Categories
IT Management

How you would create a contingency plan to address the threats

Review the following blog regarding some of the largest targets for cyber attacks on MSPs (Managed Service Providers) in 2019. Choose one of these attacks. Imagine this attack occurred throughout all MSPs in a large industry, such as banks causing a major crisis situation. Write a 1-2 page paper explaining how you would create a contingency plan to address the threats discussed in this attack. Explain how you would test this contingency plan. https://www.ninjaone.com/blog/msp-cyber-security-best-practices-2019-top-threats/

Categories
IT Management

Design an incident response plan for a small business

Contingency plan, disaster response plan, and disaster recovery plan are overlapping plans contained in the business continuity plan. An incident response plan provides a framework to map out procedures and instructions an organization must follow when faced with a disaster. Design an incident response plan for a small business. Include actions to be taken if each of the following events occur: Virus attack Power failure Fire Burst water pipe ISP failure What other scenarios do you think are important and need a plan?

Categories
IT Management

How and why would the use of data modeling software improve the development of data models for an organization?

Review the video on CA ERwin Data Modeling. How and why would the use of data modeling software improve the development of data models for an organization? Why must these steps be addressed before the design begins? Video link mentioned above: https://www.youtube.com/watch?v=k5RopAn04Hk This is a discussion piece and only needs 1 or 2 paragraphs. it’s already late so the sooner it can be completed the better.

Categories
IT Management

What are the ethical dilemmas if you don’t complete the test plan prior to system launch?

Please use the attached test plan template for the assignment Overview Imagine that you are a systems analyst on the project team that is developing an IT system for Millennia HealthCenter, as described in the business case you saw earlier in this course. The same team is almost finished developing the system, and is about to start the testing phase. Before the team starts on the testing tasks, you have been asked to create the system test plan. Your test plan will ensure that all features within the developed solution have been validated. The plan will also ensure that when the system is tested in the future, what has been tested and all test results have been documented. Prompt To ensure that your test plan will test the functionality of the system in the projects, you should refer to the activities you completed in Module Two and Module Four, as well as Project One in Module Five. Reviewing the business case, use case diagrams, use case specifications, and system requirements specification can help you have a better idea as to what kind of testing needs to be prioritized. Your test plan should include the following components: Detailed test procedures, including how each testing task will be completed Who will participate in each testing phase Task dependencies within the testing phase, including when each testing task will be completed What test data will be used This test plan will be used to check the system for readiness. After you have developed your test plan, write a brief reflection on making ethical decisions in the testing phase by thoroughly answering one of the following questions: If you found out that there were bugs in the system after completing several testing tasks, what would you do? If you found some small problems with the system, what would you do? What are the ethical dilemmas if you don’t complete the test plan prior to system launch? You can use this Test Plan template to complete this activity, or you can create your own test plan. Something to keep in mind is that different industries and organizations will have their own templates, whether that’s for test plans, implementation plans, requirements specifications, etc.

Categories
IT Management

Discuss the challenges of accurate data analysis upon accurate data modeling.

o prepare for the discussion, read the article “Bridging the Gap: The Difference Between Data Analysis and Data Modeling.” in the Module Resources folder on data manipulation. Next view the Power Point presentation “Data Manipulation with Structured Query Language PPT.” Discuss the challenges of accurate data analysis upon accurate data modeling. Why would you want to use structured query language (SQL) for database design? What would be the benefits of using SQL to create and manipulate the data in the database? What other ways are there to manipulate data in a database besides SQL? In your response, focus on both the technical challenges and on the data and information management challenges associated with data analysis conducted by business analyst. Links from the above paragraph: https://www.bridging-the-gap.com/data-analysis-data-modeling-difference/ powerpoint document mentioned attached

Categories
IT Management

Explain how your recommendations impact current information security policies and practices within this company.

