Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.

 

Project Deliverable 4: Analytics, Interfaces, and Cloud Technology
Due Week 7 and worth 110 points

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Large companies have been using the power of business analytics for quite a while now. Your company desires to get in on the action; company executives believe that using advanced data analysis will enable the company to make smarter decisions and improve business performance. Business analytics gives companies the ability to look at past realizations and performance as well as set up new expectations and performance goals. Analytics-as-a-Service is a new delivery model that uses cloud technology to provide business insights without enormous infrastructure enhancements. The executive team has heard great things about analytics and cloud technology but is apprehensive because they are unfamiliar with the look and feel of the technology. The executive team is interested in your recommendations and eagerly awaiting your forward-thinking viewpoint.

Section 1: Design Document

Write a four to six (4-6) page design document in which you:      

Support the need for the use of analytics and cloud technology within this company.
Create a workflow diagram to illustrate how analytics and cloud technology could align with the company’s business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
Create three to five (3-5) screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
Give one (1) recommendation for solution providers that could help your company secure a firm advantage by using analytics and cloud technology. 
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.
Section 2: Revised Project Plan

Use Microsoft Project to:

Update the project plan fromProject Deliverable 3: Database and Data Warehousing Design, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.
The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.
Use technology and information resources to research issues in information systems.
Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.
Click here to view the grading rubric.
 

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Describe digital forensics and process management.

 Case Study 2: Developing the Forensics, Continuity, Incident Management, and Security Training Capacities for the Enterprise

Access the ACM Digital Library by following the steps below:
Students: 

Login to iCampus. 
From iCampus, click STUDENT SERVICES>> Learning Resources Center >> Databases
Scroll down to “Information Systems/Computing”. 
Select “ACM Digital Library” below the heading.
Enter your library username and password.

 Faculty: 

Login to Blackboard.
Click the “Resource Center” tab at top right of page.
From the list on the left, click “Databases”
Scroll down to “Information Systems/Computing”. 
Select “ACM Digital Library” below the heading.
Enter your library username and password.

Download and read the following articles available in the ACM Digital Library:Arduini, F., & Morabito, V. (2010, March). Business continuity and the banking industry. Communications of the ACM, 53(3), 121-125 Dahbur, K., & Mohammad, B. (2011). The anti-forensics challenge. Proceedings from ISWSA ’11: International Conference on Intelligent Semantic Web-Services and Applications. Amman, Jordan. Write a five to seven (5-7) page paper in which you:
1. Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security.     a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business          continuity.     b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business          continuity that could be achieved.     c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics           efforts. Give an example with your response.2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic       efforts. Describe how these could be implemented.3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis     plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity process.  5. Describe the role of incident response teams and how these accommodate business continuity.6. There are several awareness and training efforts that could be adopted in order to prevent anti-forensic efforts.     a. Suggest two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.     b. Determine how having a knowledgeable workforce could provide a greater level of secure behavior. Provide a rationale with          your response.       c. Outline the steps that could be performed to ensure continuous effectiveness.7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality          resources. Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

The specific course learning outcomes associated with this assignment are:

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
Describe best practices in cybersecurity.
Explain data security competencies to include turning policy into practice.
Describe digital forensics and process management.
Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
Create an enterprise continuity plan.
Describe and create an incident management and response plan.
Describe system, application, network, and telecommunications security policies and response.
Use technology and information resources to research issues in cybersecurity.
Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.  

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

 
Case Study 2: Security in Bluetooth and other Mobile Devices

Before supporting mobile and wireless devices, organizations need to ensure that they have analyzed the potential security and implementation issues associated with those devices. Additionally, they need to ensure that they have taken the proper precautions and implemented the proper security controls to mitigate vulnerabilities. Read the NIST Draft SP 800-164, Guidelines on Hardware-Rooted Security in Mobile Devices, located at http://csrc.nist.gov/publications/drafts/800-164/sp800_164_draft.pdf.
Write a four to five (4-5) page paper in which you:

Based on what you read in the NIST SP 800-164 publication, select an industry (such as Banking, Finance, Education, or Healthcare) and assess the security risks and vulnerabilities associated with mobile devices in this environment. Describe the security controls that this industry needs to implement to mitigate wireless vulnerabilities.
Assess the strategic implications of deciding to implement wireless and mobile technologies into the selected industry environment.
Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.
Establishing multiple layers of defense is important in security. Describe why and how the different types of security controls are necessary to mitigate potential security issues. Describe how the types of radio signals and structure of wireless and cellular networks impact the security of wireless networks.
Create a Network Architecture diagram depicting the layers of security controls to mitigate security threats in a large corporate environment through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the various types of radio waves and propagation in wireless networks.
Analyze the structure and model of cellular networks.
Analyze the network protocols and security mechanisms in wireless networks.
Use technology and information resources to research issues in wireless networks.
Write clearly and concisely about wireless computing topics using proper writing mechanics and technical style conventions.

Determine whether or not you believe wireless gigabit architecture can sufficiently support a large corporate network environment.

 “Wireless Gigabit” Please respond to the following:

Evaluate the capabilities of wireless gigabit architecture and assess the degree to which they are beneficial as well as the areas in which they often fall short of expectations. 
Determine whether or not you believe wireless gigabit architecture can sufficiently support a large corporate network environment. Support your rationale.

What are the risks associated with logging too little data or not auditing the correct events?

 

Describe what information was contained in the logs and what value they might have in a security investigation.
Think about the challenges of getting all of the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings?
What are the risks associated with logging too little data or not auditing the correct events? 
What are the risks associated with logging too many events? 
When the default configuration is to create audit logs, what impact can this have on security incident investigations?
This was just a single domain with two systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?
Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment?
Finally, conclude this week’s assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

Submit your assignment using the Assignment Files tab.

Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop.

Question: You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop.

Requirement: Minimum length of 500 words. References in APA format.

Compare the typical wireless networking equipment used in a home or small-office wireless network to that of a corporate wireless network.

 “Expanding WLAN Functionality” Please respond to the following:

Compare the typical wireless networking equipment used in a home or small-office wireless network to that of a corporate wireless network. 
Assess why there is a significant difference between home or small-office wireless networks versus corporate wireless networks. 
Analyze the need for having more advanced wireless networking equipment in home or small-office environments

Analyze the encryption protocols used in wireless networks today.

 “802.11 Encryption Protocols” Please respond to the following:

Analyze the encryption protocols used in wireless networks today. Assess how current encryption protocols have addressed the weaknesses of WEP and suggest the security advancements that are currently needed.
Analyze the encryption protocol standards in wireless technologies and determine whether they need to have encryption protocol standards that are different from other encryption protocols or if they need to be the same. Provide a rationale to support your answer.

What is the difference between mandatory and benchmark practices?

 

Research how to open a combination lock when the combination will not work.
Resource  here

Discuss your findings and perspectives

In proper APA format, write a minimum of 2 paragraphs

What is the difference between mandatory and benchmark practices?

In proper APA format, write a minimum of 2 paragraphs

How does robot security devices allow effective and safer security in dangerous areas?

In proper APA format, write a minimum of 2 paragraphs