Categories
Technology

Detailed instructions have been added to the lab instructions document that was

Detailed instructions have been added to the lab instructions document that was uploaded. Please view the Lab Instructions document first and install vpn and download the necessary files in order to complete this assignment. Please also use the name Everton for any portion that says to use ‘yourname’ and don’t forget the screenshots where required. I’ve attached project 1 for reference.

Categories
Technology

At least 100 word response to each question APA format please include citations

At least 100 word response to each question APA format please include citations and sources.
1. Suppose you are explaining the concept of prototyping to your manager to persuade her to approve the prototype approach to a proposed system that you are working on. Her response to your explanation is that “prototyping is a waste of time and money”. As a systems analyst, how could you respond to her?
2. 2. A systems analyst junior in my organization just took a course in the Agile development. He liked the new approach and he really wanted to know how to decide which approach to follow for Software Development Lifecycle (SDLC). He was debating whether it is better to use Waterfall or Agile for big projects. His thinking was that Agile should be used for big projects with non-sequential product development and for projects that are often prone to change in requirements and cost. Is he right?
3. 3. ABC Inc. wants to build a new web site to sell their “clearance” products and they are planning to publish a proposed website site designed to obtain feedback from “potential customers”. The question is whether ABC Inc. should use a prototype to obtain feedback from “potential customers” about the proposed website. There are four available prototypes: patched-up, nonoperational, first-of-a-series, and selected features. What type of prototype is appropriate for ABC Inc. in this case? Explain why each type would apply (or would not apply) to this problem.

Categories
Technology

This week, you read an article outlining digital transformation in latecomer ind

This week, you read an article outlining digital transformation in latecomer industries, using Encana Oil & Gas as a case study. Based on your readings, lectures, and even content learned from other courses in this program, consider the following prompt:
-What were Encana’s challenges in the marketplace? How did the digital infrastructure address these challenges?
-In drawing upon IT Governance, pick at least two of Encana’s 10 guiding principles (Table 1) and show how they influenced its digital infrastructure.
-Critique Encana’s approach to IT outsourcing. What would you do differently to overcome resistance to outsourcing?

Categories
Technology

1. Cyber espionage has become common in the last decade. Can you name at least t

1. Cyber espionage has become common in the last decade. Can you name at least two cyber espionage incidents that occurred in 2020-2021?
2. Do you believe the United States plays a key role in cyber espionage?

