Create a 200-300 word essay answering the following questions.
1. What do we mean by the Software Development Life Cycle?
2. List and describe the phases in all Software Development Life Cycle models?
Read another students post and respond.
a. Double space, 12 size font, Times New Roman
b. Make sure you have an introduction and closing to your essay.
c. Make sure you include your sources. You can use MLA or APA style to create the citation.
Experiment with the tool – Steganography Online (http://stylesuxx.github.io/steganography/) to get a feel of how the steganographic tool works.
In steganalysis, which methods are used to detect steganography?
Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.
requirements for your research paper are:
CIS120 Office Automation Paper Assignment and.docxDescribe the different tools in the MS Office suite and how they support business.
Discuss the terms “front-end” and “back-end” and how they apply to this installation.
Discuss the term “turn-key solution” in regard to new business applications.
Discuss the “make or buy” tradeoff when designing your business system.
APA format with cover page and reference page.
Two pages excluding cover page and reference page.
Include at least 2 references and in-text citations.
Marwan has worked at Studio Five Theme Park as a character actor portraying a swash-buckling pirate. He does not have an employment contract. He loves his job because of his seniority with the company and all the attention he receives from the guests in the park. Unknown to anyone, his prosthetic leg has no noticeable impact on Marwan’s success in this position.
Marwan has become an accomplished flirt with all this attention, and now goes to the extent of placing his hands on the female guests’ behinds when posing for pictures. The women he has encountered so far have not complained, didn’t seem to mind, or they were taken by such surprise they were not sure how to respond.
One day, Marwan grabbed the breast of one of his fellow female actors who had been recently hired. When she threatened to report him, Marwan told her that he could get her fired if she did not go on a date with him. The fellow employee reported the incident anyway and Marwan was terminated immediately. Marwan contends that he was terminated as a result of physical disability.
Research employment law related to hiring/firing and discrimination, using your textbook, the Argosy University online library resources, and the Internet. Based on the facts of the case and research, write an analytical paper. In the paper, respond to the following questions:
What civil rights laws may prohibit Marwan’s conduct with his fellow co-worker? Do those laws apply to his conduct toward the park guest? Explain both answers.
Did Marwan commit sexual harassment? If so, what type? Explain your answers and the terms you use.
What is the legal nature of Marwan’s employment? Explain your answers and the terms you use.
What actions and steps should Studio Five take against Marwan? Explain what actions you considered and why you either recommend them or reject them.
Discuss Marwan’s allegation that he is being discriminated against based on his disability and what response Studio Five may have to that allegation. What would each of them have to prove in court?
If the female employee sues Studio Five Theme Park, what defenses can Studio Five use? Are they liable for Marwan’s conduct even if they were unaware of and did not approve of Marwan’s actions? Explain your answers and the terms you use.
If Marwan was a member of a union that had a collective bargaining agreement with Studio Five, would that change any of your previous answers? If so, why?
What types of company policies, procedures, and actions should businesses employ to avoid harassment of their employees?
Write a ten-page paper in Word format. Apply APA standards for writing style to your work.
Create a power point presentation that compares Google Cloud, AWS, and Microsoft Azure IaaS, PaaS, and SaaS products. Include in the presentation which company you would choose for each delivery model? If there is a tie, rank the vendor in order. One will be the number one choice and three will be the last choice. Cite five sources or more from the University’s library to support your presentation.
For this assignment please use the attached ITIL V3 Official Introduction pdf. Submit your work in a MS Word document using the APA format / style, with an Title page, Abstract, Document body, and References. The focus of this first assignment is to describe IT Quality in general terms and then discuss some points about the first of the five ITIL books, Service Strategy.
1. Using scholarly articles or Internet research give a brief introduction to the meaning of IT Quality or IT Quality Assurance (one to three paragraphs are sufficient).
The following questions will use The Official Introduction to the ITIL Service Lifecycle which is already attached.
2. As a framework, describe in a few paragraphs, Why ITIL is successful.
3. Describe, in a high-level summary, the topics in Service Strategy and it’s purpose
4.In the ITIL Service Management Lifecycle, the book discusses functions and processes. Provide a summary of these two concepts, in your own words.
5. Discuss a summary of a Service Portfolio as presented in the text.
Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?
Search “scholar.google.com” or your textbook. Discuss the technical skills required to have a CSIRT response team consisting of employees with other job duties (i.e., not a full-time CSIRT job category)? Why or why not? What factors will influence their decision?
Cyber Security and Risk Management
Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.
1. Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.
2. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.
You have been asked to draft a corporate usage policy regarding the use of instant messaging. The policy should encourage the use of IM and chat while also providing useful guidance to avoid potential problems. What would you say in the policy?