Categories
Information Systems homework help

Project Plan Inception

Project Plan Inception
Overview
This is the first of a series of five sequential assignments (the course project) in which you will act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design. A venture capital group has funded this innovative start-up.The CEO has given you 90 days to deliver an information technology project plan in anticipation of the company relocating to a new facility. Since this is a start-up company, currently no building or technology infrastructure exists to support the business. All information technology (hardware and software) must be implemented in a hosted solution, an on-site solution, or a hybrid model. The CEO expects you to integrate different technologies from a variety of partners and incorporate industry best practices to develop the company’s technological systems.Additional background on the hypothetical companyCompany InformationCurrent StatusGrowth Projections (over next two years)Facility TypeNew facility is a two-story standalone building–Number of Employees1030Revenue$5 million$30 million This assignment consists of two parts:
Part 1: Project Plan Inception
You will write a 5–7 page document outlining the project specifics, such as company background information, company business, and an overview of the company’s information systems infrastructure.
Part 2: Supporting Gantt Chart
You will use Microsoft Project to create a Gantt chart for your e-commerce company project.Note:
You are to create or assume all necessary assumptions to successfully complete this assignment.
You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.
Instructions
Part 1: Project Plan Inception 
Write a 5-7 page business requirements document for their hypothetical e-commerce company in which you:
Develop your hypothetical e-commerce company’s background information. (Refer to this article, Top 10 Largest Ecommerce Companies in the US in 2020, when developing your company’s background information, which outlines the major types of e-commerce companies in existence. Use this as a guide when deciding what background information to include about your hypothetical e-commerce company in your project plan inception document.)
Document your chosen e-commerce company’s business type, customers, and demographic information.
Describe the key elements of your chosen e-commerce company’s information systems infrastructure.
Develop a high-level block diagram of your e-commerce company’s information systems infrastructure.
Use three sources to support your writing. (Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. Access the library or review library guides for help with research, writing, and citation.)
Part 2: Supporting Gantt Chart
Use Microsoft Project to create a Gantt chart in which you:
Identify the major and minor tasks, illustrating dependency relationships between activities. 
Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
The preferred method is for the project plan inception portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Create a project introduction document and project plan template to initiate a project.

Categories
Information Systems homework help

Given how expansive the internet is and with the addition of cloud services, is the use of DDOS and DOS attacks still relevant?

 
Mitigation Strategies
Given how expansive the internet is and with the addition of cloud services, is the use of DDOS and DOS attacks still relevant? Please perform additional research as necessary on this topic outside of the textbook.
Initial Post:
What is a DoS or DDoS attack? What is involved in such attacks? Include a diagram.
DDoS and DoS attacks aren’t designed to directly obtain information, but as a result of such attack, what information or “other benefits” might be obtained inadvertently? List and explain 4
What are the different types of mitigation strategies for both on-prem and cloud-based company assets?
Response:
As you read your classmates’ postings, think of areas where you can expand on the subject, conduct more research to further explore the topic, or examine the subject through different lenses and perspectives.
Regarding your response to your classmates: Please highlight a new facet to build on what your classmate stated, add to the conversation, or find an alternative viewpoint and support your response with citations. It’s important to have more than “I agree” or “good point,” when responding!
Due Wednesday – Initial Post
Answer the prompt and respond to at least three of your peers’ posts. You must make an initial post before you are able to view the posts of your peers. To view the discussion board rubric, click the three vertical dots icon in the upper right corner and select “Show Rubric.”
Due Sunday – Post Peer Response
A reminder about “classroom” discussion at the Master’s level:
Try to complete your initial post early during the conference week (no later than Day 3 of the week) and plan to continue dialogue with your classmates throughout the remainder of the week. Think of our online conversations as discussion in a traditional classroom. Posting your initial post and responses at the last moment would be similar to walking into a classroom discussion with 10 minutes left in the class. You would miss the issues covered by your classmates! Remember, the intent of our conference discussion is to take the conversation to the next level – the Master’s level of discussion.
In addition, posting early has its benefits. You have the opportunity to state your original thoughts without worrying that you are saying the same things that a classmate has already stated.
Finally, please use academic citations from the library to support your statements. Don’t simply rely on Google!

Categories
Information Systems homework help

What are your thoughts on cloud computing and virtualization?

