Week-2

System Request Form

1.    Statement of the Business Problem (System Request Form)

Business Problem Statement:

Write about Keller college of New York. ?

System Scope Statement:

Write about Keller college of New York. ?

High-Level Functional Requirements:

Write about Keller college of New York. ?

Business Benefits:(Tangible and Intangible)

Write about Keller college of New York. ?

Special Issues or Constraints:

Write about Keller college of New York. ?

2.    Business Requirements: Using Microsoft Visio and Microsoft Word or Excel, your team will need to create the following diagrams for your project. (Refer to the textbook for examples.)

o    Context Level Data Flow Diagram (Visio)

o    Use Case List (normal business activities/work flows)

o    Use Case Diagram (Visio)

o    Use Case Scenarios (Description or narrative of steps in each use case)

3.    References: 

This first milestone is designed to assist you with determining the requirements for the provided scenario. This milestone aligns with Section I of the final project. You will analyze the scenario in

This first milestone is designed to assist you with determining the requirements for the provided scenario. This milestone aligns with Section I of the final project. You will analyze the scenario in detail and then define the goals and objectives of the database, assess the user requirements, explain the business process and any related restrictions for the database, and explain what the end result of the database should be. To complete this assignment, review the following documents:

Information systems

Define the risks a firm faces by leaving software unpatched? What risks does it face if it deploys patches as soon as they emerge? How should a firm reconcile these risks? 

Compose at least one paragraph with 4 to 6 sentences. 

To receive full credit you must satisfy the following criteria:

  1. Did you articulate the risks for applying and not applying a software patch, at least 4?
  2. Did you articulate how a firm reconciles the risks?

Agile Project Management Practices

I WILL PROVIDE MICROSOFT PROJECT FILE TO BUILD ON.

As a project manager, you are going to prepare two project outlines for the development of a mobile application. One project outline uses a waterfall model, another uses an agile method.

Prepare two project outlines using Microsoft® Project. Each outline shall consist of a task list and a Gantt chart showing task durations and precedence relationships.

Include a 350- to 700-word brief explanation of how the two project outlines differ. Be sure to address how Agile addresses complexity and uncertainty. 

Hello, Please look at the attached file and let me know your conset. And no plagiarism please.

Hello,

Please look at the attached file and let me know your conset. And no plagiarism please.

I need an answer for 3 different questions in APA format, Three questions are different and not linked and I need all three in different Word Documents. Question 1) Research the types of containers av

I need an answer for 3 different questions in APA format, Three questions are different and not linked and I need all three in different Word Documents. 

Question 1) Research the types of containers available for different valuables and situations in the home. Resource: https://www.consumerreports.org/cro/2011/01/choosing-and-using-a-home-safe/index.htm.

write a minimum of two pages

Question 2) In approximately 300 words, answer the question below. Follow APA guidelines. Describe how threat modelling for the low-trust side of an API would differ from threat modelling on the high-trust side of an API.

Question 3) Define and defend your position on a data privacy policy for a hypothetical e-commerce web site.  Describe the policy and defend its provisions.

This assignment is listed on the syllabus as “Final research paper” and is worth 35% of your grade. Your final paper will be a detailed paper the includes details on the items below. (Remember your fi

This assignment is listed on the syllabus as “Final research paper” and is worth 35% of your grade. Your final paper will be a detailed paper the includes details on the items below. (Remember your final paper must be built on your concept map and paper – attached the paper). 

In this assignment, you need to do the following:

1.    Narrative: Prepare a narrative (limited to 2 single-spaced pages) to include the following:

a.    Brief review of relevant research/policy literature

b.    Research questions, hypotheses to be tested

2.      References cited (not part of page limit)

3.    4. Annotated Bibliography (Not part of page limit): your annotations should do of the following:

• Summarize: Some annotations merely summarize the source. What are the main arguments? What is the point of this book or article? What topics are covered? If someone asked what this article/book is about, what would you say? The length of your annotations will determine how detailed your summary is.

