Need some help with Information Systems

Case Study 1: Generative Software Development

Due 08 /06/2017 at 11:00 PM

This assignment consists of two (2) sections: a written report and a PowerPoint presentation. You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.  

Section 1: Written Report

Read the case study titled, “Generative Software Development” located in Chapter 5 of the textbook. Then, imagine a situation where your organization is considering a generative development process for its new line of software products. You are asked to present a written report to the organization’s CIO about generative software development and its usage.

Write a five to six (5-6) page paper in which you:

  1. Define in your own words, what is meant by generative software development, and describe how it contrasts with other software development processes.
  2. Describe the benefits of applying the generative development in an organization. 
  3. Explain the challenges of implementing the generative software development process in an organization.
  4. Describe how the challenges faced during the implementation of the generative software development process can be overcome.
  5. Examine how this development process might be applied to develop software in the organization.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Section 1 of this assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: PowerPoint Presentation

You have also been asked to develop a presentation to be shown at the next shareholder’s convention to explain why the organization has chosen to implement a generative development process.

Prepare a seven to ten (7-10) slide PowerPoint presentation in which you:

  1. Summarize the main points in the written report.
  2. Create bulleted speaking notes for the presentation to the shareholders in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
  3. Use a professional technically written style to graphically convey the information.

The specific course learning outcomes associated with this assignment are:

  • Identify and apply the steps in producing the software architecture.
  • Use technology and information resources to research issues in software engineering.
  • Write clearly and concisely about advanced software engineering topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills

Assignment 4

Write a four to five (6-7) pages paper in which you:

  1. Develop a project schedule that includes at least two (2) phases and twelve (12) tasks under the Agile delivery framework through the use of MS Project or Excel. Note: Submit a screenshot or image file that shows your work. The graphically depicted solution is not included in the required page length. 
  2. Determine the product vision and provide strategies for how to conduct the envisioning practice.   
  3. Determine the main roles of the Agile project team and explain whether the product manager should be from the IT field or non-IT related field.  
  4. Explain how iteration works in this project. Support your rationale.
  5. Take a position on whether stories are important in the Agile delivery framework and explain why or why not. Include at least two feature-story examples to support your explanation.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. 

note: Please use APA format throughout the document (please provide detailed explanation each 2 pages for Data Visualization and one Compound Visualization)

 In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting th

 In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, even though the government has every intention of capturing and prosecuting the terrorist once his hostages are released?

For all discussions questions a primary response of 300 word must be posted to the discussion forum, the post must be submitted by Wednesday at midnight. Each student is to post a reply to another students’ posting (minimum 200 words) and must be posted Sunday by Midnight. All late submissions will receive a zero grade.

Requirements (please read)

For each discussion, you are required to write an initial post (300 words) and one secondary post (200 words).  The discussion forums will be worth 40 points apiece—25 points for the initial post and 15 points for the secondary post.  

For your initial and secondary posts, you must have two academic peer-reviewed articles for references.  You must get them from the library.  There are directions at the top of our Moodle page showing how to utilize the library.  

Grading for discussions.

  • All      discussions must be completed on-time and must include in-text citations      and references in APA style formatting. If you do not use in-text      citations or they are not in APA format you will lose 3 points.  If      you do not have references or if they are not in APA format, you will lose      5 points. (You do not need citations and references for secondary posts).
  • You      will lose 10% based on word count if your posts are too short.  For      example, your initial post is 300 words, if you have 250 words you will      lose 5 points.  50 words short times 10% (50 x .10 = 5).
  • If      any part of your post is copied and pasted (ANY POST), you will receive a      “0”.  I will not ask you about it and you will not have a chance to      resubmit the post.

Response -1 (Ramesh)

Genuinely, in a hostage crisis, it is moral for an organization to agree to yield a dread construct oppressor safety in light of the remote possibility that he releases the prisoners. This is in light of the fact that it is the commitment of the governing body to give and extra each and every occupant of its country. It guarantees and anchors mediators who take security together with various countries and the laws of the country where they are gone as well. Key relations offer security to Ambassadors and Diplomats to play out their commitments without fear of being irritated by the host country. The failure of safety may in like manner develop by virtue of Iran’s detainee crisis, where it anchors particular properties and harms the dedication of political immunity of the workforce. 

