Categories
Internet Technology (IT)

Welcome to IDS-403! Technology surrounds our daily experiences, and the relation

Welcome to IDS-403! Technology surrounds our daily experiences, and the relationship we have with it often shapes or influences our perceptions of the people around us. As we begin our first discussion, take a moment to consider which technologies have most influenced you, and compare those ideas with what you read in this week’s readings.
Each discussion is meant to be a collaborative space for conversation in which to process the concepts within the course. To ensure an interesting and respectful discussion, you are encouraged to think creatively about your initial posts and build upon the points made by your peers. Discussing challenges that face our world often means investigating opinions and ideas different from your own. Remember to remain thoughtful and respectful towards your peers and instructor in your discussion post and replies. It is also important to review the module resources and read the prompts in their entirety before participating in the discussion.
Create one initial post and follow up with at least two response posts.
For your initial post, address the following:
Introduce yourself to the class by sharing a bit about yourself, such as your preferred name and pronouns, where you’re from, and your major.
Select and describe a technology other than a smartphone or computer and discuss how you use it or how it affects your daily life. How does your interaction with this technology compare/contrast with how technology in general is presented in this week’s readings?
What is the influence of technology on your chosen field of study or future profession? How can you use your understanding of technology in your professional career?
For your response posts, address the following:
Provide feedback about the role technology plays in their experience and the role it plays in yours. Compare and contrast your answers.
What are the similarities and differences between your peers’ responses and yours?
How do your two responses help establish how technology and society are intertwined?
How can a perspective through the four lenses help develop a greater understanding of technology?
Remember, this assignment is graded on the quality of your initial post and at least two response posts to your classmates. You are not required to do research for this discussion. If you do refer to resources, be sure to cite the resource.

Categories
Internet Technology (IT)

After viewing the provided videos, and conducting additional research, give a de

After viewing the provided videos, and conducting additional research, give a definition of cybercrime. What gaps exist in our understanding of digital crimes? What can be done to address these gaps? Provide examples of various cases which support your answer. How did these gaps impact the way these crimes were investigated?


Categories
Internet Technology (IT)

Hello! I need help getting this Essay done. I am writing an Essay currently, and

Hello! I need help getting this Essay done. I am writing an Essay currently, and I did not know I would be required to write THREE essays by the end of the term. I have to turn them in tonight!! Please help me get one of these Essay’s done. I’ll attach a PDF with the Rubric and a Word Document with the Case Study. Below I will provide the answers below the below instructions. If you have to go over the deadline, I understand, please just let me know. I just have to get this turned in tonight. If this needs to be 3 pages, I can pay extra. Just let me know. Again, there’s an Essay provided with ALL of the correct answers, however, we cannot copy it beause of plagerism. (C841)
I have provided an answer Essay as an example below, however, DO NOT COPY, it will get plagerism. These answers are easily googled and there’s no real right or wrong answer to much of this stuff.
————————————————————————————–
No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
A. Address ethical issues for cybersecurity by doing the following:
1. Discuss the ethical guidelines or standards relating to information security that should apply to the case study.
a. Justify your reasoning.
2. Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.
3. Discuss what factors at TechFite led to lax ethical behavior.
B. Describe ways to mitigate problems and build security awareness by doing the following:
1. Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.
2. Describe the key components of a Security Awareness Training and Education (SATE) that could be implemented at TechFite.
a. Explain how the SATE program will be communicated to TechFite employees.
b. Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.
C. Prepare a summary directed to senior management (suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
—————————————————————————————-
ANSWERS / NOTES
Cybersecuirty Ethics
Do not use a computer to harm other people.
Protect society and the common good.
Be trustworthy, meaning only enter commitments you can keep, and uphold trusted connections with people.
Have a plan for coordinated vulnerability disclosure.
Respect human rights.
Disclose data on a need-to-know basis and maintain priva
cy. Comply with legal standards.
Two Cybersecurity Policies EXAMPLE WRITING (DO NOT COPY, PLAGERISM)
Two information security policies that could have greatly deterred or prevented the
criminal activity, negligent acts and threats to intellectual property are a proper user account
auditing policy, as well as utilizing a Chinese Wall methodology also known as network
segmentation. Proper auditing of user accounts would ensure that accounts that are not being
used or have excessive access to resources are addressed before any unethical or criminal
activities could transpire in the first place. Due to the lack of a proper auditing policy, the
business intelligence team was able to provision dummy accounts in order to steal other internal
departments’ resources and view sensitive documents without authorization. A Chinese Wall
methodology would have ensured that the business intelligence team would have never been able
to get to those resources in the first place due to being isolated on their own virtual network. The
Chinese Wall methodology would work hand in hand with the auditing policy, as the security
analyst would have been able to see suspicious activity coming from the business intelligence
team and discover quickly that they were trying to perform privilege escalation. The Chinese
Wall methodology would then ensure that the business intelligence team would be unable to
access other departments’ resources.
SATE PROGRAM (DO NOT COPY, PLAGERISM)
The communication of the SATE program should start at the very top and work its way
down the chain of command. Upper management’s responsibility regarding the SATE program
would be to establish the baseline requirements and code of ethics for the program with a focus
on aligning with business and security goals. In addition to this, they should also include the
legal aspects of the program including detailed information on the laws and executive orders that
correspond with cyber-crimes, as well as the punitive measures that manifest with them. After it
has been written, the established program needs internal and external approval to address any
revisions that need to be made. Once the approval process is completed, the training can be
implemented and mandatory schedule can be sent out to all personnel to complete the training
until everyone is compliant.

