repository at https://github.com/godotengine/godot. Godot is a popular multi-platform 2D and 3D game engine that fits your needs. You want to fork the repository for personal use, but you also want to scan it for potential vulnerabilities before using its code. Releasing games with significant security issues won’t help your career in the video game industry.

Overview of assignment instructions

This project involves two tasks.

Task 1: Fork a public repository

  • Fork the godot      repository to your personal GitHub account.

Task 2: Examine a repository’s code vulnerabilities

  1. Import and scan      the code of your godot fork.
  2. Examine the      Snyk security report for your godot fork.

Submission guidelines

There is a total of 6 points for this final project. In the peer review section of this project, you will upload screenshots of your work in JPEG or PNG format to show completion of the following tasks:

Task 1

  1. Provide a      screenshot showing that you have forked the godot repository to your      GitHub account. (2 pts)

Task 2

  1. Provide a      screenshot from your Snyk Projects page showing that you have imported and      scanned your godot fork. (2 pts)
  2. Provide a      screenshot showing the Snyk Overview page that displays the results from      scanning your godot fork. (2 pts)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Analysis Quiz

 

QUESTION 2

  1. The key factors that will impact your critical thinking and shape your ambitions (Select all that apply) :1.Deliverables2.Resources

    3.Consumption

    4.Constraints5.People6.Context

1 points   

QUESTION 3

  1. __________: The visualizer here is attempting to assist with the viewers’ process of understanding as much as possible.

    1.Exhibitory

    2.Explanatory3.Exponentiation4.Exploratory

1 points   

QUESTION 4

  1. What circumstances sub category falls under Resources?  (Select all that apply)1.audience

    2.skills3.technology

    4.quantity

1 points   

QUESTION 5

  1. Some activities to help harness ideas:  (Select all that apply)1.Research and inspiration2.Sketching

    3.Keywords

    4.Mental visualization

1 points   

QUESTION 6

  1. Scenarios where the characteristics differ sufficiently to offer different contextual challenges (Select all that apply) :1.stakeholder intrigue

    2.curiosity intrigue

    3.potential intrigue

    4.anticipated intrigue5.personal intrigue6.audience intrigue

1 points   

QUESTION 7

  1. What circumstances sub category falls under People?  (Select all that apply)1.rules

    2.pressures

    3.stakeholders4.audience

1 points   

QUESTION 8

  1. What circumstances sub category falls under Constraints?  (Select all that apply)1.rules

    2.pressures3.format4.technology

1 points   

QUESTION 9

  1. What circumstances sub category falls under Consumption?  (Select all that apply)1.setting

    2.stakeholders

    3.frequency4.skills

1 points   

QUESTION 10

  1. What circumstances sub category falls under Deliverables?  (Select all that apply)1.format

    2.quantity3.setting4.frequency

     

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Working ERD Diagram

  

Purpose: To implement a “prototype” database system application for a eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.

Requirements: (a) Working ERD Diagram.

(b) Explanation of the relationships used in the ERD Diagram (text-based summary).

(c) URL of a WORKING database that maps your database solution. It should be a working prototype. I strongly encourage you testing this and using this as an opportunity. There are many free offers for AWS, Azure, GCP available – especially for students.

Instructions: You will work with book/music/media information, user information, ratings of books, and users’ social network.

Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description.

There are 3 categories of book: fiction, non-fiction, and specialty.

There are 2 categories of music: digital and media-based

An author can write one or more books.

A musician can be a solo artist, part of a group, or both

An author can also be associated with one or more publishers.

A musician/group/act can be associated with one or more music houses

An author’s book can have one or more editions.

A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)

A publisher can have many authors and many books.

A record company can have many artists associated and many albums associated with it. 

A record company can also be the publishing company (i.e. self-publishing)

Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).

An author can write many books.

An artist can write many songs, albums etc.

UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’). A particular user rates a particular item at a given time.

A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately. Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.