Categories
Technology

TASK 1: IT OPERATIONS PLAN INTRODUCTION Throughout your career in IT management,

TASK 1: IT OPERATIONS PLAN
INTRODUCTION
Throughout your career in IT management, you will be asked to develop and improve a company’s IT department to help support its strategic goals and mission. When a company develops a new strategic plan, the process typically begins with the chief executive officer (CEO) and various stakeholders writing strategic goals, with the assistance of subject matter experts (SMEs) from the business. Next, these strategic goals are finalized and assigned to team members and others who will formulate solutions to achieve the goals within a specific time frame and budget. Then, the team creates operational goals in alignment with the company’s strategic goals and an operations plan. Finally, a workflow is developed to move from the current environment to the future state.
For this assessment, you will create an IT operations plan from the provided strategic goals in the attached “TreasureChest Case Study.” The case study should be read before beginning this task. The attached “IT Operations Plan Template” can be used to complete this task.
The skills you showcase in your completed IT operations plan will be useful in your career in responding to the demands you will receive from leadership. This IT operations plan may also be added to your portfolio to show to future employers.
SCENARIO
You were recently hired as the new chief information officer (CIO) at a SaaS treasury management company, TreasureChest. Your main responsibility is to implement innovative changes and become the direct report for the entire IT department. The CEO has been doing this prior to your hire. The first project the CEO has assigned to you is to produce a new IT operations plan for the company. You have been given the strategic goals for the company (see attached “TreasureChest Case Study”) and need to ensure your IT operational goals are in alignment with the company’s strategic vision and mission.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
Using the “TreasureChest Case Study” in the Supporting Documents section, create an IT operations plan by doing the following:
Note: The attached “IT Operations Plan Template” can be used to complete this task.
A. Analyze each of the following six components of TreasureChest’s current IT environment, including how each component’s current state affects the company’s operational efficiency and future innovation opportunities:
• SaaS operation
• hardware
• operating systems (OS)
• networks
• software
• database
1. As part of your analysis in part A, provide one or more examples from the case study of how each of the following six elements is affected by TreasureChest’s current IT environment:
• service and delivery
• scalability
• flexibility
• interoperability
• resilience
• security
B. Design an IT strategy for TreasureChest’s IT operations by doing the following:
1. Select one strategic goal from those listed in the case study and complete the following:
a. Create three IT operational goals that support the strategic goal selected in part B1, one of which must include a software solution.
i. Explain how the proposed software solution solves one operational challenge in the case study.
b. Describe two unique enhancements for each of the three IT operational goals created in part B1a that support the goal’s objectives.
i. Describe two unique planned activities for each of the six enhancements described in part B1b that need to be executed to implement your strategy.
Note: You must provide a minimum total of six enhancements and twelve planned activities.
c. Describe two unique security risks associated with each of the six enhancements described in part B1b.
i. Describe two unique steps for proactively mitigating each of the twelve identified security risks from part B1c to protect the IT security posture of the organization.
Note: You must provide a minimum total of 12 security risks and 24 proactive mitigation steps.
2. Select one additional strategic goal from those listed in the case study that is different from the goal selected in part B1 and complete the following:
a. Create three IT operational goals that support the strategic goal selected in part B2, one of which must include a software solution. These goals must be different from those in part B1a.
i. Explain how the proposed software solution solves one operational challenge in the case study that is different from the challenge in part B1ai.
b. Describe two unique enhancements for each of the three IT operational goals created in part B2a that support the goal’s objectives. These enhancements must be different from those in part B1b.
i. Describe two unique planned activities for each of the six enhancements described in part B2b that need to be executed to implement your strategy. These activities must be different from those in part B1bi.
Note: You must provide a minimum total of six enhancements and 12 planned activities.
c. Describe two unique security risks associated with each of the six enhancements described in part B2b. These security risks must be different from those in part B1c.
i. Describe two unique steps for proactively mitigating each of the twelve security risks to protect the IT security posture of the organization. These steps must be different from those in part B1ci.
Note: You must provide a minimum total of 12 security risks and 24 proactive steps.
C. Design an implementation plan for TreasureChest’s IT operations by doing the following:
1. Explain how either the COBIT framework or ITIL practices will be incorporated into your IT operations plan to ensure the flexibility and sustainability of TreasureChest’s IT infrastructure through each of the following operating years:
• year one
• year three
• year five
2. Prepare a comprehensive operational workflow representing how TreasureChest will transition from the current IT environment to the environment proposed in your IT operations plan.
Note: Your workflow may be in a variety of formats (e.g., a diagram, list, etc.).
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
TASK 2
INTRODUCTION
Throughout your career in IT management, you will be asked to develop and improve a company’s IT department, including staffing and innovative solutions. Once a company has finalized its strategic goals and budget, an organizational and resource plan needs to be developed. Then, innovative staffing solutions and job descriiptions need to be developed with assistance from Human Resources (HR).
For this task, you will create an IT organizational and resource plan that includes an annotated hierarchical organizational chart for the company described in the attached “TreasureChest Case Study.” The case study should be read before beginning this task. Once the chart is complete, you will write a job descriiption for one of the positions and then propose innovative replacements for two other positions. Finally, you will write a recommendation to the Steering Committee summarizing your plan and its alignment with business processes.
The skills you showcase in your IT organizational and resource plan and recommendations will be useful in collaborating with the various stakeholders you will work with during your career. This IT organizational and resource plan may also be added to your portfolio to show to future employers.
SCENARIO
You were recently hired as the new chief information officer (CIO) at the SaaS treasury management company, TreasureChest. Your main responsibility is to implement innovative changes and become the direct report for the entire IT department. The CEO has been doing this prior to your hire. You have been assigned to review the department staffing to ensure you have the right people and resources in the right positions. The CEO is looking for innovative ways to solve the staffing problem and wants you to collaborate with HR to fill these positions. You have been given TreasureChest’s case study and strategic goals and need to ensure your IT organizational and resource plan aligns with the company’s business demands.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Create an IT organizational and resource plan to meet the needs outlined in the attached “TreasureChest Case Study” by doing the following:
1. Create an annotated hierarchical organizational chart illustrating 10–12 individuals in six various roles in the IT departmental structure and processes, including the type of resources (e.g., full-time employees [FTEs], outsourcing, contracting, inshore, offshore, etc.) for each of the six roles.
Note: An annotated organizational chart is a chart to which you add labels for each role and resource type.
a. Write a job descriiption for one of the roles in your organizational chart that includes information for each of the following aspects:
• heading information (e.g., job title, pay grade, relationships)
• summary of the role components and their overall benefit to the organization
• objective summary of the job
• job duties and responsibilities
• qualifications
2. Propose an innovative strategy to improve efficiency and reduce headcount by doing the following:
a. Describe a collaborative partnership with an internal or external business resource to replace one FTE or role in your organizational chart, including two examples of how the replacement is innovative and will move the company forward.
b. Describe a technology to implement to replace one FTE or role in your organizational chart, including two examples of how the replacement is innovative and will move the company forward.
B. Write a recommendation to TreasureChest’s Steering Committee detailing your IT organizational and resource plan from part A by doing the following:
1. Summarize how your plan meets the company’s business goals and provide two examples from your plan that support your claims.
2. Describe two IT practices aligned to either COBIT or ITIL that contribute to the viability of your plan and provide two examples from your plan demonstrating the application of each practice.
3. Recommend two innovative organizational resource technologies to improve service at the company and provide two research-based examples demonstrating the successful application of each technology.
C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
D. Demonstrate professional communication in the content and presentation of your submission.