Categories
Internet Technology (IT)

Microsoft office Unit 4 discussion Throughout your studies, many discussion oppo

Microsoft office Unit 4 discussion
Throughout your studies, many discussion opportunities come up where you need to respond to other people’s opinions and comments. After you have completed your reading, respond to your Discussion Topic. Then take time to review the responses of your classmates and provide your feedback.
Unit 4 Discussion Topic 1:
Based on your LabSim® video/facts/exercises, supplemental readings, and academic resources, find out more about the different uses of editing and formatting documents in Microsoft Word®, then comment on the following:
What are the different editing and formatting options in Microsoft Word® and how might you use the options?
125 to 150 words

Categories
Internet Technology (IT)

Can you imagine ordering a truckload of 2×4 wood studs and a few buckets of nail

Can you imagine ordering a truckload of 2×4 wood studs and a few buckets of nails, having it all delivered to an empty lot, and asking a framing crew to build you a house? How would they know where to start and what you want? Of course, the framing crew would ask you for the blueprint, which is the plan for the house. For any project, whether building a house or creating an IT system, a plan is needed to understand what the project will accomplish.
Assignment Instructions
Select a topic for the IT project plan you will develop in Unit 6. Summarize the planning activities you would do for this project if it were initiated in your current organization or a past organization you worked in. Explain how the scope of the project would be planned using predictive project planning and how it would be planned using agile or hybrid project planning.
Begin the paper with a numbered list of the project management process groups and a one-sentence description of each.
Use this outline as section headings in your paper:
Project Management Process Groups
Description of the Project
Planning Activities for the Project
Predictive Scope Planning Explanation
Agile Scope Planning Explanation
Hybrid Scope Planning Explanation
Your paper should be no more than 4 pages (not including the title page or references), following APA formatting guidelines.
Assignment Requirements
Include a minimum of two credible sources. The textbook may be one of the sources. Add a title page and a reference page.

Categories
Internet Technology (IT)

I’ve attached a PDF with the Rubric and Case study on how it’ll be graded. I am

I’ve attached a PDF with the Rubric and Case study on how it’ll be graded. I am writing another essay now, but apparently, there are two due NOW. I did not see this second one, and I need help getting it done. I have left notes below that should be enough to get the essay completed while I knock this other essay out. The PDF shows the Rubric and essay requirements and the word doc shows the case study. If this needs to be more words and pages, please let me know.
———————————————-
https://www.nacdl.org/Landing/ComputerFraudandAbuseAct
———————————————-
https://www.investopedia.com/terms/s/sarbanesoxleyact.asp
The Sarbanes-Oxley Act of 2002 is a law the U.S. Congress passed on July 30 of that year to help protect investors from fraudulent financial reporting by corporations.1 Also known as the SOX Act of 2002, it mandated strict reforms to existing securities regulations and imposed tough new penalties on lawbreakers.
Your IT role, then, is to support the processes that minimize all identified risks. The most pertinent sections of SOX for IT teams are 302, 404, 409 and 802. Here is what they mean for you:
SOX Section 302: Keep Execs in the Loop
SOX Section 404: Establish Controls to Support Accurate Financial Reporting
SOX Section 409: Deliver Timely Disclosure
SOX Section 802: Ensure Records Retention
Source for above info
https://www.ipswitch.com/blog/sox-compliance-what-is-the-it-teams-role

Categories
Internet Technology (IT)

