cloud computing

  Cloud computing has seen increased acceptance, even by prominent, protected industries like government and large corporate environments. Define cloud computing and make a list of its pros and cons. Describe at least two Software as a Service (SaaS) programs that you have used and what you have used them for. Would you recommend these … Read more

diagram types

  For this week’s discussion, we have decided to move forward with the software development. We are looking at some tools that allow us to better look at the upcoming project. There are several diagrams that all have different purposes of showing other things about the project. Of the following tools, which do you feel … Read more

Strategic Planning

  Strategic planning is an important part of any company. Often, businesses need to ponder whether they should build the software or take on the project at all. Your manager asks you to prepare to discuss the first steps toward replacing the case management system. Research and discuss the purpose and details, including the benefits … Read more

SWOT analysis

 To begin, choose a business or organization that you would like to evaluate – it can be where you work, a school (UMGC), a place of worship, government entity (e.g., DMV, Secretary of State, courthouse, etc.), or any other type of organization. Since the focus of the analysis will involve information technology, the best type … Read more

Making a company

Please use the attached template to fill in.   For this activity, you will establish the fictional company, executives, and team members that you will refer to. Respond to each of the following: What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, … Read more

Cybersecurity Research | Edit and Improve

 I want to enhance and refine my research, elevating its engagement, informativeness, and persuasiveness. This will involve incorporating additional citations and references to strengthen the argument. Furthermore, I plan to integrate visual elements such as charts and graphs to provide a more comprehensive and visually appealing context for conveying the research findings. 

Answer the question

The AICPA’s Common Criteria list 9 categories to evaluate the Security Trust Service Criteria.  Briefly review the attached material on the Common Criteria and use it to perform a quick evaluation of your security breach that you have chosen for your research. Reacher case “MGM resorts security breach 2023″https://techcrunch.com/2023/10/06/mgm-resorts-admits-hackers-stole-customers-personal-data-cyberattack/

INTRODUCTION TO CYBERSECURTY

Part I:  Course Feedback.  Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course?  Part II:  Mr Scott is considering partnering with a company.  The transaction is not public yet and Mr. Scott has asked what we … Read more