- “Logical and Physical Security” Please respond to the following:
From the e-Activity, evaluate the effectiveness of the physical and environmental security measures that the organization you researched used in regard to protecting its assets. Indicate improvements to the organization’s security measures where applicable. Justify your response.
e-Activity:
1) Research the Internet for the physical and environmental security measures taken by an organization of your choice. Also, read the NIST publication of Security Guide for Interconnecting Information Technology Systems, located at http://csrc.nist.gov/publications/nistpubs/800-47/sp800-47.pdf and Physical and Environmental Security, located at http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter15.html.
Consider a scenario where a financial company, whose management harbors concerns about its immature security posture, has quickly expanded its operations into multiple locations throughout the U.S. Indicate where you believe the company should begin in its securing process with the top-three (3) logical security measures and top-three (3) physical security measures that most concern to you. Justify the main reasons why you believe that the six (6) measures indicated are so critical.
- “Security Models and Cloud Operations” Please respond to the following:
e-Activity:
2) Use the Internet for at least two (2) articles describing an industry using three (3) different security models. Also, read the National Cybersecurity Center Policy Capture, located at http://www.whitehouse.gov/files/documents/cyber/CybersecurityCentersGraphic.pdf.
3) Research the Internet for one (1) real-world example of where a corporation has deployed a part of its operations to the cloud and addressed organization security along the way. Also, reference the US Government Cloud Computing Technology Roadmap Volume II, located at http://www.nist.gov/itl/cloud/upload/SP_500_293_volumeII.pdf.
From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.
From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe that the security concerns surrounding cloud operations are warranted. Justify your answers with real-world examples from applicable situations, where appropriate.
- “Emerging Technologies and Mobile Devices” Please respond to the following:
e-Activity:
1) Use the Internet to find an article which discusses emerging technologies in regard to telecommunications and network security. Also, read the NIST publication on the User’s Guide to Securing External Devices for Telework and Remote Access, located at http://csrc.nist.gov/publications/nistpubs/800-114/SP800-114.pdf, and the Guide to IPsec and VPNs, located athttp://csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf.
From the e-Activity, choose the one (1) emerging technology you believe will have the biggest impact on telecommunications and network security within the next two (2) years, and explain the main reasons why you believe this will be the case. Justify your answer.
As people and organizations alike are relying more on mobile devices for company communications, give your opinion of what you believe are the top-three (3) concerns with mobile devices and security, and determine the major ways in which these concerns may affect the organization. Additionally, select at least one (1) security solution for mobile devices, and suggest the primary way in which you believe that such a solution could assist in the risk mitigation process.
- “Satellite Communication. Please respond to the following:
Justify the circumstances in a business situation in which you would use GEOS, LEOS, and MEOS.
Discuss the business applications currently being used to support VSAT.
- “Data Transmission. Please respond to the following:
Compare the four items related to channel capacity: data rate, bandwidth, noise, and error rate. Determine the most important and justify its significance over the remaining items.
Describe real-world examples of attenuation and white noise. Examine the effect on the information-carrying capacity of the link and present a way to avoid these types of interruptions.
- “Digital Transmission. Please respond to the following:
Compare and contrast the data communication technologies of guided media and unguided media. This should include transmission media, data link control protocols, and multiplexing.
Compare digital transmission to analog transmission to determine the advantages of digital transmission. Provide at least one example to support your response.
- T-1 Lines. Please respond to the following:
e-Activity:
1) Research the Internet for an article, publication, or online document written in the last 12 months that describes how DSL and cable modems use multiplexing.
From the e-Activity, analyze the multiplexing techniques of DSL and cable modem Internet and suggest the one you prefer. Explain your decision.
Compare and contrast the use of leased lines in a WAN or LAN setting. Then recommend what you would use if you were a CIO. Support your response with evidence or examples.
- Employee Monitoring. Please respond to the following:
Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their email or Internet access for security purposes. Assess whether you believe it is fair for an employee to undergo this type of surveillance.
Suggest an alternative approach for an organization to control security without monitoring employee actions.
- Computer Security. Please respond to the following:
e-Activity:
1) Go to the NIST Website, located at http://www.nist.gov/index.html, to research technologies that are currently being used in support of security.
From the e-Activity, discuss two security issues related to the researched technologies.
Select a Wi-Fi device you are familiar with and analyze the security protection currently implemented on the device. Speculate whether the protection on the selected device is sufficient for the data it contains.
- “System Documentation” Please respond to the following:
Ray and Jason have just finished developing the documentation for a system your team recently completed. Ray insists that the documentation should be printed in booklet format and included with the system. Jason insists that paper manuals are outdated and that the documentation should only be distributed electronically via DVD. Compare and contrast the use of online documentation and paper documentation. Then, make a decision about what documentation you will provide with your system and explain it to Ray and Jason.
