Category: IT


  • Before you begin read: https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance. Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program. For this…

  • Review the course readings and the Red Clay Renovations company profile for background information before responding to this discussion question. The Red Clay Board of Directors tasked the company’s IT Governance Board to develop a new remote access policy for teleworkers and employees traveling on business (including local area travel to client sites). This policy…

  • You are an IT consultant hired by ABC Tech Solutions, a small but growing technology firm specializing in software development. The firm has recently expanded its operations and is looking to ensure its IT infrastructure is secure and compliant with industry standards. As part of your engagement, you are tasked with conducting a preliminary IT…

  • Now that you have discussed BallotOnline’s cloud services offerings, you will discuss the AWS Simple Monthly Calculator. You should cover the following areas: · What are some of the general use cases that are covered? · What are the requirements to use this calculator? · What are some of the main elements of infrastructure that…

  • You’ve now had a lot of experience working on many aspects of the cloud at BallotOnline, and you will take a look at what you’ve done in the past. In this step, you will write up how you implemented each of the use cases using the information found in the BallotOnline use case scenarios. This…

  • Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance. Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program. For this discussion paper, you will need…

  • Cloud Computing

    Choose a case study or story of a cloud sourcing event or project in an organization. Find an article online.. Then do a brief analysis of the project or services being sourced in the cloud. Focus on the type of cloud service SaaS, PaaS, IaaS, data storage, enterprise planning, etc. Address the following questions. The…

  • Imagine that you have been promoted to the position of an IT manager in a mid-sized firm, SecureFunds Inc, which specializes in financial services and has recently undergone significant growth and adapted to the new conditions of doing business by developing digital services for customers. Nevertheless, as it expanded its operations, the company has experienced…

  • Info Tech & Mobile Application Week 5 Assignment: Website Development for Mobile APPs With the proliferation of mobile browsers, people need to be able to access your website and, at a minimum, browse it smoothly to find the information they need. Taking it a step further and providing an optimal mobile user interface (UI), or…

  • Division chiefs, program managers, and other senior staff members working in CISO organizations frequently find themselves needing to stay current on technologies while, at the same time, leading and managing segments of the IT security program and assigned staff. Attending conferences is one way that these senior level personnel can learn about new technologies, tactics,…