 
As you craft your initial post, you will be using information from your texts, along with conducting independent research with sources outside of the required texts. Start your discussion with the following questions: 
What are your thoughts on cloud computing and virtualization? Use your independent research to forecast and substantiate the future landscape.
Is it a prudent business decision for companies?
What are the benefits? What are the risks?
What are some possible/potential areas of exposure?
Considering the items you listed above, what are the benefits and challenges?
If you were the decision-maker, what would be your direction?  
Keep in Mind: You will need to perform independent research beyond the course text materials in order to discuss and explain the elements of a comprehensive and well-thought-out position. Consider all facets that are necessary to be proactive and successful in evaluating not only what is happening now, but also the potential future landscape.
Submission Requirements and Resources
In order to facilitate group discussion and take into account the varying student schedules, please post original responses by Day 3 of the Week at 11:59 pm CST.  Discussion boards will close Day 7 of the week at 11:59 pm CST each week.  
Head over to the resources page, Discussion Criteria: Submissions and Engagement. to view specific discussion requirements, examples, and the discussion rubric.
A HINT about Conference Discussion at the Masters Level: Try to get your initial post in early in the conference week and dialogue with your classmates through the conference week.   Think of our online as discussion in a traditional classroom.
Posting your initial post and your responses at the last moments of the discussion week would be similar to entering a traditional classroom and discussion with 10 minutes left in the class – missing the discussion and dialogue raised by your classmates. Remember,  the intent of our conference discussion is to drive the discussion to the next level…  the Masters Level of scholarly discussion.   
Also…  posting early has its benefit, as you do not want to say the same thing that a classmate states. Finally – please  use academic citations to fortify your position

Categories
Information Systems homework help

What is a botnet, how are they created, how is software spread and what additional uses do they serve?

 Unlimited Attempts AllowedDetails
Botnet Attacks
In addition to the module on Denial of service, perform additional research on 3 of the largest Botnet attacks ever.
Research Presentation:
For this assignment, prepare an 8-10 PowerPoint slide presentation using independent research of the 3 attacks and prepare this to be given in front of the CIO and CISO as you help prepare them to try to mitigate such an attack against your organization
As you research for this assignment, describe:
What is a botnet, how are they created, how is software spread and what additional uses do they serve?
What makes these types of attacks so damaging and difficult to contain in each of the 3 different attacks?
How did each of the victims respond to the attack? Any lasting effects?
What are some of the lessons learned from botnet attacks that other companies can put in place?
*Include a cover slide, introductory slide, conclusion slide, and references slide. All of these slides will not count in your required total of slides.
Due Sunday
A reminder about graduate-level learning:
Graduate-level student learning will involve more of a focus on “diving in deeper” to the content. Expanding on the initial topic includes both written and oral presentation on the field of study experience, in combination with independent research and course content, will be essential elements of your graduate studies.
To have an experience isn’t enough to establish learning – you need to intentionally and thoughtfully reflect upon the experience, considering what you learned from it in order to take something away from it!
View RubricResearch Assignment Rubric IIResearch Assignment Rubric IICriteriaRatingsPtsProfessional Assignment or Presentationview longer description2 ptsExcellent1 ptsSatisfactory0 ptsNeeds Improvement/ 2 ptsStrong Introductionview longer description3 ptsExcellent2 ptsSatisfactory0 ptsNeeds Improvement/ 3 ptsQuality of Responseview longer description10 ptsExcellent8 ptsSatisfactory0 ptsNeeds Improvement/ 10 ptsResearch and Expansion of the Topicview longer description10 ptsExcellent8 ptsSatisfactory0 ptsNeeds Improvement/ 10 ptsConclusions and Action Plansview longer description3 ptsExcellent2 ptsSatisfactory0 ptsNeeds Improvement/ 3 ptsReferencesview longer description2 ptsExcellent1 ptsSatisfactory0 ptsNeeds Improvement/ 2 ptsTotal Points: 0
Choose a submission type
Submission type Upload, currently selectedUploadMore submission optionsMoreSubmit file using Webcam PhotoWebcam PhotoSubmit file using Canvas FilesCanvas Filesor Drag a file here, or click to select a file to uploadDrag a file here, orChoose a file to uploadPrevious ModulePreviousSubmit AssignmentNext ModuleNext
 

Categories
Information Systems homework help

complete the analysis and reflection assignment.

