Categories
Information Systems homework help

  Concisely summarize key take aways from the video (1 page, double-spaced: 10 p

  Concisely summarize key take aways from the video (1 page, double-spaced: 10 points) 
 https://www.youtube.com/watch?v=G8cnA0NJA2Q    

Categories
Information Systems homework help

  Please develop a recommendation in the form of a memo to acquire outsourcing s

 
Please develop a recommendation in the form of a memo to acquire outsourcing services for the purposes of having a totally external IT operation for one of the companies provided below. Identify the needs of the company based on the scenario to select the appropriate cloud service (PaaS, IaaS, or Identity as a Service). The memo should include the following: define the scope of the problem, review of the cloud provider, estimated cost, describe the services to be provided, and explain the justification.
Paper Requirements:
Select a valid cloud vendor
Specify which scenario you are addressing by naming the business from the scenario in your paper.
Paper length: 2 pages
Minimum References: 3
APA
For the below scenario, research a cloud platform to address its needs. The solution must be of the following: PaaS, IaaS, or Identity as a Service
JML DevOps Inc. – JML is working on a major project with limited funding. The project requires the build on new servers for their developers to create, design, and deploy a new web application. JML does not have any server administrators available to work on the hardware infrastructure which leaves the developers in a critical bind. The project will also need storage for its content as the application will collect over 10Gb of data daily. Although, the project has limited funds, if a solution is found to complete the project in a timely fashion without pulling from the server admins, they are open to additional funding for the project.

Categories
Information Systems homework help

You have been selected to be the project manager (for a project of your choice)

You have been selected to be the project manager (for a project of your choice). The project that you decide to use should meet all the key criteria of a project as outlined in the PMBOK, such as (a) having a beginning and an end; (b) resulting in something being delivered to someone; (c) requiring a series of activities that must be done to complete the project; and (d) requiring resources (for example, people and materials) to complete the work. The project should be an information technology-related project, something related to an area of information technology that is of interest to you. If you need help in determining a project, please consult with your professor.
Write a 7–11 page paper in which you define the scope of your chosen project. In your paper, you must do the following:
Provide a brief summary of your chosen project.
Describe at least three project goals and three project objectives.
Identify the key customers and at least two stakeholders for your project. Remember, you are delivering the project to your customer(s); however, there are others (stakeholders) who have a vested interest in your project.
Describe at least three key milestones and/or deliverables for your project.
Describe a high-level timeline that includes key tasks and deadlines.
Estimate the project’s overall cost, any key staffing or non-staffing resources needed, and how you plan to acquire them.
Identify at least three risks for your project and how you plan to manage them.
Identify how you plan to stay on track.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is as follows:
Propose a plan for the completion of an IT project.

Categories
Information Systems homework help

Professor Bleacher,      It is so important to have the right people in the righ

Professor Bleacher, 
    It is so important to have the right people in the right positions to have a strategic plan to make the project or to keep an organization successful and profitable(as long as the organization is not non-profit). From a project manager perspective it is so important to understand the abilities of the employees that you have(resources) and to understand those resources strengths and weaknesses to place them in the best place to be successful individually as well as for the organization as a whole. 
   On a different note to make candidates interested in the company or organization it is important to many people to have room for growth within a company and the opportunity to enhance the skills they walk in the door with. Your thoughts? Anyone been in this type of situation do you have any input or advice for individuals entering on the first floor?   
Need just three paragraphs

Categories
Information Systems homework help

What is your understanding of operating systems vulnerabilities and hardening

What is your understanding of operating systems vulnerabilities and hardening practices?
How should one go about in hardening operating systems and applications, such as a Web Sever? (For hardening of operating systems, you should choose one operating system. For example, you could choose, Windows, UNIX, Mac, etc.).
Do you think one system is really better than the others or, it is personal preference? Explain your answer.
What are some reasons why an organization would choose one operating system over another? Explain in terms of systems security.

