Category: Information Systems homework help

  • Title: Designing a Remote Access Solution for 9-Iron Country Club

    Assignment: Internet/Web Access Management
    Learning Objectives and Outcomes
    Design a remote access solution.
     Assignment Requirements
    Read the following case scenario:
    The 9-Iron Country Club, commonly referred to as 9, is located in the suburbs of St. George City (a fictional city). It offers the amenities of a 9-hole golf course, a swimming pool, the clubhouse, and other recreational facilities to more than 1,200 members. 9 employs around 75 staff who cater to private functions such as weddings, meetings, and banquets.
     9 is a seasonal club that closes its outdoor operations between November and February. These four months are critical to plan new venues and coordinate member activities for the upcoming season. The management operations and the catering tasks of 9 are normally executed through the local network. Therefore, the management and staff face many problems, especially during the winter. An incident occurred when Rob Domore, 9’s food and beverage director and head chef, had to drive to the club in bad weather conditions. Rob stated, “We put in a lot of effort to provide impeccable services to members and maintain a competitive position. I think about how much more efficient we could be if we could work from home in the off-season. If we had remote access, all senior management and executive staff could be reaching out to members, helping them plan upcoming events and preparing for next season without coming into the office.”
     Mr. Domore also wanted to provide more flexibility in his daily schedule. He stated, “In the season, I can’t get all my office work done when we are in full swing because much of my time is spent in the kitchen and with the members. So, I desperately wanted the freedom to catch up at home, rather than stay additional hours on premises.”
     Using the information provided in the case scenario, you are to design a potential remote access solution for 9. You also must prepare a report describing the remote access solution. The report should include the following considerations:
    Needs and desires of customers and club members—available services, time availability, and network design
    Risk management or assessment—protection of confidential and personally identifiable information (PII)
    Data classification and security requirements—what measures will be implemented to protect the three states of data
    Required Resources
    N/A
    Submission Requirements
    Format: Microsoft Word
    Font: Times New Romans, 12-Point, Double-Space
    Citation Style: APA
    Length: 3-4 pages (not including cover and reference pages)
    Self-Assessment Checklist
    Use the following checklist to support your work on the assignment:
    I have identified potential solutions that could address the time management issues.
    I have addressed the considerations listed for designing the remote access solution.
    I have used a defined approach to identify the risks.
    I have followed the submission requirements.

  • Overview of Knowledge Areas in the PMBOK® Guide Project Management Body of Knowledge (PMBOK®) is a globally recognized guide that provides a standard framework for project management. It is published by the Project Management Institute (PMI)

    After reading Chapter 8, please provide a detailed overview about the knowledge areas identified in the PMBOK® guide.
    Project integration management
    Project scope management
    Project time management
    Project cost management
    Project quality management
    Project human resource management
    Project communications management
    Project risk management
    Instructions:
    Please write a 500-to-650-words paper in APA Style and include at least 3 reputable sources.
    12-pt. Times New Roman font, Double-spaced and 1” margins on all pages.
    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.

  • Purpose and Objectives of Access Control and Identity Management for Big Tire Transport “Enhancing Security and Efficiency: Implementing RBAC and Evaluating SSO for Big Tire Company” “Implementing RBAC and Secure Access Controls at Big Tire: A Comprehensive Plan for Remote Access, Physical Security, and Ongoing Testing and Monitoring”