 Unlimited Attempts AllowedDetails
An essential element for graduate-level student learning is written and oral reflections on the field of study experience combined with the elements of the course. To have an experience isn’t enough to ensure learning; you need to intentionally and thoughtfully reflect upon the experience and what you learned from it to ensure that learning occurs.
Towards this end, students are required in this course to complete the analysis and reflection assignment. This reflection is intended to help you focus on what you are learning, identify issues or concerns on your mind, explore an idea more deeply, or in other ways enhance your learning about the course topics, yourself, and others.
Final Reflection Assignment:
Your reflection should be 5-7 pages long ( double spaced) and should dig deeply into this experience to reflect on your learning. It should connect to academic concepts and critically examine your own development through this learning. You will be graded based on the reflection rubric provided in your syllabus.
Your plan should include the following pieces:
WHAT?
What have you learned through this course? What stands out to you, feels new to you, excites you, or challenges you?
SO WHAT?
Why does this learning matter? Why does it stand out to you? Why is it important – to you personally or in the bigger picture?
NOW, WHAT?
What do you do from here? How will you take this learning with you? Does this learning change your perspective, your career goals, or your interests
Due Sunday
A reminder about graduate-level learning:
Graduate-level student learning will involve more of a focus on “diving in deeper” to the content. Expanding on the initial topic includes both written and oral presentation on the field of study experience, in combination with independent research and course content, will be essential elements of your graduate studies.
To have an experience isn’t enough to establish learning – you need to intentionally and thoughtfully reflect upon the experience, considering what you learned from it in order to take something away from it!
View RubricReflection PaperReflection PaperCriteriaRatingsPtsSelf-disclosureview longer description/ 15 ptsConnection to outside experiences, readings, class discussionsview longer description/ 25 ptsGrammar/spellingview longer description/ 5 ptsLength requirement metview longer description/ 5 ptsTotal Points: 0
Choose a submission type
Submission type Upload, currently selectedUploadMore submission optionsMoreSubmit file using Webcam PhotoWebcam PhotoSubmit file using Canvas FilesCanvas Filesor Drag a file here, or click to select a file to upload
 

Categories
Information Systems homework help

Perform a DoS attack by sending a large number of SYN packets continuously

 Unlimited Attempts AllowedDetails
Virtual Labs: Perpetrators of DoS
Consider what you have learned so far about Denial of Service as you review the objectives and scenario below.  Complete the lab that follows on EC-Council’s website using the link below.
Objective
Denial of Service (DoS) is an attack on a computer or network that prevents legitimate use of its resources. In a DoS attack, attackers flood a victim’s system with illegitimate service requests or traffic to overload its resources and prevent it from performing intended tasks.
The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws. In this lab, you will:
Perform a DoS attack by sending a large number of SYN packets continuously
Perform an HTTP flooding attack
Perform a DDoS attack
Detect and analyze DoS attack traffic
Scenario
In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means, motives, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
One common method of attack involves saturating the target machine with external communications requests so that it cannot respond to legitimate traffic, or it responds so slowly as to be rendered essentially unavailable. Such attacks usually lead to a server overload. DoS attacks can essentially disable your computer or your network. DoS attacks can be lucrative for criminals; recent attacks have shown that DoS attacks are a way for cybercriminals to profit.
As an expert Ethical Hacker or Pen Tester, you should have sound knowledge of Denial of Service and Distributed Denial of Service attacks in order to detect and neutralize attack handlers and mitigate such attacks. The labs in this module will give you a hands-on experience in auditing a network against DoD and DDoS attacks.
Week 8 Lab Assignment 1: Auditing a Network against DoD and DDoS attacks.
Lab Task:
The objective of this lab is to help students learn how to perform a DDoS attack—in this case, HTTP Flooding.
Lab Description:
A distributed denial of service (DDoS) attack is a more sophisticated form of DoS attack in which, in some cases, it is difficult to trace the attackers. A DDoS attack is a large-scale, coordinated attack on the availability of services on a victim’s system or network, launched indirectly through many compromised computers on the Internet.
A DDoS attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology, the perpetrator is able to multiply the effectiveness of the DoS significantly by harnessing the resources of multiple unwitting accomplice computers, which serve as attack platforms. The flood of incoming messages essentially forces the target system to shut down, thereby denying service to legitimate users.
These attacks come from various machines that can be in the same location or various other locations. As large numbers of “zombies” participate in this attack, an enormous amount of traffic is directed onto the victim machine, resulting in temporary or permanent damage to its resources.
As an expert Ethical Hacker and Penetration Tester, you must be aware of all types of DoS attempts and prevent them from affecting information systems.
Access the lab here: EC-Council | iLabsLinks to an external site.
Submit proof of this assignment completion by uploading and submitting a screenshot of the graded lab from EC-Council Labs. Refer to the Course Projects page for more information on project submissions. 

