[CUSTOM SOLUTION] Information Infrastructure and Systems

Information Infrastructure and SystemsIn this week, your task for the final project is to research in the South University Online Library and on the Internet to identify a case study of your choice with a pertinent information system application.Some examples could be: a health care organization, such as a health care insurance company, a major hospital, or medical laboratory; an academic institution, such as a university or a professional institute; a commerce and transportation center, for example a major airport, or maritime port; a transportation carrier, such as an airline company, a railroad company, or even a car transportation service; a network service provider, such as a telecommunications service carrier/provider, an Internet and voice digital service provider, or a cloud service provider; a major media organization, such as television network, or a multimedia service operator; an industry firm that manufactures products, such as a computer products manufacturer, a car manufacturer, or a hardware manufacturer; a major retailer, for example a food retailer, a home maintenance retailer, or clothes outlet; an entertainment complex, such as a hotel, a vacation resort, or a large recreation and entertainment complex; a financial institution, for example a banking system, a credit card service, or an investment trading service.The above are examples to guide you with your research, but you are not limited to these areas. It is important that you arrive at your own case study based on your personal interests, and that it is well suited for an information systems analysis. Some criteria that you should consider in arriving at your case study are listed below:Your case study may be based on an actual company or organization, using facts from research, or it could be based on a fictional company or organization that you entirely define yourself as a hypothetical case with your own assumptions.Your case study must require an underlying information system as an essential element for its operation.The information system must be reasonably complex. One way to determine whether an information system is reasonably complex is to think in terms of entities and relationships that you will need to model. Even without knowing exactly how the data model will look, having some early notion of how many entities and relationships you should expect to model the information in your case will give you an appreciation for your case’s complexity. A reasonable complexity would be at least ten entities and ten relationships.At some point in your research you must be able to think in terms of use cases for your information system. Think of use cases as transactions that different end users will invoke when interacting with your information system. At the time you select your research area and define your case study, you need not know exactly the use cases you will be working with, but you should have some appreciation for the types of scenarios that you will explore as you progress with your project.Finally, you must submit your area of study to the professor via e-mail and have your professor’s approval that you may go ahead with your selection.Once you have selected your study area and case, and have received approval from your professor, you may proceed to the next steps described below. Create a report that focuses on the IS used to support the operation of your organization in your case study and answer the following questions.What events trigger the flow of information in and out of your system?What tracking mechanisms are in place?What technologies are being used for tracking the underlying events?What is the information infrastructure for handling the information flow?Diagrammatically represent the flow of information between your organization and adjacent entities (for example, these could be suppliers, customers, support organizations, government agencies, or partnering organizations).What security mechanisms are in place for obtaining information on events pertaining to your case study?What security mechanisms are in place in the organization? Who handles violations of organizational policies? What is the range of their responsibilities? Who do these officers respond to? Which office oversees the operations of the business for your organization?What are brokers? What types of precautions are taken in order to establish minimum trust with brokers?Which standard organizations or governmental agencies oversee the operation of your organization?Submission Details:Create your report in approximately 5–7 pages in a Microsoft Word document and save it as W1_A3_LastName_FirstInitial.doc.Cite any sources you use using correct APA format on a separate page.

Read more

[CUSTOM SOLUTION] Audit of Web Servers

Write a discussion post on following topic:Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.At least 2 (scholarly) journal source should be used. Be your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

[CUSTOM SOLUTION] Security Department

InstructionsRecently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.Explain the goal of information security in relation to mobile devices.Identify the three sources of threats, provide a summary of each, and provide at least one example of each.Explain technical safeguards, and discuss which technical safeguard(s) should be used for mobile devices.Explain data safeguards, and discuss which data safeguard(s) should be used in this type of scenario.Explain human safeguards, and discuss which human safeguard(s) should be implemented.Discuss why the organization needs an incident response plan to secure information and knowledge.Your presentation must be a minimum of six slides in length, not counting the title and reference slides. Be sure that any graphics used are appropriate and support the content of your presentation. You must use at least two references in your presentation, and they should be cited and referenced in APA format. Please cite all sources used.