Categories
Technology

Threat modeling should account for the importance or value of an asset and its p

Threat modeling should account for the importance or value of an asset and its prioritization. As discussed in previous modules, protecting assets should be commensurate with their value. For this activity, create a list of the top five threats you perceive important in the current technological environment. If you are using threats to your work, school, or home, please generalize specific references to avoid disclosing sensitive information.
Provide details to the list you created and create a hierarchical structure with tree, root, and leaf nodes as necessary. Access the following web pages for more information on hierarchical and threat–asset matrices:
Crio. “Diagram of Binary Tree Links to an external site..” Accessed May 2, 2022.
https://www.crio.do/blog/content/images/2022/02/Diagram-of-Binary-Tree.png
IEM. “Ranked Critical Resources Links to an external site..” Accessed May 2, 2022.

Using Threat Vulnerability Asset (TVA) Methodology to Identify Cyber Threats and System Vulnerabilities in Emergency Management


Finally, discuss the advantages and disadvantages of hierarchical vs. threat–asset matrices.

Categories
Technology

In the changing field of cybersecurity, you will need to continually identify ne

In the changing field of cybersecurity, you will need to continually identify new threats to your network as evidenced in the network itself and the traffic on that network. You will need to know how to run network mapping and monitoring software to find vulnerabilities and anomalies that could impact the security of your network in order to recommend sound solutions.
For this task, you will use the virtual world at the “Performance Assessment Lab” web link and access the files and lab environment necessary to run both Nmap and Wireshark on the network associated with this task. You will need to save the output of both Nmap and Wireshark to include in your submission. You will then recommend solutions to address any issues you find.

Categories
Technology

Detailed step-by-step instructions have been added to the documents below. Pleas

Detailed step-by-step instructions have been added to the documents below. Please review the Lab instructions document first and install the vpn and download the required files in order to complete this assignment. Please use the name ‘Everton’ for every section that asks for ‘yourname’. Please ensure that you have screenshots for each section that requires screenshots.

Categories
Technology

Detailed step-by-step instructions have been added to the documents below. Pleas

Detailed step-by-step instructions have been added to the documents below. Please review the Lab instructions document 1st to install vpn and download the rdp to access the virtual desktops. Those need to be downloaded and installed 1st in order to complete this assignment. Please use the name ‘Everton’ for every section that asks for ‘yourname’. Also please ensure that you provide screenshot for each section that requires screenshots.

Categories
Technology

Detailed log in instructions have been added to the attachments please follow in

Detailed log in instructions have been added to the attachments please follow instructions carefully. Please use Everton Pingue for the name on the screenshots. Please assign to someone that is good at lab work.