Categories
Information Systems homework help

Write a white paper based on the SANS Case Study

 Unlimited Attempts AllowedDetails
Write a white paper based on the SANS Case Study below.
Research and Write:
Adoption of the Critical Security Controls is a hot topic in today’s organizations. Review the case study and provide at least five recommendations (based on industry trends and recommendations) for this company, in addition to what the case study already covers in order to help mitigate instances of malware infection. 
Reflect on the past 8 weeks of what we’ve covered and additional outside research to make your case.  Feel free to make assumptions as needed as this is designed to measure your real-world applicability of the course content.
The final paper will run from 4 to 6 pages long, double spaced with appropriate citations. The paper is to be written in the APA format and will include a cover page and works cited page. The cover page and the references page do not count toward the minimum page requirement.
WhatWorks: Blocking Complex Malware Threats at Boston FinancialLinks to an external site.
Due Sunday 
A reminder about graduate-level learning: 
Graduate-level student learning will involve more of a focus on “diving in deeper” to the content. Expanding on the initial topic includes both written and oral presentation on the field of study experience, in combination with independent research and course content, will be essential elements of your graduate studies. 
To have an experience isn’t enough to establish learning – you need to intentionally and thoughtfully reflect upon the experience, considering what you learned from it in order to take something away from it!
View RubricEthical Hacking White PaperEthical Hacking White PaperCriteriaRatingsPtsContent of reflection and recommendationsview longer description/ 60 ptsProfessional feel and toneview longer description/ 10 ptsGrammar/spellingview longer description/ 10 ptsLength requirement metview longer description/ 10 ptsUse and quality of referencesview longer description/ 10 ptsTotal Points: 0
Choose a submission type
Submission type Upload, currently selectedUploadMore submission optionsMoreSubmit file using Webcam PhotoWebcam PhotoSubmit file using Canvas FilesCanvas Files
 

Categories
Information Systems homework help

What you learned about the topic(Cloud computing)?

   Please write in about 200 words in APA format with in-text citation for below questions.   
1) What you learned about the topic(Cloud computing)? (50 words)
2) Why you selected the topic(Cloud computing)? (50 words)
3) How you will utilize the topic(Cloud computing) in the future? (50 words)
4) Also, write a reflection of the material you’ve learned in the course(Cloud computing).  What did you like?  What could be improved? (50 words)
Note: You are required to use at least two-peer reviewed sources (besides textbook) to answer the above questions. 

Categories
Information Systems homework help

Professor Bleacher,      It is so important to have the right people in the righ

Professor Bleacher, 
    It is so important to have the right people in the right positions to have a strategic plan to make the project or to keep an organization successful and profitable(as long as the organization is not non-profit). From a project manager perspective it is so important to understand the abilities of the employees that you have(resources) and to understand those resources strengths and weaknesses to place them in the best place to be successful individually as well as for the organization as a whole. 
   On a different note to make candidates interested in the company or organization it is important to many people to have room for growth within a company and the opportunity to enhance the skills they walk in the door with. Your thoughts? Anyone been in this type of situation do you have any input or advice for individuals entering on the first floor?   
Need just three paragraphs

Categories
Information Systems homework help

You have been selected to be the project manager (for a project of your choice)

You have been selected to be the project manager (for a project of your choice). The project that you decide to use should meet all the key criteria of a project as outlined in the PMBOK, such as (a) having a beginning and an end; (b) resulting in something being delivered to someone; (c) requiring a series of activities that must be done to complete the project; and (d) requiring resources (for example, people and materials) to complete the work. The project should be an information technology-related project, something related to an area of information technology that is of interest to you. If you need help in determining a project, please consult with your professor.
Write a 7–11 page paper in which you define the scope of your chosen project. In your paper, you must do the following:
Provide a brief summary of your chosen project.
Describe at least three project goals and three project objectives.
Identify the key customers and at least two stakeholders for your project. Remember, you are delivering the project to your customer(s); however, there are others (stakeholders) who have a vested interest in your project.
Describe at least three key milestones and/or deliverables for your project.
Describe a high-level timeline that includes key tasks and deadlines.
Estimate the project’s overall cost, any key staffing or non-staffing resources needed, and how you plan to acquire them.
Identify at least three risks for your project and how you plan to manage them.
Identify how you plan to stay on track.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is as follows:
Propose a plan for the completion of an IT project.