• Assess: After summarizing a source, it may be helpful to evaluate it. Is it a useful source? How does it compare with other sources in your bibliography? Is the information reliable? Is this source biased or objective? What is the goal of this source? How is this source useful to the paper that I am creating?

• Reflect: Once you’ve summarized and assessed a source, you need to ask how it fits into your research. Was this source helpful to you? How does it help you shape your argument? How can you use this source in your research project? Has it changed how you think about your topic?

• Relevance: For the annotated Bibliography , you are not being asked to include ALL the articles you will use in your final paper. Rather, you asked to select KEY literature that is central and essential to your position, literature review or theoretical paper. 

4.    Budget. If you are Awarded a grant to complete this project up to $25,000 for 1­year, or up to $35,000 for 2­years. Prepare a budget for that. There is no specific template for the budget, It may be a spreadsheet. (1 single spaced Page)

5.     Analysis – 1 single spaced Page (300 words)

Need a write-up on the below lines. Minimum 500 words.

Need to write a minimum 500 word description covering the below criteria.

Assume you are a Project Manager/ Scrum Master with a IT Organization. 

Write a summary how the knowledge gained in the two subjects mentioned below  has helped the candidate to successfully perform his/her duties as Project Manager/Scrum Master.

It has to clearly explain how the topics mentioned below helped in performing the current role as a Project Manager

Take the topics and analyze their relatedness and how helpful are they for the duties mentioned below

Topics covered in each subject are also mentioned.

Role: Project Manager / Scrum Master

Responsibilities:

·       Project planning and execution

·       Management of project resources

·       Status reporting (status, risk, issues, action items, etc.) to project teams as well as to senior management/governance committees.

·       Experience with management project financials – budgeting, tracking and reporting actual costs, as well as forecasting project spend.

·       Management of project plans in MS Project

·       Managing service delivery of application development project using Agile and Waterfall methodologies.

·                Disaster Recovery and Business Continuity POC

Subject 1: Information Security and Risk Management

·       Information Systems Security

·       Risk, Threat, Vulnerability

·       Risk-Related Concerns for Business

·       Seven Domains of a Typical IT Infrastructure

·       Risk Management Elements/Process

·       Techniques of Risk Management

·       Components of Risk Management

·       Objectives of a Risk Management Plan

·       Using a Cause and Effect Diagram

·       Risk Assessment

·       Best Practices for Performing Risk Assessments

·       Identify procedural controls, Identify technical controls, Identify physical controls, Compare functional controls

·       Creating a Risk Mitigation Plan

·       Performing a Cost-Benefit Analysis

Subject 2: Application Security

·       Microsoft Windows and the Threat Landscape

•        What information systems security is

•        What the tenets of information security are: the Confidentiality-Integrity-Availability (C-I-A) triad

•        What mapping Microsoft Windows and applications into a typical IT infrastructure is

·       Security in the Microsoft Windows Operating System

•        What access controls and authentication are

•        What security tokens, rights, and permissions are

•        What users, groups, and Active Directory are

·       Access Controls in Microsoft Windows

•        What the principle of least privilege is

•        What access models are, including identification, authentication, authorization, ACLs, and more

•        What Windows objects and access controls are

•        What forms of identification are, including SIDs, GUIDs, and CLSIDs

·       Microsoft Windows Encryption Tools and Technologies

•        What security certificates are

•        What the public key infrastructure (PKI) is

•        What best practices for Microsoft Windows encryption techniques are

·       Protecting Microsoft Windows Against Malware

•        What the purpose of malware is

•        What different types of malware are

•        What antivirus and anti-spyware software are

•        Why updating software is important

·       Group Policy Control in Microsoft Windows

•        What Group Policy and Group Policy Objects are

•        How to make Group Policy conform to security policy

•        Which types of GPOs are in the Registry

·       Microsoft Windows Network Security

•        What network security is & What the principles of Microsoft Windows network security are

•        What Microsoft Windows security protocols and services are

•        How to secure Microsoft Windows environment network services

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your cur

course title Emerging Threats and Countermeasures

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.