Define and explain the levels of physical security, risk management and vulnerability assessment, along with their purposes.

 

Hi ,Total 2 Assignments.

1.No physical security is a 100% defeat-proof. For this assignment write 3-6 pages defining and explaining the levels of physical security, risk management and vulnerability assessment, along with their purposes. Please ensure to use proper APA formatting. All font must be Times Roman 12, double spaced, and all paragraphs (4-8 sentences) must should be indented.

Requirements

Please use the IP title page provided in the course material folder.
Your SA score should not be more than 30%.
If your last posted assignment is more that 30% you will get a zero score.
 In-text citations and a reference list are also a requirement.
You need to have at least 10 cited sources this assignment.
Please ensure that all cited sources are credible

2. 

Using the school library and other credible resources find 15 articles relating to physical security. Summarize the author’s view from the article abstract then write your views (4-6 sentences on each article). Please ensure to you cite each article according the American Psychological Association (APA) format. You must also use the title page from the Course Material folder for assignment. There is also a Week 2 IP example template in the Course Material folder you can use to assist you. Please do not use any of the articles on the template in your paper. Your SA score should not be more than 30%; also ensure your reference list coincide with the int-text citations.
By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Summarize the competitive advantage that information technology affords to organizations.

 
Final Project: Project Plan

This assignment consists of three (3) sections: a written project plan, a revised Gantt chart or project plan, and a project plan PowerPoint presentation. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.
Section 1: Written Project Plan
You are now in the final stage of the project plan development. All previous documentation will be combined into one (1) document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team and the venture capital group. The project plan is very detailed which is appropriate to accomplish the monumental task of implementation. However, the executive team is only interested in a ten (10) minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive group that your solution is optimal.
1. Write an eight to ten (8-10) page executive summary in which you provide a high-level technical overview of your project where you address the following:

Describe the scope of the project and control measures.
Describe the goals and objectives of the project.
Give a detailed, realistically estimated cost analysis of the entire project.
Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization.
Provide all aspects of the information technology implementation into the project plan.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio and MS Project as appendix of the Word document. Make reference of these files in the body of the Word document.

Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open Project, to:
2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 4: Infrastructure and Security, with all the project tasks.
Section 3: Project Plan PowerPoint Presentation
Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that, along with the executive summary, will convince the group that your solution is optimal.
3. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you:
a. Illustrate the concepts from your written report in Section 1 of this assignment.
b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
c. Use a professional technically written style to graphically convey the information.
The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
Evaluate the issues and challenges associated with information technology integration.
Summarize the competitive advantage that information technology affords to organizations.
Use technology and information resources to research issues in information technology.
Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

 My Original project was based on a company named bicycle trader which essentially was very similar to “Ebay” in its function, if that’s relevant. 

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

 
Project Deliverable 4: Infrastructure and Security

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.
Section 1: Infrastructure Document
1. Write a five to ten (5-10) page infrastructure document in which you:
a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.
c. Explain the rationale for the logical and physical topographical layout of the planned network.
d. Create a comprehensive security policy for the company that will:
i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.
ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open Project, to:
2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.
The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
Evaluate the issues and challenges associated with information technology integration.
Evaluate the ethical concerns that information technology solve or present in a global context.
Use technology and information resources to research issues in information technology.
Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric found here.

My Original project was based on a company named bicycle trader which essentially was very similar to “Ebay” in its function, if that’s relevant.

Discuss different types of file permissions.

 
File Management
Preparation
This assignment provides you with the opportunity to discuss file management. File management is the means of creating, editing, updating, and deleting files and folders on a computer.
For this assignment, imagine the following: A corporate executive contacts you to ask how your company performs file management and backups. Your response will be a description of how to manage the operating system’s file system on your company’s computers.
You are welcome but not required to use the Capella library and the Internet to gather research.
Instructions
For this assessment, write a 3–4 page paper in which you detail the following:

Describe how to manage files and directories using operating system tools.
Describe the two approaches to managing files and folders.
Describe how to configure file permissions.
Describe how to perform basic system operating system backup tasks using:

Command line.
Windows.

Discuss different types of file permissions.
Discuss how to change permissions both via command line and Windows.
Discuss a couple of different ways to backup this company’s computer system.