There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux Shellcode Development (Based on the buffer overflow topic) Lab

– You need to submit PPT slides, a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets and/or commands followed by explanation. Simply attaching code/command or only screenshots without any explanation will not receive credits. Successful completion is required. 

-You also need to make a  Demo video should be 15 minutes (Unlisted YouTube link only) detailing all the steps of the presented attack and countermeasures. Also, power point presentation should be included in your video as well. Attack has to be demonstrated successfully to receive credit. 

-You must use this command export PS1=”F Dehghan@fdehghan:~$”  

as your first command to change the name in the  Linux terminal

Deadline: 4/30/2021

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion need it by dec 1st 2019 – 5pm

 

Organizations must protect data in a variety of ways. In Chapter 11, you read about different methodologies on securing data in the enterprise. In Chapter 12, you also read about the different hardware topologies that data and database management systems reside on. Answer each of the following questions:

  • Why is security paramount to personal and enterprise computing, especially database computing?
  • Of all the types of security discussed, which form do you feel has the MOST potential to protect data regardless of the environment (physical environment, logical environment)? Will any of these methods benefit blockchain computing?

You must answer BOTH questions to earn FULL points for this discussion.

 Spelling, citation, and grammar count towards your grade. Feedback to peer responses is also an integral part of your weekly participation)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 Graded Exercise 3: “For” Loop

 

You will write a flowchart, and C code for a program that does the following:

1. Uses a “for” loop.

2. Asks the user for their age.

3. Prints “Happy Birthday” for every year of the user’s age, along with the year.

Here is what the output of the program looks like.

File Submission

Upload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2: Kiosk Study

Convince your local public library to offer self-serve kiosks so patrons can check their materials in and out. 

  1. Write a proposal of not more than 650 words that evaluates the operational, technical, and economic feasibility of these kiosks. 
  2. Draw use-case diagrams that illustrate how a patron would interact with the kiosk. These diagrams should illustrate all of the interactions in enough detail to derive functional requirements for the kiosk. 
  • Assume that all materials and library cards carry a unique bar code. 
  • The patron should have the option to receive a receipt for items checked in or out. 
  1. Write sample instructions on how to use the kiosk. The library intends to post these instructions on a sign next to the kiosk, so they must be short (not more than 350 words), clear, complete, and well organized. 

Your document must follow these formatting requirements: 

  • Follow the Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. 
  • Properly cite all sources. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 
  • All charts and diagrams must be the student’s original work. They must be pasted into the document as neat, legible images. 
  • The cover page and the reference page do not count toward the assignment’s length. 

The specific course learning outcome associated with this assignment is as follows: 

  • Outline a plan for the operational, technical, and economic feasibility of an information technology-based solution.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

create a PowerPoint presentation with the following slides (Assignment and text book file attached)

  

Using an organization that you currently work for or have worked for previously, create a PowerPoint presentation with the following slides:

1. Slide 1: Introduction of the organization

2. Slide 2: History of the organization

3. Slide 3: Your role within the organization

4. Slides 4 – 10: Describe seven of the following elements related to the organization (select 7 of 15)

a. Operations Strategy and Competiveness

b. Product Design and Process Selection

c. Supply Chain Management

d. Total Quality Management

e. Statistical Quality Control

f. Just-in-Time and Lean Systems

g. Forecasting

h. Capacity Planning and Facility Location

i. Facility Layout

j. Work System Design

k. Inventory Management

l. Aggregate Planning

m. Resource Planning

n. Scheduling

o. Project Management

5. Slide 11: Your overall thoughts of the organization

6. Slide 12: References for all slides

For additional content, use the notes view of PowerPoint to include details. Minimize pictures to those that are relevant to the content.

Assessment criteria (25 points per criteria): 

· The presentation makes good use of course concepts/practices/strategies; 

· The presentation demonstrates understanding of Operational Excellence practices; 

· The presentation demonstrates appropriate application of Operational Excellence ideas/concepts /practices/strategies;

· Thoroughness, appropriateness, and creativity demonstrated by the descriptions; clarity, organization, coherence, and correctness (spelling, grammar) of the writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now