Information System
R Script Code
Applying all the code on your selected dataset, complete all codes from Chapter 7 Time-dependent graphs. Make sure you submit to this link two things1. Your report file showing screenshots of all commands from Rstudio GUIMake sure you show all Rstudio GUIs2. Submit your R script code
Project Risk
Project RiskConsidering that enterprise system implementations fail 40 percent of the time, there is substantial risk involvedrisk that, in many cases, can put a company out of business.Research project risk and feasibility. For each of the following risk categories, discuss:What the type of risk is.Ways to help mitigate the risk category.Examine your current place of work, or an organization of your choice, and write a paper in which you discuss:Organizational Risks.Technical Risks.Resource Risks.Schedule Risks.Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.The specific course learning outcome associated with this assignment is:Assess the risks and mitigation strategies that are common to enterprise system implementations.
Dissertation Chapters
MAKE AN DRAFT FOR CHAPTER1 CHAPTER2 AND CHAPTER3Dissertation Chapters:Chapter I: Introduction.Chapter II: Review of Literature.Chapter III: Methodology (Research Design & Methods)750 words with APA Formet
Review of Literature
MAKE AN DRAFT FOR CHAPTER1 CHAPTER2 AND CHAPTER3Dissertation Chapters:Chapter I: Introduction.Chapter II: Review of Literature.Chapter III: Methodology (Research Design & Methods)750 words with APA Formet
Technology Solutions
Competitors and Technology[In the section below, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating, to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.]Technology One [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Two [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Benefit[Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.]Technology Solutions[In the section below, you will discuss how each of the two technologies meets the technology requirements that you identified in section II. Use your decision matrix to guide your responses.]Technology One[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]Technology Two[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]
Data Security
Residency Research Makeup ProjectAcme Enterprise Scenario Residency WeekAcme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc.Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO.Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acmes:1. Perimeter Security2. Network Security3. Endpoint Security4. Application Security5. Data Security6. Operations7. Policy ManagementAcme Perimeter SecurityAcme is currently protected by two dual Dynamic Stateful Inspection Firewalls that are configured in active and stand by mode. Acme is also configured to use PAT (port address translation) where 200.200.200.1 represents Acme on the public Internet. Acme translates this public IP through its clustered firewall to the internal IP space of 10.100.0.0/16 giving Acme 65334 useable IP addresses.As part of Acmes infrastructure, it also accesses cloud services for its business office tools through Office 365 and uses Dropbox for end users storage. Acme uses a web hosting service for its web front end and ecommerce which is connected to a back-end Oracle Database using enterprise MySQL. The database administrators have full access to all database information, but they lack oversight from anyone else.There are two DMZs, but they are not utilized.Network SecurityAcme has a collapsed core design which means all internal LAN routing and Internet access occurs on its distribution level devices. This means, wireless access, web proxy access, access control lists and entries are located at this layer of the infrastructure. Currently Acme is using WPA 2 (wireless protected access 2) for is wireless security. The web proxy is configured with the following: General, Limited, and Exclusive Internet access. Each of these categories dictates what type of Internet access an end user will experience if belongs to one of these groups.The Local area network uses the IP block in the following way: 10.100.1.0/24 User VLAN, 10.100.2.0/24 Research and Development VLAN.Current access control lists are permit 10.100.2.0 0.0.0.255, permit 10.100.1.0 0.0.0.255. All other devices use the rest of the unallocated IP block of 10.100.0.0/16.Also, all IP space is statically assigned. There is one default route to Internet but users of complain about access to internal services.Endpoint SecurityThere is a mixture of MAC and Windows systems, XP, 7, and 10. JAMF is used to control and monitor MAC systems, the Windows devices rely on its end users to patch and update systems. The current endpoint security is signature-based MacAfee with no centralized control.Application SecurityDevOps is responsible for secure coding and development of applications, but it has no formal oversight. Policy for application monitoring tracking is adhoc there are no formalized procedures. The server farm houses all applications, the operating systems range from Server 2003 to 2016. Mobile device management, media server, content management, file server, directory services, database, are all the services being offered from the server farm. This server architecture is all hardware based there are no hypervisor systems in place.Data SecurityData has not been classified, identity access management relies on one factor authentication; encryption, digital signatures, PKI rely on self-signed certificates, protection in the cloud is also missing and there is a lack of DLP (data loss prevention). Acme does store financial information in its data center as well as personal identifiable information.OperationsInformation technology is responsible for security however there is a security team under the IT department. The Chief Information Security Officer reports to the Chief Information Officer.Policy ManagementAcme has one Information Security Policy that addresses its information security architecture and program. It is not based on any of the existing information security management frameworks such as: IS0 27002, NIST CSF, or COBIT 5.You are going to conduct a risk assessment on Acme Enterprise using the risk assessment concepts we have learned about thus far. Each of the areas of the infrastructure mentioned above is where you will concentrate your assessments. After you have completed your risk assessment, you will then provide recommendations for each area that you assessed to reduce risk, exposure, and threat. Also, as part of your final submission demonstrate through a redesign where your mitigations will take place within the architecture. You can use the image below as guide for your risk analysis of each area.
IT Infrastructure
Several stores, such as Barnes and Noble, operate under the click-and-mortar modelthey have online as well as physical existence. Analyze one such store other than Barnes and Noble by researching it on the Web and answer the following questions:What factors affect competition between the online and brick-and-mortar divisions of the business?Why would customers choose one or the other as a primary choice?Which customer base (online or brick-and-mortar) do you predict to eventually dominate? Justify your choice.What do you think is the competitive advantage of a company with a strong brand identity such as Intel or Coke? How can the use of technology advance such a brand identity? Give specific examples. What advantage can be offered to competitors against such a brand identity through technology?Before any IS can be utilized effectively, it must be analyzed in the context of the IT infrastructure. Briefly describe two considerations that must be taken into account before an IS can be deployed within the environment of the current IT infrastructure. What are possible solutions if these considerations are not met? Support your answers with examples.
Information Security Governance
The NIST Security Handbook states that governance is highly dependent on the overall organization structure.Centralized maintain budget control and ensure implementation and monitoring of information security controls.Decentralized have policy and oversight responsibilities and budget responsibilities for their departmental security program not the operating unit information security program.Reporting structures are different as well.Governance structures can be hybrid, with a combination of characteristics from both centralized and decentralizedDiscuss why Security Governance should use the stated structures. Provide a simple case study that in where an organization can benefit from such controls. Do you think all organizations follow this principle?
Electronic Data Management
Do not just answer the questions. You should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 6 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 6 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Be sure to cite your sources, use APA style as required, double check your grammar and spelling.No short answers. Must be 350 or more not including references.1. Explain why Intranets fail. What procedures are needed to prevent the failure?2. Explain the different Management Structures in Intranets.3. What are Electronic Data Management Systems?4. Explain searching and indexing in the context of an Intranet.
Data Visualisation
As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking.Select 1 of these perspectives and mention why you selected it. ***Please note this is YOUR perspectives. This is YOUR opinion, YOUR views. Do not copy from any research/resource.Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.A quality post is more than stating, I agree with you. Maybe you should state why you agree with your classmates post. Additionally, post some examples or find a related topic on the internet or Universitys library and comment on it in the discussion post.Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
Use Promo Code: FIRST15