Read more

[CUSTOM SOLUTION] A Cryptographic System

Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance.You are assigned to manage keys for a cryptographic system in your company. You found that one of the keys is leaked. What is the impact of a leaked cryptography key to a company? Provide four (4) recommendations to compromise this vulnera

Read more

[CUSTOM SOLUTION] A New Outreach System

InstructionsAs a manager of an organization, you will often need to find ways to cut costs. One way to cut costs is to outsource by hiring another organization to perform the service. Consider the scenario below.As a manager for the public outreach department, you realize that the current system for managing outreach issues is outdated. You would like to have a new outreach system developed using the Cloudera platform to help manage big data. However, no one in the organization has the expertise. You will have to outsource the project to save on costs and avoid management problems. Two companies have sent in a bid—one from Vancouver, Canada, and one from Mumbai, India. The bid from India was slightly lower than the bid from Canada. Compose a response that includes the elements listed below.Define what is meant by outsourcing.Explain how Peter Drucker’s statement (covered in the textbook in uCertify) about how one company’s back room is another company’s front room pertains to outsourcing. Use an example.Summarize the management advantages, cost reduction, and risk reduction of outsourcing.Summarize the outsourcing risks concerning control, long-term costs, and exit strategy.Discuss which company you would outsource to and why. Does distance matter?Your case study must be at least two pages in length (not counting the title and reference pages), and you must use at least two references as a source for your essay. See the Suggested Reading section for some sample articles on outsourcing. Be sure to cite all sources used in APA format, and format your essay in APA style.

Read more

[CUSTOM SOLUTION] Stores Netted Profit

1. Run the program and analyze the results. Then create a Microsoft® Word document named LastName_FirstName_Week5Questions.docx. In the document, type your answers to the following questions: Which three stores netted the most profit in 2017?· Which three stores netted the least profit in 2017?What two recommendations would you give the CEO regarding potential store closings? How is this supposed in the SAS output results?

Read more

[CUSTOM SOLUTION] A Logical System

Conduct an internet search using the phrase “small office local area network” for network diagram examples to help you complete this assignment.As you continue to work on Great Day Fitness Tracking’s website, you now need to gather business requirements and user requirements to identify the hardware, software, and network requirements to support the online business.Write a 2- to 3-page proposal in Microsoft® Word. Your proposal should:· Describe how you would select appropriate hardware and software to develop the internal business infrastructure.· Explain at least two possible approaches to managing the data for easy access and security.· Describe possible networks that might be used to support business needs.· Create a logical system diagram with a software of your choice showing possible internal connections as well as those between the site and the potential customers.

Read more

[CUSTOM SOLUTION] The Different Firewall Types

Compare and contrast the different firewall types and explain their importance (Packet filtering, stateful/ stateless inspection, NGFW/Layer 7, Network Based, application, and proxy firewalls).Please DO NOT USE outside sources or quote your book directly for these discussion – summarize what you want to say in your own words and use examples to illustrate your meanin

Read more

[CUSTOM SOLUTION] Sales Data

Eileen Dover, CEO of Good For You! Bakery, decided to open outlet stores two years ago. In some ways, this was a good decision as some stores appear to be doing well. However, the overhead to operate brick-and-mortar stores is high. Ms. Dover wants to examine the data to see which, if any, stores are underperforming so that she can close underperforming outlets if necessary.Good For You! Bakery has data stored in two separate legacy tables: one table for sales data, and one table for cost data. When Ms. Dover created these tables early in the business, she associated each record with a unique store number. (In SAS®, each record is called an observation.)Now Ms. Dover wants you to pull all of this data into two data sets in SAS® , join the data sets, and answer the following questions:Which three stores netted the most profit in 2017? (Note that profit is equal to sales revenue minus costs.)Which three stores netted the least profit in 2017?What recommendation would you give the CEO regarding potential store closings? Include your rationale in detail.

Read more

[CUSTOM SOLUTION] Augmented Reality Exercise System

As the CEO of an organization, you just learned that the information technology (IT) security department hired a convicted hacker who used to write malicious code as a security consultant. Would you overturn this decision? Why, or why not?Recall the Augmented Reality Exercise System (ARES) scenario discussed at the beginning of Chapter 11 of the textbook in uCertify. As the manager of this project, would you approve the decision to use an offshore contractor to outsource the development of AR headset applications? Why, or why not?

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.