Category Archives: IT/Web

Assignment Help-IT


Assignment Help-IT

The security program has been a huge success. Several of the PCS government clients have expressed their appreciation and increased confidence in the company’s ability to protect their program data and assets. Your company is now in the continuous monitoring phase and your information security analysts are performing routine assessments on the servers and workstations.

  • Describe the importance of assessments in system and application security.
  • Describe some of the major challenges with this area of and address why the job is never done.
  • Review the results of the vulnerability scan provided by one of your analysts for a client’s system. Explain ten of the failures found on the client system and how security the PCS security program prevents these problems on the corporate network.
  • Conclude by discussing the relationship between assessments and the importance it has in continuous monitoring.

 

Assignment Help-IT

 

USE ONLY THE RESOURCES LISTED PLEASE:

 

Chapters 16, 17, & 18 of : http://www.nist.gov/customcf/get_pdf.cfm?pub_id=890080#page=193

Assignment Help-IT

 

Chapters 4 & 5 of: http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf#page=39

 

 

Advertisements

Need Help-IT Project


Click ORDER NOW  to have your custom paper completed within deadline

Need Help-IT Project

Before doing your Task, Read and follow the instructions mentioned in “project briefing”

 

Task

Develop a charter for the RALS (Riverina Agriculture and Lifestyle Show’) Rostering project including:

Include the project description and overview..

Part One:
MOV – Measurable Organisational Value
(This is the goal of the project and is utilised to define the value that your team project will bring to your client)
• Identify the desired area of impact – Rank the following areas in terms of importance: Strategy / Customer / Financial / Operational / Social
• With reference to your project, identify one or two of the following types of value:

  • Better – is improving quality important to your client?
  • Faster – does your client want to increase efficiency?
  • Cheaper – is cutting costs important?
  • Do more – does your client want to continue its growth?
  • Develop an appropriate metric – this sets the target and expectation of all the stakeholders. It is important to determine a quantitative target that needs to be expressed as a metric in terms of an increase or decrease of money.
    • Determine the timeframe for achieving the MOV – ask yourselves, when do we want to achieve this target metric?
    • SUMMARISE THE MOV IN A CLEAR CONCISE STATEMENT OR TABLE

(Note: the MOV should inform everyone what the project will achieve, not how it will be achieved. It should also focus on the organisation, not on the technology that will be used to build or support the information system).

Part Two:
Define Scope and produce a Scope Management Plan
Define the scope of the project and detail how the scope will be managed.
Provide a list of Resources
Identify and detail the resources for the project using MS Project where appropriate, including:
• People (and their roles), plus any extra personnel that is required for the project.
• Technology – any hardware, network and software needs to support the team and your client.
• Facilities – where will most of the teamwork be situated?
• Other – for example, travel, training etc.

Part Three:

Using MS Project, develop a schedule using a high level Work Breakdown Structure (WBS). It should include:
o Milestones for each phase and deliverable
o This will tell everyone associated with the project that the phase or deliverable was completed satisfactorily.
o Activities / Tasks
o Define a set of activities / tasks that must be completed to produce each deliverable.
o Resource Assignments
o Assign people and resources to each individual activities.
o Estimates for Each Activity / Task
o Develop a time estimate for each task or activity to be completed.

You will need to submit MS Project file as well

Part Four:

Project Risk Analysis and Plan
• Document any assumptions you have made about the project
• Using the Risk Identification Framework as a basis, identify five risks to the project – one for each of the five phases of the methodology.
• Analyse these risks, assign a risk to an appropriate member, and describe a strategy for the management of each specific risk.

Part Five:

Quality Management Plan. It should include:
• A short statement that reflects your team’s philosophy or objective for ensuring that you deliver a quality system to your client.
• Develop and describe the following that your project team could implement to ensure quality;
• A set of verification activities
• A set of validation activities

 

Project briefing

Congratulations!  You have been successful in gaining an appointment as an IT Project Manager consultant with Virtucon*.

Your assigned project

Please visit the Virtucon website (virtucon.uimagine.edu.au) to learn more about Virtucon, and our range of services (note: you will be prompted to enter your CSU username and password to access this site).

Once you have learned about Virtucon and our ranges of services, please access the Staff area by clicking on ‘Staff Login’ in the main menu and enter:

Username: staff101
Password: staff101

Once logged in to the staff only site, you will be able to access details of the current projects Virtucon is working on.  You have been assigned to the ‘Riverina Agriculture and Lifestyle Show’ (RALS) project.