PLEASE USE THE ATTACHED MEMO TEMPLATE FOR THE ASSIGNMENT You recently stepped into the role of information security manager at a medium-sized e-commerce company with roughly 500 to 1,000 employees organization-wide. The company has hired a third-party consultant to evaluate its information security posture. The consultant has concluded the evaluation and noted several high security risks. These action items must be addressed to ensure that the company’s information assets are secure. Your task is to provide recommendations to address multiple identified security risks and explain your decisions to your leadership team. Directions Memo Template: To communicate the identified information security risks and your recommendations and explanations, you will generate a memo to your leadership team. Your recommendations do not have to address all information security risks; however, they must address multiple risks. Be mindful that your leadership team is considered a nontechnical audience. You must complete each of the following sections: Introduction: Describe how addressing the evaluated elements of information security will support the company’s business objectives. Laws and Regulations: Explain how laws and regulations influence information security policies and procedures within this company. Technical Controls: Describe the technical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Administrative Controls: Describe the administrative controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Physical Controls: Describe the physical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Business Impact: Explain how your recommendations impact current information security policies and practices within this company. Conclusion: Explain why leadership should act on these control recommendations to improve the company’s information security posture. Your conclusion can also include a brief summary, although it is not required. What to Submit To complete this project, you must submit the following: Memo Template This should be a 2- to 3-page Word document (.docx) with the following sections completed: introduction, laws and regulations, technical controls, administrative controls, physical controls, business impact, and conclusion.

Categories
IT Management

What are the goals of security measures for ISs? Explain.

**Pleaser answer with short responses 1. What are the goals of security measures for ISs? Explain. 2. All the data of your company is concentrated in two databases. All employees use PCs or laptop computers, and all use a corporate network. You are to prioritize protection of the following elements of your company: PCs and laptops, the databases, the corporate network. Which is the element about which you should be most concerned, and why? 3. Data alteration and destruction are dreaded by many IS managers more than any other mishap. Why? Is the threat of website defacement as severe as data destruction or alteration? Why or why not? 4. Some companies still make a duplicate copy of disks or tapes and transport them to a remote site as a precaution against loss of data on the original storage media. What is the preferred method of keeping secured copies of data nowadays? Give at least two benefits and one possible drawback of the more recent approach. 5. Comment on the following statement: If your computer is connected to an external communication line, anyone with a similar link can potentially access your systems. 6. What is a honeytoken and how is it used by companies? 7. What is a honeypot and how is it used by businesses? 8. What is the difference between a virus and a worm? Which is potentially more dangerous and why? 9. Why is encryption that uses the public-key method so important in electronic commerce? 10. Assume that you are charged with developing an application to record basketball performance statistics. What limits would you include to ensure that the information entered is reasonable? 11. What is an audit trail? What audit trail information would you have for a shipping record? 12. This chapter gives an example of an atomic transaction. Give another example from any business area. 13. What is the difference between authentication and confidentiality? 14. What are biometric access controls? How are they better than passwords? 15. What is a firewall, and how does it work? Note: Repeat the question/task. Use technical writing elements and formatting. Must use a 12-inch font, double-spaced. Include Name, Course Number and section, Title of Homework Assignment, Instructor Name, and Due Date aligned right single-space.

Categories
IT Management

Prepare an RFI for an application to support your new company’s effort on the web

You are a manager for a new company that is about to start selling textbooks to college bookstores via the web. Several firms specialize in software that supports transactions and data collection on the web. Prepare an RFI for an application to support your new company’s effort on the web, including posted catalogs, orders, shipment tracking, payment, and data collection for future marketing. Submit the list of questions you want prospective bidders to answer, and be ready to provide an explanation for including each of the questions. Note: Repeat the question/task. Structure document as APA format, but exclude cover page; label as directed below. Use technical writing elements and formatting. Must have a reference page. Must use a 12-inch font, double-spaced. Include Name, Course Number and section, Title of Homework Assignment, Instructor Name, and Due Date aligned right single-space.

Categories
IT Management

What are the benefits and risks of outsourcing IT services?