    Purpose
    This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, access controls, and identity management.
    Required Source Information and Tools
    Web References: Links to web references in the Instructor Guide and related materials are subject to change without prior notice. These links were last verified on March 21, 2024.
    The following tools and resources will be needed to complete this project:
      Course textbook
      Access to the Internet
    Learning Objectives and Outcomes
    Successful completion of this project will ensure that you can design an access control and identity management system. To be able to do so, you need to be able to do the following:
    Develop a plan for conducting an infrastructure assessment.
    Create a risk assessment plan.
    Create a plan for implementing role-based access control (RBAC).
    Research single sign-on (SSO) solutions.
    Describe a solution for remote access.
    Develop procedures for the physical security of facilities, including biometrics.
    Create a plan for testing access controls.
    Create a plan for monitoring access controls.
    Overall Project Scenario
    Big Tire Transport is a U.S. logistics company that operates a large fleet of trucks and is responsible for the movement of goods across the 48 contiguous states. Big Tire has accounts with companies of all sizes, as well as the U.S. federal government and several U.S. state government agencies.
    The Big Tire headquarters is centrally located in Kansas City, Missouri. After a recent merger with a competitor, the company has employees in the following locations:
    Kansas City, Missouri, 500 employees
    Minneapolis, Minnesota, 200 employees
    Memphis, Tennessee, 150 employees
    Reno, Nevada, 175 employees
    El Paso, Texas, 250 employees
    Due to the merger, the systems in each location differ. The headquarters location has fairly new computing equipment (workstations and servers) and runs Windows 10 on client computers and the latest edition of Windows Server on most servers. The other locations run a mix of current and outdated Windows-based software, and much of the hardware is outdated.
    The main assets at the Big Tire headquarters location are housed in a data center. The assets consist of:
    Four Microsoft Windows Server application servers (the current version of Windows Server)
    Two email servers running Microsoft Exchange
    Two Linux web servers
    Microsoft Active Directory
    Accounting and financial software
    Logistics software
    Other software, such as customer relationship management (CRM), are cloud services that Big Tire subscribes to each month.
    Last year, Big Tire suffered two network compromises at the headquarters location that led to the disclosure of sensitive and strategic information on contracts and mergers. More recently, the Minneapolis location dealt with an insider destroying corporate data that could not be restored because the backup media contained errors. The Memphis location experienced a 4-day network outage due to a successful ransomware attack.
    You play the role of an IT security architect. Your boss, the company chief information office (CIO), relies on you for infrastructure planning and input on proposals to senior management.
    Your goals for this project are to:
    Develop a plan for assessing infrastructure assets and risks.
    Develop a plan to implement role-based access control (RBAC) to ensure confidentiality, integrity, and availability.
    Research and describe single sign-on (SSO) and determine whether it is feasible for implementation for Big Tire locations.
    Address secure remote access requirements for users and physical security for facilities.
    Recommend RBAC tests and a plan for ongoing network monitoring to ensure RBAC is working properly.
    Develop and submit reports to the CIO that address all requirements within each scenario.
    Deliverables
    This project is divided into several parts, as follows:
    Project Part 1: Infrastructure Assessment and Risk Assessment
    Project Part 2: Role-Based Access Control (RBA) and Single Sign-On (SSO)
    Project Part 3: Remote Access and Physical Security
    Project Part 4: Testing and Monitoring
    Project Part 1: Infrastructure Assessment and Risk Assessment
    Scenario
    The CIO recently made a strategic presentation to the executive management team to assess the infrastructure assets (hardware, software, databases, and types of sensitive information) and risks. Funding has been approved for both assessments. The CIO wants you to create a high-level plan for the infrastructure assessment and the risk assessment.
    Tasks
    Create a two-part report to the CIO that addresses the following:
    1.     A plan for conducting an infrastructure assessment of all company locations
    2.     A plan for conducting an IT risk assessment of all company locations
    Each plan should include the following:
    Purpose and importance
    The scope and boundaries of the plan
    (Risk assessment only) At least five issues the plan will address upon completion
    A list of typical threats and vulnerabilities
    A high-level outline of major steps to be taken
    A proposed schedule
    Required Resources
    Internet access
    Course textbook
    Submission Requirements
    Format: Microsoft Word (or compatible)
    Font: Arial, size 12, double-spaced
    Citation Style: Follow your school’s preferred style guide (The latest version of APA style)
    Length: 2 to 4 pages
    Self-Assessment Checklist
    I developed an effective plan to assess the infrastructure of all company locations.
    I developed an effective plan to assess the IT risk of all company locations.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.
    Project Part 2: Role-Based Access Control (RBAC) and Single Sign-On (SSO)
    Scenario
    Big Tire currently relies on access control lists (ACLs) for control over what users can access and what actions they can carry out. As the company has grown, ACLs have proven to be very time-consuming for IT staff to maintain.