I trust this world is stacked with ruined people like dread based oppressors. I feel that the council should not to offer protection from any mental oppressor. Frankly, the organization should get them and execute each and every one of them. Here, for this circumstance, we have to consider the potential damage the dread construct oppressor can make later with respect if he/she is given opposition and meanwhile the shot of getting information from the mental activist in case he/she is gotten and save people therefore. A substantial number of people have kicked the container because of dread based oppressor practices in various parts of the world. Mental activists may be bolstered by what they see as government convenience and shortcoming, which may incite an expansion in violence, an ethical issue for governments who should ensure the security of its family as well. It is moral for the administration to allow win-win procedure or situation and extra the life of the setbacks at the period of the crisis. The need is to avoid the hazard and challenge the standards to offer thought with respect to the losses by and large the assembly will go under strain through open and media which is trusted by the exchange.

References:

Grabianowski, E. (2005, June 24). How Hostage Negotiation Works. Retrieved from https://people.howstuffworks.com/hostage-negotiation.htm

Roberts, K. (2018, June 01). Should we negotiate with terrorist hostage takers? Retrieved from https://theconversation.com/should-we-negotiate-with-terrorist-hostage-takers-78390

Keating, J. (2015, May 07). Politicians Always Say, “We Don’t Negotiate With Terrorists.” Of Course We Do, and We Should. Retrieved from http://www.slate.com/articles/news_and_politics/politics/2015/05/negotiating_with_terrorists_let_s_stop_pretending_we_don_t_and_craft_better.html

Response-2(Prachi)

Enable me to express my perspectives on the above situation, I trust it is the ethical commitment of the government to discharge fear based oppressors if the opposite side consents to discharge prisoners in a prisoner emergencies condition. The vital bit of any association is to shield its family from threats and bolster their families. The association should see that peace should win wherever all through the nation. Each individual has their own particular opportunity. It’s the association commitment to stay each person in the nation. Once the prisoners are discharged the association can catch and meeting the psychological oppressors once more. This sort of situation was found in the past too where government discharged mental activists for pure individuals. They got fear based oppressors again by their mystery and government affiliations. Military and several policemen chance their lives in sparing individuals life. The hardware and headway utilized by the military are remarkably forefronts these days. They can without a lot of a stretch catch the discharged dread mongers.

Mental manhandle is an important issue for the world. Different pure individuals were butchered because of dread monger works out. Endless were executed because of dread mongering. Genuine individuals will be affected because of this movement. Their relatives will be in pushed and puzzled point of view if the association doesn’t set aside a couple of minutes. The get together should see that no single life is lost while coordinating. They may lose trust in government as time continue in the event that they don’t recover their relatives. A fear-basedoppressor’s fundamental saying is decimation and demise of guiltless lives. It is basic for the chamber while advising with mental aggressors. The representing body should see that reasonable coordination ought to be done among military and dread monger working environments. The most basic thing for the association is to get back prisoners sheltered. It is essential for the get together to spare flawless individuals.

References

Lewicki, R. J., Saunders, D. M., Minton, J. W., Roy, J., & Lewicki, N. (2011). Essentials of negotiation. Boston, MA: McGraw-Hill/Irwin.

Peter R. Neumann, (2007, February), Negotiating With Terrorists, Retrieved from https://www.foreignaffairs.com/articles/2007-01-01/negotiating-terrorists

Vo, Q. B., Padgham, L., & Cavedon, L. (2007). Negotiating flexible agreements by combining distributive and integrative negotiation. Intelligent Decision Technologies, 1(1-2), 33-47. doi:10.3233/idt-2007-11-204

Advanced Dynamics is a one of the nation’s largest manufacturers of semiconductors for the United States Air Force. They are opening facilities in St. Louis and Seattle to manufacture parts for the

Advanced Dynamics is a one of the nation’s largest manufacturers of semiconductors for the United States Air Force. They are opening facilities in St. Louis and Seattle to manufacture parts for the F35 advanced fighter.  Since this company produces state-of-the-art military equipment, this new complex must have all possible security measures.  Each facility will have three levels (floors) with each floor having 20,000 square feet.

This is a list of requirements facility:

·       Controlled access to the building for everyone.

·       A lobby, conference area, and sales area that needs controlled access

·       A highly secure area for system designers

·       An extremely secure area to house the data center.

·       Secure transfer of archival data between Dallas and Boston

·       Secure access to the Internet for employees

Requirements:

1.     Present a detailed proposal of your recommendations for physical, technical and administrative security measures.

2.     In your proposal, please recommend categories of countermeasures and the associated risks that the countermeasures mitigate.