Define and explain the levels of physical security, risk management and vulnerability assessment, along with their purposes.

No physical security is a 100% defeat-proof. For this assignment write 3-6 pages defining and explaining the levels of physical security, risk management and vulnerability assessment, along with their purposes. Please ensure to use proper APA formatting. All font must be Times Roman 12, double spaced, and all paragraphs (4-8 sentences) must should be indented.

Requirements

Please use the IP title page provided in the course material folder.
Your SA score should not be more than 30%.
If your last posted assignment is more that 30% you will get a zero score.
 In-text citations and a reference list are also a requirement.
You need to have at least 10 cited sources this assignment.
Please ensure that all cited sources are credible

What is an IT security audit and why it is important to the organization?

Discussion 

What is an IT security audit and why it is important to the organization?
Explain why compliance is important to an organization.
What is expected from an organization to be in compliance with Regulations (i.e. HIPAA, GLBA, SOX, etc)?
Discuss a few key takeaways.

Examine data to analyze independent and dependent variables, determine how they are measured, and decipher whether a social change question can be answered and the implications for such change.

  
DUE 9/3/      8  P.M EST
BE ON TIME!!!
Know SPSS

SPSS is a statistical software program that allows you to enter these variables into a spreadsheet format and record the measurements from a sample. Additionally, SPSS allows you to perform statistical analysis. Before launching into your analyses, though, it is important to understand how the variables are measured. That understanding will help you interpret the SPSS output.
You considered topics with social change implications. For this Assignment, you will examine data to analyze independent and dependent variables, determine how they are measured, and decipher whether a social change question can be answered and the implications for such change.

Using the SPSS software, open  the High School Longitudinal Study dataset (ATTACHED)
For this Assignment:
Write a 1-page summary and include the following: USE SUBHEADING WHEN ANSWERING THE QUESTIONS IN PAPER

1)A      description of what the each of the variables measure.
2)A      description of the unit of analysis.
3)A      description and explanation of the levels of measurement for each variable      (i.e., nominal, ordinal, interval, ratio).
4)Explain      how you might conceive these variables to be used to answer a social      change question. What might be the implications for social change?

Support your summary using appropriate scholarly citations and references. Use proper APA format. 

Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

 
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Term Paper: Website Migration Project
Due Week 10 and worth 200 points Tony’s Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:

Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

Evaluate alternatives to the company self-hosting the site.
Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.
The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.
Explain and justify the system architecture you have selected.
Illustrate the system architecture using Visio or equivalent software.
Create a use case that documents the event of a customer ordering a bag of chips from the new Website.
The use case should include a graphical representation using Visio or equivalent software and a text description of the events.
Discuss the support operations that the internally hosted Website will require after implementation.
Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

Design high-level logical system characteristics (user interface design, design of data, and information requirements).
Use contemporary CASE tools in process and data modeling.
Use technology and information resources to research issues in systems analysis and development.
Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric. Click here to view the grading rubric.. 

Overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.

 
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.

Term Paper: Disaster Recovery Plan
Due Week 10 and worth 200 points

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans.  In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.

Part 1: Written Paper1.
1. Write a six to eight (6-8) page paper in which you:
a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:
i. Disaster declaration
ii. Assessment of security
iii. Potential disaster scenarios and methods of dealing with the disaster
iv. Disaster recovery procedures
d. Develop an Incident Response Team (IRT) charter, which includes the following sections:
i. Executive summary
ii. Mission statement
iii. Incident declaration
iv. Organizational structure
v. Roles and responsibilities
vi. Information flow and methods of communication
vii. Methods and services provided by the IRT
viii. Authority and reporting procedures
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Part 2: PowerPoint PresentationUse Microsoft PowerPoint to:2. Create a twelve to fourteen (12-14) slide presentation that will be presented to the agency’s management, in which you:
a. Summarize the elements of the DRP Policy and IRT Charter, covering the main elements from Steps 3 and 4 above. b. Include an introduction and conclusion slide.
The specific course learning outcomes associated with this assignment are:

Describe the different ISS policies associated with risk management.
Compare and contrast the different ISS policies associated with incident response teams (IRT).
Use technology and information resources to research issues in security strategy and policy formation.
Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.