Category: Information Systems

Operational Excellence -Assignment

 

Chapter 3 Complete the two essay assignments noted below: (Information Technology and Organizational Learning)

Review the strategic integration section.  Discuss the concept of strategic integration and describe how strategic integrations can tie to the implementation of technology within an organization.

Review the information technology roles and responsibilities section.  Discuss how IT is divided based on operations and why this is important to understand within an organization.

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

Assignment

2.1 What are the essential ingredients of a symmetric cipher?

2.2 What are the two basic functions used in encryption algorithms?

2.3 How many keys are required for two people to communicate via a symmetric cipher?

2.4 What is the difference between a block cipher and a stream cipher?

2.5 What are the two general approaches to attacking a cipher?

2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

2.7 What is triple encryption?

2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

(250 words)

3.1 List three approaches to message authentication.

3.2 What is a message authentication code?

3.4 What properties must a hash function have to be useful for message authentication?

3.5 In the context of a hash function, what is a compression function?

3.6 What are the principal ingredients of a public-key cryptosystem?

3.7 List and briefly define three uses of a public-key cryptosystem.

3.8 What is the difference between a private key and a secret key?

3.9 What is a digital signature?

(250 words) 

4.1 List ways in which secret keys can be distributed to two communicating parties.

4.2 What is the difference between a session key and a master key?

4.3 What is a key distribution center?

4.4 What entities constitute a full-service Kerberos environment?

4.5 In the context of Kerberos, what is a realm?

4.6 What are the principal differences between version 4 and version 5 of Kerberos?

4.7 What is a nonce?

4.8 What are two different uses of public-key cryptography related to key distribution?

4.9 What are the essential ingredients of a public-key directory?

4.10 What is a public-key certificate?

4.11 What are the requirements for the use of a public-key certificate scheme?

4.12 What is the purpose of the X.509 standard?

4.13 What is a chain of certificates?

4.14 How is an X.509 certificate revoked?

(350 Words)

Need someone detail oriented and believe in plagiarism free work.

  

Essay questions and be sure to cite your sources, use APA style as required, check your spelling.

Do not just answer the questions. This is a graduate course and you should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 4hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 4hours answering these questions and polishing your writing so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Typical assignment submissions should be roughly 3,000 word in length. Shorter compelling answers are fine. Answers with needless filler will be marked down.

Assignment:

Essay Questions 

1. Discuss in detail the characteristics of automated decision support (ADS) systems. Also provide an example of a process that can be supported by an ADS system. 

2. Discuss in detail modeling and models in decision making along with any benefits with this approach to decision making.

3. Identify and explain in detail activities that can foster the IT-business alignment within an organization.

4. Discuss in detail how IT can add value to a company directly and indirectly. 

Info Tech in Global Economy

Through the chapters 5 and 6 case studies, Figure 5.1 is an illustration of the future state of practice of systems modeling and simulation.  With this mind, the adoption of recent, current and expected innovations could result in the future of the art of systems modeling.  From this illustration, we have learned that it would be possible to simultaneously use multiple hypotheses to achieve different goals that could include the search for deeper understanding and policy insights, experimentations in virtual laboratories, future oriented-explorations, robust policy design, and robustness testing under deep uncertainty.  

Q1: Looking through the case studies and the author’s assessment in the chapters,  

what are the main advantages of using multiple models in a complex environment?

using APA 6E guide, provide a  clear narrative to support your responses,

******************************************************************************************************************************************************* 

According to authors, Gilbert and Troitzsch (2005) in the chapters, Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and it’s input and possible output processes. 

Q2: In reference to the above author’s knowledge, and any assumptions presented by these authors in the case study, in your own words, briefly explain:

what simulation modeling relies upon?

using APA 6E guide, provide a clear narrative to support your response,

Information security and risk management

1. Find an article online that discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA. 

2. Summarize the article in your own words and address the controls that the organization should have had in place, but didn’t, that facilitated the breach. What were the ramifications to the organization and the individuals involved? 

D-3

 

“As organizations expand their digital infrastructures, the amount of data being collected is growing at an ever-increasing pace. This deluge presents a new set of challenges, and the most crucial of these making sense of it all depends on data visualization. Digital tools like Many Eyes and Tableau Software have empowered companies and the public to create visualizations using built-in templates, but they have also spurred a desire for more control over visual method, layout, style, and branding.”

Find two data visualization products to review. These may be either a products which you are already familiar, or products you could research.