    You believe RBAC, used as a company-wide access control system, is superior to ACLs in terms of security and administrative overhead. RBAC user roles and permissions make it easy to perform role assignments because individual users no longer have unique access rights. Instead, they have privileges that conform to the permissions assigned to their specific role or job function.
    Your CIO also asked you to research and report on the feasibility of SSO.
    Tasks
    Create a two-part report to the CIO that addresses the following:
    1.     A high-level plan for implementing RBAC or an RBAC-like solution at each Big Tire location
    2.     A description of SSO and a determination of whether it is feasible for implementation at Big Tire
    The RBAC plan should include the following:
    Purpose and importance
    A description of the technology
    Advantage of RBAC over ACLs
    How RBAC can mitigate risks to the IT infrastructure’s confidentiality, integrity, and availability
    A high-level outline of major implementation steps
    A scheme for RBAC roles
    Create a simple scheme that maps roles to applications in the data center
    Assume a more granular scheme will be created in the future
    Some roles to consider in your scheme are Administrative, Accounting, HR, Manager, Sales and Marketing, Driver, and Technical, although you can use other roles if desired
     Any related projects that may need to run before, during, or after the implementation
      A proposed schedule
    The SSO section should include the following:
    Purpose and importance
      A description of the technology
      Your recommendation as to whether SSO is feasible
      If so, the type of solution do you recommend
    Required Resources
    Internet access
    Course textbook
    Submission Requirements
      Format: Microsoft Word (or compatible)
      Font: Arial, size 12, double-spaced
      Citation Style: Follow your school’s preferred style guide (The latest version of APA style)
      Length: 2 to 4 pages
    Self-Assessment Checklist
    I developed a high-level plan for implementing RBAC or an RBAC-like solution at each Big Tire location.
    I wrote a description of SSO and determined whether it is feasible for implementation at Big Tire.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.
    Project Part 3: Remote Access and Physical Security
    Scenario
    The Big Tire CIO wants users at all company locations and trusted business partners to be able to access applications hosted in the data center, such as the logistics and accounting applications. A remote access solution that provides a good user experience working with the logistics application would be ideal. A previous attempt to access the application over a virtual private network (VPN) connection was abandoned due to very slow response time.
    The CIO also wants improved and uniform physical security at all locations, which should include some type of smart card and/or programmable locks for all office buildings and garages.
    Finally, the CIO wants all employees, including drivers using mobile devices, to use biometrics, tokens, fobs, or authenticator apps for access to all websites that offer it as a factor in multifactor authentication. The chosen access control should be convenient for employees and cost-effective.
    Tasks
    Create a three-part report to the CIO that addresses the following:
    A high-level plan for implementing remote access to applications hosted in the data center
    A high-level plan for implementing physical security at Big Tire locations
    A high-level plan for cost-effective multifactor authentication for websites
    Required Resources
    Internet access
    Course textbook
    Submission Requirements
    Format: Microsoft Word (or compatible)
    Font: Arial, size 12, double-spaced
    Citation Style: Follow your school’s preferred style guide (The latest version of APA style)
    Length: 2 to 4 pages
    Self-Assessment Checklist
    I developed a high-level plan for implementing remote access to applications hosted in the data center.
    I developed a high-level plan for implementing physical security at Big Tire locations.
    I developed a high-level plan for cost-effective multifactor authentication for websites.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.
    Project Part 4: Testing and Monitoring
    Scenario
    Access control systems are constantly under surveillance and attack. An attacker who gains control of an access control system can leverage that access to gain entry to other systems in the enterprise. Frequent testing of access control systems ensures that weaknesses are found and can be dealt with before they are exploited.
    Network monitoring is a critical IT process where all networking components, such as routers, switches, firewalls, and servers, are monitored for faults, performance, and anomalies to detect possible intruders or attacks.
    Tasks
    Create a two-part report to the CIO that addresses the following:
    A high-level plan for testing RBAC and physical security (building access)
       Include the type of tests to be performed and the frequency
    A high-level plan for ongoing network monitoring to ensure the RBAC solution is working properly
       Network monitoring is to be performed at each Big Tire location
    Required Resources
    Internet access
    Course textbook
    Submission Requirements
    Format: Microsoft Word (or compatible)
    Font: Arial, size 12, double-spaced
    Citation Style: Follow your school’s preferred style guide (The latest version of APA style)
    Length: 2 to 4 pages
    Self-Assessment Checklist
    I developed an effective plan to test RBAC and physical security controls at Big Tire.
    I developed an effective plan for network monitoring at Big Tire.
    I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
    I followed the submission guidelines.