3.     You are not expected to recommend a specific brand/model of a countermeasure.

4.     Include a section detailing additional risks that have not been mitigated by your proposal.  

5.     Your proposal should be a minimum of 2,000 words and properly site all references.

6.     You should have at least 5 references with at least two being peer reviewed articles.

7.     Follow APA format.

Goal:Understand how concept mapping can be used to help refine your thinking and writing of your paper.Concept mapping can be a useful tool for helping you conceptualize your paper. This method is oft

Goal:

Understand how concept mapping can be used to help refine your thinking and writing of your paper.

Concept mapping can be a useful tool for helping you conceptualize your paper. This method is often used in research to help scholars conceptualize research studies. Creating a concept map is useful in helping you think through the major ideas, concept and bodies of literature that are guiding your work and help you organize these in a way that is cohesive, clear and compelling.

Assignment:

1-   You specifically need to focus on implementing Enterprise Risk Management (ERM) in health care setting, and make sure that all your resources relate to this theme.  

2-   Each of you will identify the main ideas and concepts that are embedded in his/her paper.

3-   Once you have generated some concepts to work with, ask yourself how these concepts are related.

4-   Create a concept map of the important concepts that underpin your paper and their connection to each other.

* Be creative don’t think about getting the right concept map. Think about the paper you are writing, the underlying thesis statement, the argument that you are making and how the concept embedded in your argument is related.

Once you have created a visual representation of the concepts in your paper, you will use it to answer the following questions (DON’T SIMPLY WRITE THE ANSWERS FOR THOSE QUESTIONS, those questions should help you to write the concept paper):

vWhat are the central concepts at the heart of your paper?

vHow do you think these concepts related to each other and what is your basis for these?

vWhat is the relationship between the concepts and ideas that you will discuss in your paper?

vWhat literature informs your paper and how does this literature connect / relate?

You need to construct one page concept paper based on the concept map. This paper will illustrate your concept map. 

 At the end of this assignment, you need only to submit the visual representation of the concept map, and one page concept paper.

Need Assistance with Assignment: Identifying Potential Risk, Response, and Recovery

Assignment 2: Identifying Potential Risk, Response, and Recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization

.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

  1. For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
  2. For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
  3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
  4. Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment’s length requirements).
  5. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. 

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.Suggest one or more policies that wo

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

  • Suggest one or more policies that would help mitigate against attacks similar to this attack
  • Suggest one or more controls to support each policy
  • Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.
  • Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget
  • Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.  
  • Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
  • Be sure to follow APA formatting and provide references to support your key points in the case.  Use the book and library resources to find references.  Remember references add credibility to writing as well as providing proper credit to your sources. 

ScenarioYou have just been hired as the security manager of Medical Credentials Company (MCC), reporting to the Chief Information Officer (CIO). MCC is a kind of clearinghouse for doctors, hospitals,S

ScenarioYou have just been hired as the security manager of Medical Credentials Company (MCC), reporting to the Chief Information Officer (CIO). MCC is a kind of clearinghouse for doctors, hospitals,

Scenario

You have just been hired as the security manager of Medical Credentials Company (MCC), reporting to the Chief Information Officer (CIO). MCC is a kind of clearinghouse for doctors, hospitals, and group practices. It stores and distributes information on its clients, including sensitive information on previous malpractice lawsuits or disciplinary action. MCC is converting from an in-house database to a distributed database, which can be queried by telecommuting employees and clients. This change requires a high level of security. It is your responsibility to provide your engineers with the security requirements and at the same time convince senior management that the system being developed is robust and secure enough to protect this sensitive information. After careful examination of the database requirements and security requirements, you decide that compliance with the current accreditation/authorization process (NIST 800-37 RMF) would sufficiently protect the database from intrusion and tampering.

Project Background

The CIO is concerned with the number of security controls that they will have to implement for the database. She wants to know if all of the controls have to be implemented all at one time or if a phased approach can be used. Luckily, you know about the priority codes assigned to each control, which are explained in the NIST 800-53 Rev 4, Appendix G. Explain this process along with the Plan of Actions and Milestones (POA&M) process to the CIO. Don’t forget to illustrate how this relates to the Continuous Monitoring (Step 6: Monitor) Phase of RMF.

The project deliverables for week 4 are as follows:

Week 4: The Common Criteria System (600-700 WORDS)

  • The NIST 800-37 RMF
  • Common Criteria Rationale
  • Explain the priority codes assigned to security controls
  • Explain the POA&M process and how it relates to Continuous Monitoring
  • C-2 Orange Book Protection Profile

·       REFERENCE