Categories
Information Systems homework help

 What are the privacy issues with data mining? Do you think they are substantiat

 What are the privacy issues with data mining? Do you think they are substantiated? 
300 words APA 7 format

Categories
Information Systems homework help

12-slide PowerPoint presentation that will include the points listed below along

12-slide PowerPoint presentation that will include the points listed below along with components highlighted in your Week 1 assignment’s proposal and appropriate peer-review feedback from Weeks 2 and 5.
Present the needs that were highlighted within your selected case study as it applies to your “ABC Health Care” organization.
Propose a risk analysis strategy on how organizational needs were met in accordance with applicable laws and standards.
Assess the essential components of health care decision making models, emphasizing the system development life cycle (SDLC).
Determine the impact technology has on cultural factors in health care provisions and decision-making.
Evaluate the roles and responsibilities of key players in strategic planning and continuous quality improvement.
Assess enterprise-wide data’s role in health information governance.
Compare and contrast the roles of technology and enterprise-wide information as it relates to data governance.
Summarize best practices and policies as they relate to data governance, information exchange, and technical and structural interoperability.
Explain the economic impact of your proposed system acquisition.
Formulate and provide answers to three questions that you feel would be appropriate for the board to ask.

Categories
Information Systems homework help

 Unlimited Attempts AllowedDetails Virtual Labs: Network Scanning Consider what

 Unlimited Attempts AllowedDetails
Virtual Labs: Network Scanning
Consider what you have learned so far about Scanning as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below.
Objective
The objective of this lab is to help you in conducting network scanning, port scanning, analyzing the network vulnerabilities, and so on. You need to perform a network scan to: 
Check live systems and open ports 
Perform banner grabbing and OS fingerprinting 
Identify network vulnerabilities 
Draw network diagrams of vulnerable hosts
Scenario
Earlier, you gathered all possible information about the target, such as IP address range and network topology.
Now, as an ethical hacker, or pen-tester, your next step will to perform port scanning, network scanning, and vulnerability scanning on the IP addresses you obtained in the information-gathering phase. This will help you to identify IP/hostname, ports, services, live hosts, vulnerabilities, and services running on the target network.
Port scanning will help you to identify the open ports and the services running on specific ports, which involves connecting to TCP and UDP system ports. Port scanning is used to find out the vulnerabilities in the services running on a port.
Vulnerability scanning determines the possibility of network security attacks. It evaluates the organization’s systems and network for vulnerabilities such as missing patches, unnecessary services, weak authentication, and weak encryption. Vulnerability scanning is a critical component of any penetration testing assignment.
The lab this week will provide you with real-time experience in network scanning and vulnerability scanning.
Week 2 Lab Assignment 1: Performing Network Scanning Techniques.
Lab Task:
This lab explains to students how to employ the following types of network scanning techniques using Nmap:
TCP Connect Scan
Xmas Scan 
ACK Flag Scan 
UDP Scan 
IDLE Scan
Lab Description:
As a professional ethical hacker or a penetration tester, you should not limit your network-scanning task with Nmap. During security assessment assignment, you should try all the possible Nmap network-scanning options to explore possible open ports and services running on the ports. This lab will demonstrate you various options of scanning using Nmap.
Access the lab here: EC-Council | iLabs (Links to an external site.)
Submit proof of this assignment completion by uploading and submitting a screenshot of the graded lab from EC-Council Labs. Refer to the Course Projects page for more information on project submissions. 

Categories
Information Systems homework help

In a 5-6 page paper, provide the following content in the suggested format: Ti

In a 5-6 page paper, provide the following content in the suggested format:
Title page
Introduction (1-2 paragraphs)
Compare the differences between MAC and H-MAC (1-2 pages)
Explain why using H-MAC is more secure than MAC (1-2 pages)
Be prepared to fully support your argument.
Give examples of commonly used MACs and H-MACs. (1-2 pages)
Conclusion (1-2 paragraphs)
APA Reference List
The paper should be written using the APA writing style.

Categories
Information Systems homework help

  Chapter: 3  How do you describe the importance of data in analytics? Can we

  Chapter: 3 
How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.
Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
What are the most common metrics that make for analytics-ready data?
Go to data.gov. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
 Chapter: 4
Define data mining. Why are there many names and definitions for data mining?
What are the main reasons for the recent popularity of data mining?
Discuss what an organization should consider before making a decision to purchase data mining software.
Distinguish data mining from other analytical tools and techniques. 
What are the most common metrics that make for analytics-ready data?
Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling. 
Alternate link if the link does not work: https://www.teradata.com/University/Academics
When submitting work, be sure to include an APA 7 cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). Create a one MS word Document for all
Page length: 3 pages