ITRAG #3 Instructions:
The purpose of this activity is to add to your overall ITRAG report by researching an important variable that impact the overall impact of information technology on the economics and living standards across a region or population of people – the extent to which the population has the knowledge and skills to access and use information technology resources. If a population has ready access to technology resources (computers, internet connectivity, etc.) and they have the capacity to effectively use these resources, then the degree of impact on their economy and general standard-of-living will likely be greater. If their access is restricted through economic, social, or legal reasons or they lack adequate skills be make good use of IT, then the impact will be less.
Similarly, if a producer of technology products wants to operate a healthy business, it must have access to skilled workers in the regional population.
In this activity, your goal is to develop a general understanding of how well-positioned your region/country is in both of these areas.
Steps to complete this assignment:
Gather and organize information for your selected region/country in as many of these areas as possible:
Ownership of personal computers, tablet PCs, or Smartphones
Access to broadband internet connectivity (including challenges both economic and physical)
Educational opportunities related to technology skills (K-12, higher education, trade/vocational schools, etc.)
The role of government to address workforce skills in technology
The role of industry to address workforce skills in technology
Other digital divide/workforce information of relevance that you discover
What to Submit:
Organize your answers to these questions into a document that can be posted or linked for sharing (Word document, web-page URL, Wiki, Googledoc, etc.) Include a list of any outside sources you used in researching & developing your team’s report. You are not required to use APA, but provide at a minimum: (1) the title of the source and (2) a URL or equivalent sufficent for a reader to retrieve your source.
Post your work on this step to this assignment folder by the due date. (See the Course Syllabus for additional activity schedule information.)
Note: A single post representing your team is all that’s required. Include the names of all team members in the header/identifying information of your posted document.
Instructions:
**** Part 1-3 are in the attachment for referencing***
Category: Internet technology (IT)
-
ITRAG #3: Assessing Regional Readiness for Information Technology ITRAG #3: Assessing Regional Readiness for Information Technology
-
“Network Restructuring and Implementation: A Report to Management” Network Restructuring and Implementation: A Report to Management Introduction: In today’s fast-paced business environment, having a reliable and efficient network infrastructure is crucial for the success of any organization
In Packet Tracer, File provided.
– Use Visio to draw the existing network based on the map in the Packet Tracer document.
– Modify and update the Visio document for the new locations.
– Make sure all the subnetworks show clearly with at least 1 workstation on each wireless and wired subnet.
– Label all the ports and subnetworks with appropriate addresses.
– WAN connections are part of the 192.168.255.x/30 network. Each network is +4 of the previous one.
Each new LAN is 192.168.x.0/24, where x = the number of the location. For example – new location 1 has LAN address of 192.168.1.0. Wired workstations number from 2 upwards and wireless stations number from 253 downwards.
Write a report addressed to Management using Word regarding the change in structure and the rationale for how the change was implemented. Describe the new structure of the network and rationale for that structure. Include how networks work at the infrastructure, network and applications layers. The length of the report should be 300-500 words.
, include the following items –
The completed Visio drawn network with the new locations.
A Word document containing the description of the new network, the changes made, and the rationale for the changes. -
“Exploring the Impact of Technology on Modern Education”
Please see attached instruction. If you have any questions, please do not hesitate to ask. Thank you!
-
“Making the Build vs. Buy Decision: A Guide for Managers at Phoenix Fine Electronics” Making the Build vs. Buy Decision: A Guide for Managers at Phoenix Fine Electronics Introduction The decision to build or buy a system is a crucial one for
Use your SWOT analysis to create a guide for managers at Phoenix Fine Electronics to help determine if the business should build or buy a system. Incorporate feedback from the sourcing plan you created last week. As a guideline, this type of guide should be 4 to 5 pages in length with written descriptions, charts, and outlines.