**Please answer with short responses 1. List and explain all the various options now available for an organization to enjoy the services of an IS. 2. Few organizations would develop an application in-house or pay another company to develop it if a similar application can be licensed. Why? 3. What are the benefits and risks of outsourcing IT services? 4. The major hardware and software makers, such as IBM and Hewlett-Packard, derive an increasing portion of their revenue from outsourcing contracts. Analyze and explain why they focus more of their efforts in this direction. 5. What might cause a client to ask to renegotiate a long-term outsourcing contract? 6. You are the CIO of a large manufacturing company. A software vendor approaches you with an offer to have your company serve as a beta site for a new human resource application. What would you consider before making a decision? 7. What is an RFI? What is the difference between an RFI and an RFP? The ideal response to an RFP is one that can be easily transformed into a contract. Why? 8. What is the purpose of benchmarking? Often, benchmarking involves visiting other organizations that have applied the system under consideration. Why? 9. What would you benchmark in a system whose purpose is to enter customer orders and accept customer credit-card account numbers for payment at your web-based site? 10. When purchasing an off-the-shelf application, to which phase of the SDLC is the postimplementation support and service equivalent? 11. Some organizations charge the purchase price of an application that serves only a particular organizational unit back to the unit. Why does the existence of a charge-back arrangement create an incentive to have users develop their own applications? 12. Why don’t users commonly document the applications they develop? Why is poor documentation a problem? 13. List and explain the benefits and risks of using the services of an on-demand software provider. 14. Some companies use software as a service (SaaS) because they want to concentrate on core competencies. What is a core competency? How would you determine what an organization’s core competencies are? 15. What is a storage service provider (SSP)? How is it different from an ASP? Note: Repeat the question/task. Use technical writing elements and formatting. Must use a 12-inch font, double-spaced. Include Name, Course Number and section, Title of Homework Assignment, Instructor Name, and Due Date aligned right single-space.

Categories
IT Management

Explain the value of technology and information as a competitive advantage

You are to create a 10-minute multimedia presentation on one of the following topics below: Understand basic concepts in Information Technology, including hardware, software, networks, and the internet. Recognize and define critical components of Management Information Systems. Explain the value of technology and information as a competitive advantage to the organization. Understand key concepts of Supply Chain Management, Customer Relationship Management, and Business Intelligence and how these systems impact competitive advantage. Understand the key characteristics of a relational database. Compare and contrast the features of databases and data warehouses. Demonstrate how artificial intelligence and decision support systems can be used to solve business problems. Communicate the implications of electronic commerce in today’s business environment. Understand the systems development life cycle and trends in systems development, including outsourcing. Understand key concepts of IT Infrastructure. Communicate the mandates and strategies for protecting the organization’s people and information. Recognize and describe the emerging trends and technologies that will impact the organization. Instructions: Create a multimedia presentation that includes presentation that includes text, video, images, and sound. You will present one of the topics in bullet points. You will be creating a professional multimedia presentation. If you go into the Apple Teacher Learning Center. Go to Apple Teachers in Action. Look at those videos as examples of a multimedia presentation. You will save the production and submit it in D2L (here). Requirements: You are to use Microsoft Powerpoint or any other presentation software, Apple Keynote, GarageBand, Pages, Numbers, and iMovie to have an Apple Device. You can go to www.icloud.com to access Keynote, Pages, and Numbers on a PC. If you do not have an Apple device, you can use Microsoft Office and Movie Maker to create your presentation. Your presentation must be creative and informative on your chosen topic. You are to reference information from your textbook regarding the detailed knowledge of your production. The required length is 10 minutes. You will be recording your presentation and submitting the file. Your video must play and be in the appropriate format. You are to test your video and make sure it plays on all devices before submitting, or you will not be credited for submission. If I am unable to play video, you will not receive credit. You also must type up in a Microsoft word document and submit along with your multimedia presentation and transcript word for word what is in your presentation in a professional format. Class Text Book Management Information Systems By: Ken J. Sousa; Effy Oz