Information Technology

Unit VI PowerPoint Presentation 

Unit VI PowerPoint Presentation

  • Due: Tuesday, 08/11/2020 5:00 PM (CST)

Instructions

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

  • Explain the goal of information security in relation to mobile devices.
  • Identify the three sources of threats, provide a summary of each, and provide at least one example of each.
  • Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.
  • Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.
  • Explain human safeguards, and discuss which human safeguard(s) should be implemented.
  • Discuss why the organization needs an incident response plan to secure information and knowledge.

Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used

Unit VI PowerPoint Presentation  Read More »

Research the organization to understand the challenges that theyfaced and how theyintended to useCloudComputing to overcometheirchallenges.

Research the organization to understand the challenges that theyfaced and how theyintended to useCloudComputing to overcometheirchallenges.

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a section header with proper APA formatting:

• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

• Recommendations: What recommendations would you provide to this organization to better accomplish the challenge(s)? This is from your opinion not someone else on the Internet.

• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least six (6) scholarly sources listed on the reference page (with in-text citations). Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 2000 words in length. The Title, Abstract, Table of Contents (if applicable), and Reference pages do not count towards the page count requirements. All references must be scholarly references (NOT WIKIPEDIA). Use one of the methods provided in residency for researching scholarly journals and websites.

DO NOT USE THE FOLLOWING COMPANIES:

• Equifax

• Any Cell Phone Company

• UBER

• Amazon

• Microsoft

• Adobe

• Capital One

• LinkedIn

• eBay

Research the organization to understand the challenges that theyfaced and how theyintended to useCloudComputing to overcometheirchallenges. Read More »

Discuss what are the new innovation today in these areas

Discuss what are the new innovation today in these areas

Discussion 250 words

Read the ppt attached file and write about an area in Chapters 3 you think are important and use between 75 words.

150-200 words Discuss what are the new innovation today in these areas and what effect these areas have on the computer field. You should look up information on websites then post the links to that site. Do some research outside of this book now that you are taking a senior course and leave a link. How will these areas change in the future? Will these areas change society?

Discuss what are the new innovation today in these areas Read More »

organizationpersuasiveessay, linkorganizationaltechnology, value, and strategy

organizationpersuasiveessay, linkorganizationaltechnology, value, and strategy

Instructions

In a persuasive essay, link organizational technology, value, and strategy. You may use a real-life organization you have researched (or worked for) in order to illustrate your argument. Cite at least one article using a CSU Online Library database to support your essay’s main ideas. Use section headers to share your findings, and persuade readers on the following topics:

You can find an article for this assignment by going to the CSU Online Library. Choose a database to search for your article, and then type key words in the database’s search box to find an article related to your topic. If you have any questions, the librarians’ contact information can be found on the right side of the library’s page.

Your essay should be two pages in length, not including the title page or reference page. You are required to cite at least one article from the CSU Online Library. All sources used must be referenced; paraphrased and quoted material must have accompanying in-text citations in the proper APA format.

organizationpersuasiveessay, linkorganizationaltechnology, value, and strategy Read More »

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

1. Need to Correlate my job responsibilities(ELECTRICAL ENGINEER) with the eight-week online course Cybersecurity.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(ELECTRICAL ENGINEER) TO MY COURSE CYBER SECURITY

THESE ARE TOPICS COVERED IN MY COURSE

This course examines aspects of cyber security and the associated computer and network hardware and software used to identify harmful digital activities and associated actions used to prevent harmful data breaches. Students will investigate network domains such as Internet, Intranet, Extranet, and the different instantiations of Cloud Computing. Studies will include: 1) domain and network layers of the OSI model; 2) intrusion detection system (IDS)

– systems used to monitor network traffic for suspicious activity and issues alerts when such activity is discovered; 3) intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security to reject (or nullify) the potentially malicious activity; 4) Honeypots – used to attract harmful activities in order to understand the mechanisms used; malicious software 6) software vulnerabilities; 7) cryptography – the practice and study of techniques for secure communication in the presence of third parties called adversaries; 8) encryption and decryption techniques used to secure data and limit the potential for data breaches. Please see Cyber Security Knowledge Areas in this syllabus for additional details.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY) Read More »

Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP)

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout. Write in 300 words.