Your guide should do the following:
List various steps needed to purchase or develop a system in-house
Discuss budget considerations
Discuss staffing considerations
Discuss time considerations
Identify risks
Contain a maintenance plan
Contain at least 2 references
Contain charts or outlines
Submit your assignment -
Title: Exploring the Relationship between Cybersecurity Measures and Cybercrime Rates: A Review of Academic Literature The chosen academic peer-reviewed journal article is titled “The Relationship between Cybersecurity Measures and Cybercrime Rates: A Cross-National Analysis” written
find one academic peer reviewed journal article that discusses either cybercrime or cyber security (you cannot use the article in the learning resources). What is the independent variable? What is the dependent variable? What is the research question or hypothesis? How are the variables conceptualized? Discuss what you think the importance is of looking at the relationship between the two variables- in other words, what might this research add to the study of cybercrime or cyber security?
-
Title: “The Rise of Cyberstalking and Identity Theft: A Growing Threat in the Digital Age” Article: “Cyberstalking and Identity Theft: A Growing Threat in the Digital Age” by Sarah Smith, published in The New York
Identify a news article or video from within the last year discussing one of the topics discussed in this module. Write a one-page, double-spaced summary with the referenced article cited in APA format.
Topic to use is Cyber Crime like Cyberstoalking or Identity Theft -
“Analyzing the Ethical Dilemma in the Case of Dr. Smith: A Case Study in Medical Ethics”
Please see attached Instruction and Case study. Also attached are some additional resources if needed. Please follow formatting instruction and grading rubric thoughly. If you have any questions, please do not hesitate to ask. Thank you!
-
“Project Management Plan for Addressing Network Vulnerabilities at ACME Company” Project Two: Mitigating Vulnerabilities in Enterprise Security Project Charter: Mission Statement: The mission of this project is to implement changes in people, process, and technology to mitigate vulnerabilities in enterprise security, ensuring the confidentiality, integrity, and availability of
Overview
In this course, you have already spent much of your time exploring vulnerabilities, and you have begun using project management tools to plan how to mitigate the risk from those vulnerabilities. Your work in this project will continue to build directly off of the scenario introduced in Project One, while allowing you the opportunity to look deeply at all aspects of this culminating experience. It is time to refine and finalize your project charter with the incorporation of a communication plan. This will help you draw more connections to your Gantt chart by seeing directly where the two align. There will also be time to revise your Gantt chart based on scope creep, something you will often need to contend with when working in the professional industry. Scope creep can arise from anything that increases the amount of work you have to complete during a project’s schedule. The communication plan included with a finalized project charter is essential for raising awareness and mobilizing a team to deal with the potential challenges associated with project management.
The project incorporates two milestones, which will be submitted in Module Four and Module Five. The project will be submitted in Module Seven.
In this assignment, you will demonstrate your mastery of the following competency:
Demonstrate basic project management principles to effectively collaborate in cybersecurity-related activities, tasks, and projects
Scenario
The ACME Company administration is surprised by all the potential vulnerabilities and areas for improvement you were able to find in its network. They would like to immediately begin moving toward a multi-layered approach to security, which addresses the three risk domains of people, process, and technology, by building on the information you have already provided. Because of your knowledge of the network’s vulnerabilities and your prior experience as a project manager, the ACME Company hires you to create a comprehensive project management plan for addressing one vulnerability for each risk domain.
You are told that stakeholders would like this project to be completed in the next six months. The following table details the list of teams and individuals you will have as resources when completing the work.
Personnel Role
Stakeholders Provide funding for the project
Project manager (You!) Responsible for coordinating the work between each different team, while also serving as the direct link to the stakeholders
Hardware engineers team lead Prioritizes and coordinates the team’s work and operates as a member of the small development team as well
Software engineers team lead Prioritizes and coordinates the team’s work and operates as a member of the small development team as well
Contractor Possesses a specialized skill set hired from outside the organization, and is responsible for physical work and maintenance of the office space
Two months into the project, at a meeting with the stakeholders, you are told that a document conversion function will be added to the scope of the project. The stakeholders believe it is important for the integrity of company data that it be made available as PDF files when reports are generated. While the stakeholders view this as a simple process, which you and your teams will be able to tackle along with the existing project work, you know there will be more to take into consideration. You will need to contract someone with a specialized skill set, who understands document conversion, to operate as a database administrator and to inform the installation of the new software. If this resource is acquired, the work could likely be completed in parallel with other tasks, but you understand there will be challenges in incorporating this into your existing budget.