Debate whether or not to give credit to authors and designers of training manuals. Support your argument.
- “Online Communities” Please respond to the following:
e-Activity:
1) HelpNDoc (http://www.helpndoc.com/) is a software tool that helps with the development of end user documentation. Use the Internet to research at least two other Websites or tools to assist in the creation of user documentation.
Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be the most effective and explain why.
From the e-Activity, evaluate at least two sites or tools for developing end user documentation. Discuss the abilities the sites or tools provide and how the sites or tools aid in the creation of user documentation. Make a suggestion to improve the site or tool.
- “Searching Textual Documents” Please respond to the following:
Your company has been hired to design a product that will provide searches of textual documents and database querying. Your design team has not developed a product like this before. Examine the challenges associated with searching in textual documents and database querying. Describe how the five-stage search framework shared in Chapter 13 could be used to overcome those challenges.
Assess current multimedia document search techniques and suggest three techniques to improve multimedia search experiences. Explain why you chose to recommend each of the techniques you suggested.
- “Advanced Filtering” Please respond to the following:
e-Activity:
1) Read the article titled “History of Search Engines: From 1945 to Google Today” about the history of Internet search engines, located at http://www.searchenginehistory.com/.
Describe the most effective advanced filtering and search interface. Argue why the interface you chose is more effective than others, and describe who benefits most from the interface you are describing.
From the e-Activity, Google has been the dominant market leader for search engines for the past several years, despite a fairly basic interface and competition from competitors like Microsoft and Yahoo. Discuss reasons why Google has been able to maintain such a high market share. Also, suggest some ideas for a search engine that would be able to take market share away from Google.
- “Characterizing Data Types” Please respond to the following:
Justify characterizing data types according to task taxonomy. Support your response.
Assess the value to an interface designer, of being familiar with the seven basic tasks and create an argument for which three of the seven basic tasks are the most important to incorporate in a design.
- “Information Visualization” Please respond to the following:
Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations. Discuss at least three reasons why text-oriented interfaces are still the most common.
From the e-Activity (Use the Internet to locate an article on information visualization tools), identify the tool you would be most likely to use in a design project and explain why you selected it.
- “Project Risks” Please respond to the following:
When managing a project, project managers must remain vigilant to project risk management. Summarize at least three risks that may impact the success of a large technology project. Relate each risk to a specific project attribute.
Analyze how the risks identified in Part 1 of this discussion may impact the project and project deliverables.
- “Risk Management” Please respond to the following:
Risk management plays an important role within the software project management life cycle. Determine at least three techniques that can be used to identify and analyze project risk factors. Rationalize how these techniques can minimize project cost overruns, schedule delays, and defects.
Justify an approach that you would use to identify, prioritize, and mitigate risk within a large software development project management life cycle. Include example(s) to justify your answer.
- “Managing vs. Leading” Please respond to the following:
Project managers must have a clear distinction between managing versus leading. Describe at least three characteristics that distinguish managing from leading within the software project management discipline. Explain how the attributes identified may be exemplified and portrayed by you, the project manager.
Project managers are responsible for maintaining the morale of the project team. Assess the typical activities that a project manager must perform to ensure that the human factors and psychological elements of job satisfaction are present within the project team.
- “Team Work” Please respond to the following:
Teamwork is essential for ensuring that individuals work in a cooperative manner to achieve project goals. Synthesize at least three factors that contribute to efficient and effective software engineering team development.
Describe how the dimensions of social styles presented within the text allow project managers to communicate effectively with project team members. Explain the view that communication may be tailored to accommodate the communication styles of individuals based on the dimension of the social styles model.
- “Intellectual Capital” Please respond to the following:
Intellectual capital is a common derivative from managing a software project. Justify how intellectual capital may be measured from a project management perspective with three examples or scenarios that support your position.
Evaluate how each measure discussed in Part 1 of this discussion adds value to the organization, the organization resources, and its overall strategy.
- “Guidelines” Please respond to the following:
Organizing and leading software engineering teams requires leadership and extensive practice. Select at least three guidelines that can be used to develop and formulate an effective software engineering team and explain each guideline.
Analyze how the complexity of a software project and the size of a team influence the guidelines you selected in Part 1 of this discussion. Include example(s) to support your response.
Are you looking for a similar paper or any other quality academic essay? Then look no further. Our research paper writing service is what you require. Our team of experienced writers is on standby to deliver to you an original paper as per your specified instructions with zero plagiarism guaranteed. This is the perfect way you can prepare your own unique academic paper and score the grades you deserve.
Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.
[order_calculator]