Review the Lakewood IT case and the Interview Results document for this part of

Review the Lakewood IT case and the Interview Results document for this part of your Business Case Analysis and provide, as the minimum, the following:
1. A title page
2. An introduction
3. A problem statement
a) A single sentence containing a clearly defined problem statement
4. A section containing a SWOT analysis
a) You must use the SWOT template; however, the template may be adjusted (i.e., cell height & width) as needed
b) A summary of the SWOT analysis
The paper must not exceed 5 pages of content (the title page, abstract [if required], reference pages,
figures/tables, and appendices are not content pages). In addition, the paper must use:
Times New Roman, 12 pt
font/typeset
Double spaced lines
The APA Manual, 7th edition’s title page, header, margins, figure, table, and
heading formatting
The APA Manual, 7th edition’s writing mechanic guidelines

Categories
Internet Technology (IT)

What gaming console and controllers would you need? Assume a wide variety in th

What gaming console and controllers would you need? Assume a wide variety in the games that can be played, incl

Categories
Internet Technology (IT)

Scenario: As the project manager for the strategic relocation project of NCUONE-

Scenario:
As the project manager for the strategic relocation project of NCUONE-CCS and delineating the strategic plan for internationalization for managing diverse and remote groups, you will develop a full research proposal on project leadership management framework for NCUONE-CCS. This plan is part of the initial planning of the PMO to handle big and international projects.
Instructions:
For this assignment and using the proposal written in week 7 (along with your instructor’s feedback), you must develop a PMO strategic plan for NCUONE-CCS as part of the initial planning for the management of large international projects.
Your strategic plan should contain the following elements:
Formulate a problem statement related to cultural contrasts, international laws, and regulations to consider when negotiating procurements or contracts to conduct projects overseas, and theoretical constructs as a result of your research. The problem statement should reflect a gap between leadership theory and practice in project management, as documented by your literature review. Be sure the intended purpose of your research addresses that gap and results in suggestions for improvements to project management leadership research and practice. Your plan should reflect proper alignment between the different elements, and you should suggest a specific context (organization, type of organization, or project), as well as participant profiles (project manager, senior leaders, etc.).
Develop a research purpose statement that is aligned with the problem statement.
A purpose statement is a brief description of the objectives of a proposed study that addresses the question, what will this study accomplish?
You do not have to select a particular research method, but you should make sure your stated purpose directly addresses the problem you just formulated. Say, “The purpose of the proposed research is to XYZ,” where XYZ illuminates or addresses the stated problem in a meaningful way.
Note that the purpose of the research is not to definitively solve a given problem but to add new knowledge about the problem and its possible solutions. All social research is incremental and aims to add a little bit of new knowledge, angles, and ideas to existing research, theory, and practitioner knowledge.
Formulate your purpose statement, and then add a brief paragraph in which you suggest ways the research purpose could be achieved.
For example, what organizations could you study? Who might participate and provide valuable insight into the problem and its solution? How might you collect data? This information will require you to think about research in a practical way.
Propose a strategy for the establishment of a project management office (PMO) to oversee and manage international projects, as well as complex internal projects, with organizational structure, and resources needed.
Propose the mission and purpose of the PMO aligned with NCUONE-CCS strategic plan to expand its operations nationwide and overseas in 5 years.
Include details of resources and tools (including software) that will support the office operations to support the organization’s projects.
Length: 12-15 pages, not including title and references pages
References: Include a minimum of 5 scholarly resources
The completed assignment should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. The content should reflect scholarly writing and current APA standards

Categories
Internet Technology (IT)

The scenario: Johnston Smith, Associate Director of Sales as Pasedena HVAC Manuf

The scenario:
Johnston Smith, Associate Director of Sales as Pasedena HVAC Manufacturer, has asked you to calculate the cost of running HVAC units in summer and provide a report.
For this assignment, you will need the following files:
New blank Access database
HVAC_Cooling
You will save your files as:
Lastname_Firstname_HVAC_Cooling
Lastname_Firstname_Cooling_Costs
Open the HVAC_Cooling Excel file, and save the file as Lastname_Firstname_HVAC_Cooling.
Insert the your name in the footer.
In the worksheet, insert an Excel table with a header row.
Add a calculated column that calculates the cost of cooling using $0.00124 per Cooling BTU formatted with the Accounting Number Format.
Filter the data to display only one Heating BTU number of your choice.
Apply Best Fit to all columns.
Center the worksheet horizontally on a landscape page.
In Access, create a new database and save it as Lastname_Firstname_Cooling_Costs
Import your Lastname_Firstname_HVAC_Cooling Excel file.
In the table, filter the data to show only data for the Cooling BTU greater than 60,000 and the Power unit of your choice.
Create a report based on your results.
Delete the four measurement fields following the Heating BTU field, and be sure the title fits on one line.
Special Instructions: Use the Supporting Materials below to complete the project.