1. Use only attached documents

2. Need replies for two of the classmate posts (150 words)

Enterprise Resource Planning (ERP) Read More »

Enterprise Resource Planning (ERP)

Enterprise Resource Planning (ERP)

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout. Write in 300 words.

1. Use only attached documents

2. Need replies for two of the classmate posts (150 words)

Enterprise Resource Planning (ERP) Read More »

Security Architecture and Design

Security Architecture and Design

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples.

  • Start typing on page 2.
  • This assignment should be written in APA format.
  • Include three references or more references.
  • Include three or more in-text citations.
  • Write with clarity, check spelling and grammar.
  • Recommend that you use Grammarly.
  • Minimum of 600 words

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

Security Architecture and Design Read More »

SWOT analysis for Google

SWOT analysis for Google

In this assignment, you are to use the same corporation you selected and focused on for Assignments 1, 2, and 3.

Consider the corporation you have selected to use in your first three assignments.

Research the company on its own website, the public filings on the Securities and Exchange Commission EDGAR database, the University’s online databases, the Nexis Uni database, and any other sources you can find. The annual report will often provide insights that can help address some of these questions.

You will do a 15-minute presentation to the Board of Directors of the corporation. Develop an eight- to twelve-slide PowerPoint presentation with speaker notes based upon Assignments 1 through 3.

Requirements

Determine the impact of the company’s mission, vision, and primary stakeholders on its overall success as a competitive employer in the industry.

  • Create a SWOT analysis for the company to determine its major strengths, weaknesses, opportunities, and threats.
  • Based on the SWOT analysis, outline a strategy for the company to capitalize on its strengths and opportunities, and minimize its weaknesses and threats.
  • Discuss the various levels and types of strategies the firm may use to maximize its competitiveness and profitability.
  • Outline a communications plan the company could use to make the strategies you recommend above known to all stakeholders.
  • Assess efforts by this corporation to be a responsible (ethical) corporate citizen and determine the impact these efforts (or lack thereof) have on the company’s bottom line. Provide specific examples to support your response.
  • Develop an executive-level PowerPoint presentation with 8–12 slides with speaker notes and appropriate graphics or professional video.
  • Go to Basic Search: Strayer University Online Library and locate at least three quality references. Note: Wikipedia and similar Websites do not quality as academic resources.
  • References must be submitted on a Works Cited page using SWS format.

Use the Assignment 4 Template [PPTX] to ensure that your assignment meets the above requirements.

The specific course learning outcome associated with this assignment is as follows:

  • Develop a corporate presentation based on a SWOT analysis, strategies for maximizing competitiveness and profitability, a communications plan, and an assessment of efforts related to ethics.

SWOT analysis for Google Read More »

Writing Assignment (1-2 pages)

Writing Assignment (1-2 pages)

Watch the Week Two video lecture on technology planning. Describe the major differences between strategic technology planning and tactical technology planning. Then discuss how both types of planning can positively impact an organization’s functional and secure infrastructure.

Click here to see the video lecture for this week entitled, Introduction to Networks:

https://wilmington-university-tutorial.teachable.com/courses/microsoft-office-tutorials4/lectures/17669972

Hi, you may need my login info to access the video. mjones074@my.wilmu.edu, 670Black2tlp!

please include the in-text citations and references; provide the url link to all journal articles you use as references. Use current (meaning within the past 2 years) scholarly journal articles as references and use APA 6th edition format. Thanks!