Provide a 250 word review of the two products in responding to the following questions:

Regarding the use of data visualizations, what are the products’ advantages? What are some of the products’ disadvantages? Which product would you prefer and why?

Discussion Length (word count): At least 250 words

Database auditing and monitoring fit within a SOX compliance framework.

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Discussion – 2 to 3

 

Summury –  write 2 paragraphs about kali Linux experience.

actual requirment –

Setup a Virtual Machine (VM) using Oracle VirtualBox and use Kali Linux as the Operating System (OS). See https://www.youtube.com/watch?v=AAsaZarnKxY Once you have Kali up and running .spend approximately two hours exploring this environment. Once complete post two paragraphs about your experience. 

Module 3 Assignment (DR)

 1. This chapters opening scenario illustrates a specific type of incident/disaster. Using a Web browser, search for information related to preparing an organization against terrorist attacks. Look up information on (a) anthrax or another biological attack (like smallpox), (b) sarin or another toxic gas, (c) low-level radiological contamination attacks.
2. Using a Web browser, search for available commercial applications that use various forms of RAID technologies, such as RAID 0 through RAID 5. What is the most common implementation? What is the most expensive? 

6

part 1:

 Using Agile to Increase Quality and Decrease Risk

Prior to beginning work on this discussion, read Chapter 3 (Quality in the Agile Space) and Chapter 4 (Agile in the Waterfall) of your textbook.

You have been assigned the role of a SCRUM master in a new Agile project. You have been asked to make a presentation to the Agile team on the Agile-specific activities and best practices that promote increasing the quality of the final product and decreasing the risks associated with the project.

Using your textbook and at least one source from the  Library, select at least two Agile activities and two Agile best practices that you will use in your presentation. Explain them, and demonstrate how they would increase quality and reduce risk.

Should be at least 300 words

Part 2a:

 Draft Evaluation of Agile Methods

Prior to beginning work on this assignment, read through the Final Project instructions if you have not already done so.

Over the last few weeks, you have explored various aspects of Agile project management, and will have an opportunity to share your own evaluation of these methods in your final project this week. For this team discussion, write a draft of the script you plan to use for your recorded final evaluation. Then, submit your draft to your team discussion forum for peer review.

Your draft script should be a textual representation of what you plan to say in your final project evaluation, and should:

  • Describe the main characteristics of Agile methods
  • Differentiate between Agile methods and traditional waterfall methods
  • Explain best practices for applying Agile methods to project management
  • Assess the benefits of agile project management methods to your organization, including examples for support
  • Analyze how Agile techniques influence the leadership of a project

2b:

 

SCRUM Project, Part 6: Evaluating Agile Methods

Prior to beginning work on this assignment, read Module 1 (Business Leadership Transition) in Chapter 12 of your textbook.

Your organization is struggling with its projects. Some projects completely fail to provide quality solutions. Others take long to complete, often require constant modifications that were not originally part of the requirements, and cost more money than initially budgeted. The organization is looking for better ways to bring these projects under control and to ensure higher probability of success and quality products.

Using your new knowledge and skills in Agile project management methods, along with any feedback you received from your peers in the Team Discussion this week, create a PowerPoint video presentation to upper management of your organization. The video presentation should exhibit your own evaluation of Agile methods and how they could be used to turn the organizations projects around. The goal of the video presentation is to influence upper management decision makers to transition to Agile project management in the organization.

Your video presentation should be 5-9 minutes in length and should:

  • Describe the main characteristics of Agile methods
  • Differentiate between Agile methods and traditional waterfall methods
  • Explain best practices for applying Agile methods to project management
  • Assess the benefits of agile project management methods to your organization, including examples for support
  • Analyze how Agile techniques influence the leadership of a project

How to Create a PowerPoint Video

  • Method 1: .

Your deliverables for this project are a video (e.g., .mp4 or URL) and a corresponding PowerPoint slide deck (e.g., .ppt file).

  • Your video:
    • Must be 5-9 minutes of narration
    • Can take any form (e.g., a talking head video, a voice-over image video, a voice-over animation video, etc.).
  • Your corresponding PowerPoint slide deck:
    • Must include 12-15 slides (excluding title and reference slides)
    • Must include a separate title slide with the following:
      • Title of paper
      • Students name
      • Course name and number
      • Instructors name
      • Date submitted
    • Must include the speaker’s notes that were used to deliver the recorded presentation
    • Must use at least 3 credible sources in addition to the course text.
    • Must document all sources in APA style as outlined in the  Writing Center.
    • Must include a separate references slide that is formatted according to APA style as outlined in the Writing Center.