  • The Value of Normalization in SIEM Systems: A Discussion on the Importance of Data Processing and Human Analysis

    SIEM systems take data from different log files, such as those for firewalls, routers, web servers, and intrusion detection systems, and then normalize the data so it can be compared. SIEM systems are highly valuable in helping to spot attacks by sifting through raw log file data and coming up with relevant information.
    The normalization process involves processing the logs into a readable and structured format, extracting important data from them, and mapping the information to standard fields in a database.
    Answer the following question(s):
    1.     Would a SIEM system be valuable if it did not normalize data? Why or why not?
    2.     Does an organization that uses a SIEM system still need a human analyst? Why or why not?
    Requirement: Note that the requirement is to post your initial response by 11:59 PM on Thursday and you must post two additional posts during the week by 11:59 PM on Sunday. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students should range between 100-to-150 words. Please cite per APA rules/guidelines.
    Make sure your responses do not duplicate the reactions of other students. Scan the answers provided by other students and post your comments or questions about their items in the discussion area. 
    Use the following checklist to support your work on the assignment:
    I have engaged in a discussion of the assigned topics with at least two of my peers.
    I have raised questions and solicited peer and instructor input on the topics discussed.
    I have articulated my position clearly and logically.
    I have supported my argument with data and factual information.
    I have provided relevant citations and references to support my position on the issue discussed.
    I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
    I have solicited peer and instructor feedback on my arguments and propositions.
    I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine and supported my critical review with data and information.
    I have followed the submission requirements.

  • Reflection on Course Material Reflection on Course Material Throughout this course, I have gained a deeper understanding of various topics related to leadership and management. However, there were a few other topics that I would have liked to see covered in this course. One

    Week 8 Discussion This is a shortened week and therefore we are going to complete a reflection activity.This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:
    What other topics would you have liked to have covered in this course?
    What reading did you find most interesting and why?
    How has this course changed your perspective or outlook moving forward?
    Any other topic of interest that you would like to add.
    Please be sure to answer all the questions above in the initial post.Please be sure to engage by Wednesday at 5pm ET.

  • Title: Exploring the Definition and Impact of Artificial Intelligence in Various Industries and Locations

    Week 7 Written Assignment
    This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:
    What is your definition of AI?  Please explain.
    What is your opinion of AI, is the technology currently available? Why or why not?
    Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
    How is AI perceived as different in various industries and locations? Please explain.
    Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:
    4-5 pages in length (not including title page or references)
    APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
    A minimum of five peer-reviewed journal articles.
    The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

  • Title: Chapter 7 Discussion Questions and Exercises

    Week 7 Assignment
    Complete the following assignment in one MS Word document:
    Chapter 7 –discussion questions #1 through 4 & exercise 3 & Internet exercise #7. For exercise 3, use this link instead of the one provided in the book: https://www.teradata.com/University/Academics When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
    All work must be original (not copied from any source).

  • Title: Personal Reflection: Problem Solving in the Workplace Program Details: Master of Business Administration (MBA) Job Details: Marketing Manager at XYZ Corporation Part 1 – Identify a Problem As a marketing manager at XYZ Corporation, I

    Personal Reflection: Problem Solving in the Workplace
    It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future).  To complete the assignment, please follow the below instructions:
    Review your program’s goals and curriculum on the UC Webpage and the UC Graduate Course Catalog:
    Webpage Links found here: https://www.ucumberlands.edu/academics/graduate#programs
    Graduate Catalog: https://www.ucumberlands.edu/academics/academic-catalog
    Reflect on (research, if needed) your current (or future) job duties and responsibilities.
    Assignment Details:Part 1 – Identify a Problem
    Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.
    Part 2 – Solve the Problem
    Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.
    Grading Expectations:
     Fully answer both parts of the assignment.
    Word requirement: 400-500 words
    *Please include your Program details (MSIT, MSISS, MBA, MSPM, PHDIT, etc.) in the reflection and also include your job details (job title and employer, if available). 

  • “Applying Course Knowledge and Skills to Foster Servant-Leadership in the Workplace”

    Week 6 – Executive Practical Connection Assignment
    At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.Assignment:
    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  Don’t forget that the grade also includes the quality of writing.

  • “Building a Safe Community: Implementing Defensible Space in Five Oaks, Dayton” Introduction: Defensible space is a concept that was developed by architect Oscar Newman in the 1970s to create safer and more secure neighborhoods. It involves designing

    Create Defensible Space
    Using the example of Five Oaks in Dayton, Ohio, research how to initiate and present a plan to build defensible space into a mini-neighborhood.
    Creating Defensible Space
    Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
    Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.