Writing Assignment (1-2 pages) Read More »

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

1. Need to Correlate my job responsibilities(ELECTRICAL ENGINEER) with the eight-week online course Cybersecurity.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(ELECTRICAL ENGINEER) TO MY COURSE CYBER SECURITY

THESE ARE TOPICS COVERED IN MY COURSE

This course examines aspects of cyber security and the associated computer and network hardware and software used to identify harmful digital activities and associated actions used to prevent harmful data breaches. Students will investigate network domains such as Internet, Intranet, Extranet, and the different instantiations of Cloud Computing. Studies will include: 1) domain and network layers of the OSI model; 2) intrusion detection system (IDS)

– systems used to monitor network traffic for suspicious activity and issues alerts when such activity is discovered; 3) intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security to reject (or nullify) the potentially malicious activity; 4) Honeypots – used to attract harmful activities in order to understand the mechanisms used; malicious software 6) software vulnerabilities; 7) cryptography – the practice and study of techniques for secure communication in the presence of third parties called adversaries; 8) encryption and decryption techniques used to secure data and limit the potential for data breaches. Please see Cyber Security Knowledge Areas in this syllabus for additional details.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY) Read More »

Infotech in Global economy

Infotech in Global economy

I need points on how the knowledge, skills, or theories of the above course have been applied and how it is useful for a Network administrator in his work environment.

Provide a 500 word or 2 pages double spaced minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment.

Infotech in Global economy Read More »

Benefits of virtualization software, security concerns highlighted by server sprawl

Benefits of virtualization software, security concerns highlighted by server sprawl

Discuss the benefits of virtualization software, as described in the text (Page 138 of attachment). Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?

Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

At least one scholarly source should be used. Use proper citations and references in your post.

Benefits of virtualization software, security concerns highlighted by server sprawl Read More »

Blurred Lines Need Sunday 9/20

Blurred Lines Need Sunday 9/20

In a 700- to 1000-word essay, evaluate how technology has blurred the lines between personal and professional life for workers. Include the positive and negative outcomes as well as recommendations to leverage the positive and negate the negative outcomes. Integrate sociological concepts from the readings as well as those found in two additional scholarly articles.

Hello here are some resources for you.

Charoensukmongkol, P. (2014, July 01). Effects of support and job demands on social media use and work outcomes. Computers in Human Behavior, 36(71), 340-349. Retrieved from http://www.looooker.com/wp-content/uploads/2014/05/Effects-of-support-and-job-demands-on-social-media-use-and-work-outcomes.pdf (Links to an external site.)

Hargittai, E. (2003). The digital divide and what to do about it. In D. C. Jones (Eds.), New Economy Handbook (822-841). San Diego, CA: Academic Press. 2003.

Offer, S. (2014). The Costs of Thinking About Work and Family: Mental Labor, Work-Family Spillover, and Gender Inequality Among Parents in Dual-Earner Families. Sociological Forum, 29(4), 916-936. doi:10.1111/socf.12126 Available in Academic Search Premier

Noonan, M. C., & Glass, J. L. (June 01, 2012). The hard truth about telecommuting. Monthly Labor Review, 135(6), 38-45. Retrieved from http://www.bls.gov/opub/mlr/2012/06/art3full.pdf

TEDx Talks. (2010, May 25). TEDxDesMoines – Christian Renaud – Future of the workplace and workforce [Video file]. Retrieved fromTEDxDesMoines – Christian Renaud – Future of the Workplace and Workforce (Links to an external site.)TEDxDesMoines -  Christian Renaud - Future of the Workplace and Workforce

Thomas, K. J. (2014, January 1). Workplace technology and the creation of boundaries: The role of VHRD in a 24/7 work environment. Advances in Developing Human Resources, 16(3), 281-295.

The textbook:

Alonso-Villar, O., Del Rio, C., & Gradin, C. (2012). The extent of occupational segregation in the United States: Differences by race, ethnicity, and gender. Industrial Relations: A Journal Of Economy & Society, 51(2), 179-212. doi:10.1111/j.1468-232X.2012.00674.x

Blurred Lines Need Sunday 9/20 Read More »

Create a power point presentation following the given instructions.

Create a power point presentation following the given instructions.

Identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

  • Begin with a description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
  • Draw from the assigned readings (and independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Create a power point presentation following the given instructions. Read More »

Choose one topic to answer, about online documentation

Choose one topic to answer, about online documentation

Respond to one of the following topics.

  1. In their article, Baehr and Lang note that “Vannevar Bush envisioned information overload as one of the main problems facing workers in the computer-based information age. Today, content management and data mining are two important information management approaches that represent a blending of hypertext and Web 2.0 traits. For example, building an XML database may involve developing a structured authoring approach (rhizomatic schema or information model), multi-purpose templates (blending content types and style sheets), interactive navigation (intertextual user search and help tools), and methods for testing, mining, and archiving the data (usability, research).” (p. 48). They go on to further contend that current Web 2.0 tools allow for greater interaction between author and reader. What challenges do you think arise from creating online documentation that seeks to reduce information overload through targeted information models and delivery systems, but at the same time allows users flexibility in how they interact with that information?
  2. Tom Johnson in his article states, “Even if you get a user to the right topic, the topic often fails the user. Many users know this, which is why they often don’t bother to consult the help at all.” Have you had the experience of having online help fail you? Describe the situation (Why did you need the help? How did it fail to meet your needs?), then detail what you as an author could have done to rectify this failure.
  3. Online documentation encompasses many forms such as online help, interactive web-based tutorials, and screen tips. What comes first to your mind when you hear the term “online documentation”? Did you find any items in this week’s lecture that you had not thought about being under the umbrella of online documentation? Are there items you would add to this list? How would you define online documentation to someone with little technical knowledge?

Choose one topic to answer, about online documentation Read More »

ethics In information technology

ethics In information technology

Paper C: Topic Selection (Individual) and Research of an existing or emerging technology and its related ethical issues.

For the first part of this assignment, select a topic for individual research. Select a digital ethical issue for your research that is caused by the existing or emerging technology. Following is a link to some suggested topical ideas you may want to consider as a candidate for this assignment. Be sure to keep in mind that the technology aspects of this assignment are different from those of Paper A (Application of decision making frameworks to IT-related ethical issues) or Paper B, which dealt with aspects of ethical issues and a subsequent organizational policy.

Recommended Source: https://www.scu.edu/ethics/ethics-resources/ethics-articles/

The above link will help you to find articles on ethics in many fields and disciplines, please remember that the emphasis on this paper is on digital technology and the ethical issue(s) with its use

  • Topic Title – Begin with a topic title that describes what you will research.
  • Explain the reason for your topic selection briefly in a paragraph of at least 150 words. In addition, please determine three critically important questions you would like to address regarding your topic, in your individual research paper. Include a written description (100 words) for each question that includes why that question is critically important.
  • The objective in developing and posing these questions is to stage your research and guide your preparation of the final Research Paper, so that one or more ethical principles are applied and explained as a result of your research. This process helps you establish a thesis for your research.
  • Lastly, provide at least three proposed reference sources, at least two of which must be from the UMGC library database (or an equivalent academic database), which you plan to use to address (i.e., research) the three questions. These proposed reference sources must have external links. (Note: you are likely to find additional and even better references/sources as you continue your research for this Assignment.)

Remember: the emphasis on this paper is on digital technology and the ethical issue(s) with its use! Remember to follow all APA formatting requirements.

For the second part of this assignment, conduct research using the Web for the answers to the questions that you selected for the first part of this assignment. Please ensure that your research for this assignment addresses the ethical issues of an existing or emerging technology!

Prepare a minimum 4- 6 page, double-spaced paper and Indicate appropriate APA compliant reference citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style. Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

ethics In information technology Read More »

There are many different “tools” that non-profits

There are many different “tools” that non-profits

Discussion Post (1/2-1 Page)

Discussion:

There are many different “tools” that non-profits can utilize to increase their use of technology. Create a list of all the different technology tools that your organization (or you as an individual) utilize. What are examples of other technology tools that you have learned about? Are their opportunities to purchase tools that are different for non-profits than for-profits?

There are many different “tools” that non-profits Read More »

Scroll to Top