Prompt
Using your work and instructor feedback from Project One, you will develop a comprehensive project management plan to address vulnerabilities in the organization’s network. Select one of the vulnerabilities you already identified in Project One for each of the three risk domains (people, process, and technology). The plan you create will focus on implementing changes that will mitigate each of these vulnerabilities.
You have already completed two Project Two milestones earlier in this course. After revising your work, based on instructor feedback and the Project Two scenario, you will submit your updated work along with the two additional sections of this project (Communication Plan and Scope Creep). This will allow you to better understand both the individual components of project management and their interconnected nature.
Your submission will include a written project charter with a completed communication plan, a completed Gantt chart, and a written explanation of your plans for scope creep. You will be using the Project Two Communication Plan Template, which has been linked in the assignment in Module Seven of your course.
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.
Project Charter
Create a mission statement to explain the project goal and scope of intended delivery.
Discuss business needs, including scalability, that are met by completing the project.
Assess potential business impacts of the project.
Communication Plan
Determine goals for three to five necessary communications in the project.
Determine the necessary parameters for each communication, including an effective method, effective frequency, appropriate owner (responsible party), and appropriate audience.
Explain how each component of your communication plan will contribute to providing frequent, open, and transparent communication for your phases, milestones, and tasks in the project.
Gantt Chart
Design a plan that effectively balances a timeline to mitigate one vulnerability for each of the three risk domains, while adhering to the overall scope necessitated by stakeholders.
Create phases, tasks, and milestones that effectively divide the work and align to the project goal.
Explain the best use of resources for each task.
Scope Creep
Develop a detailed plan, using your Gantt chart, to adjust for scope creep in the project.
Justify why your plan will effectively address the scope creep in the project.
Assess the potential impact of budget on your multi-level approach to enterprise security.
Discuss how you will communicate your new plan to stakeholders, in order to effectively manage the conflict introduced by the scope creep.
What to Submit
Your submission should be a total of 4 to 6 written pages in length and should also include a completed Gantt chart spreadsheet. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style.
**Supporting documentation uploaded** -
Title: Operating System Vulnerabilities and Remediation Tactics
Throughout the course, you have explored how operating systems and hardware integrate and the issues that arise from that integration. Conduct some research and provide an example of a specific operating system vulnerability disclosed in the last 12 months. Operating systems can include Windows, Mac OS, Linux/Unix, or other relevant platforms. Your example should focus on one of the following topics:
Privileged and nonprivileged states
Application processes and threads
Memory (real, virtual, and management)
File systems
In your response posts, describe a remediation tactic to address the vulnerability identified by each of your peers. The tactic you select should be guided by one of the Fundamental Security Design Principles. -
Title: Navigating the Digital World with Tech Talker: A Review of “5 Tips for Protecting Your Online Privacy” Article Link: https://www.quickanddirtytips.com/tech-talker/5-tips-for-protecting
Tech Talker, from Quick and Dirty Tips, is a short form podcast series that breaks down technology trends into helpful pointers on how to navigate life in the ditigal world. Visit https://www.quickanddirtytips.com/tech-talker and select an episode related to the concepts you have encountered in this text.
Open Word and create a short paper based on the one of the articles in ” RSS Feed – Tech Talker” feed that interests you. Submit the paper at the appropriate link.
Papers should be a minimum of two paragraphs.
The first paragraph should contain a link to the article and a summary the content of the RSS feed that you have chosen. Your instructor should be able to understand the ideas in the article based on your summary.
The second paragraph should contain your thoughts on the feed: What did you learn? Is this a subject that you will do additional research on? Why is the information in this article important to IT professionals?
Paragraphs should be coherent. Your paper should be free of spelling and grammatical errors. Text speak is not acceptable for this assignment.