To access the project details, please click on ‘Current Projects -> Riverina Agriculture and Lifestyle Show ‘

You also have access to a number of templates to be used throughout the project. To access these please click on ‘Templates’.

Your Client

Your client is Globex Corp. To learn more about Globex and their business and history, please visit the Globex website  (globex.uimagine.edu.au).  You should ensure you visit the Riverina Agriculture and Lifestyle Show page accessed via the ‘RALS’ link in the main menu. (note: you will be prompted to enter your CSU username and password to access this site).

As a Virtucon staff member and in order to gather information for your assigned project, you have been granted temporary access to the Globex staff intranet.  Please access this by navigating to the ‘Staff’ menu option.  You will need to enter:

Username: virtucon101
Password: virtucon101

In this area you will find the current form used to collect information for potential volunteers for the Riverina Agriculture and Lifestyle Show (found under the ‘Documents’ menu option) as well as other information regarding Globex.

 Need Help-IT Project

Criterion Expectation
Provides an MOV and identifies the target and expectations of all stakeholders in a suitable format. The MOV illustrates the detailed consideration of the target and a thorough analysis of the expectations of all stakeholders.

The format is logical, clear and well structured

Utilising MS Project, provides a list of resources associated with the project – including reference to people, technology, and facilities. Evidence of expertly utilizing MS Project to create a comprehensive list of resources, demonstrating in-depth analysis of the project’s needs.
Produces a Scope Management Plan (SCM).  Consistent application of industry standard language and formatting.
Utilising MS Project -evidences the processes involved with a WBS.  Demonstrates high level project management skills, integrating and applying project management tools in meaningful and purposeful ways towards completion of WBS design, correctly and comprehensively addressing all project requirements.
Provides a project risk analysis and plan using the risk identification framework as a basis for discussing alternate strategies for the management of such risks. All steps in project risk analysis and alternate strategies are comprehensively discussed and presented in the context of the project, with evidence of thorough consideration of the framework to validate the alternatives.
Produces a quality management plan which includes a statement about the team’s philosophy and verification and validation activities. All required project steps are correctly identified and appropriately contextualised for the selected project.
Referencing of sources (APA 6th ed citation) to reinforce findings. All written evidence is professionally communicated using correct referencing.

 Need Help-IT Project

Click ORDER NOW  to have your custom paper completed within deadline

 

CIS52005 Assignment 3 Management of Information Security R2– Due on 19th Sept. 2016


ORDER NOW your custom paper to have it completed successfully on time.

Buy Research Paper about this assignment here (Email us: writersestate@gmail.com)

CIS52005 Assignment 3 Research Report – Due Date 19th September 2016

Management of Information Security R2

Task 1 Research and write a critical analysis of the following SAP System Security Parameters

Task 1.1 Discuss what is a transaction code and its main purpose in the SAP R/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under- take a security audit of an organisation’s SAP R/3 System (About 500 words) Task 1.2.1 Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 500 words)

Task1.2.2 As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words) Task 2 Ethical Behaviour for an Information Security Professional Review the Wikipedia Link for Professional Ethics and ACS Code of Professional Practice and provided with the Assignment 3 and consider the following two case studies as an Information Security Professional: Task 2.1 Security hole in Distributed Record Management System used by Company X and Company Y – Summary of case Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients’ records. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company’s database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated. Several weeks later and during a normal test on the software developed, Faisal discovered a serious ‘security hole’ in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y’s database system could not be trusted as the security hole posed a threat even on Company X’s database system. Faisal told his manager about the problem and explained its significance. The manager’s response was, “That’s not our problem; let’s just be sure that our software functions properly.” Faisal is not sure what to do. Refusing to work on the project means disobeying his manager’s orders. Continuing to work on the project, means disobeying one of God’s commands, which requires him to be truthful and sincere in his dealings. Task 2.1.1 Identify and describe the key ethical concerns raised in this case study? (About 250 words) Task 2.1.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Faisal in a recent distributed Records Management system project (About 250 words)

Task 2.2 – Carol Fraudulent Member of ACS Branch Summary of case Carol is a popular person who has worked hard in the ICT industry. She is currently a team leader of a group of software developers in a large company providing outsourced services to the Federal government. She is a Member of the ACS and decides to contribute to her profession by playing an active role in the local branch of the Society, and is elected Treasurer. Carol has some financial problems, and forges signatures on cheques to embezzle $5,000 from the branch’s reserves to pay for medical treatment for her child. When she is inevitably found out she returns the money, and her membership of the ACS is terminated, but she continues in her job. Several members of her team are also ACS members. How should they treat their team leader? Task 2.2.1 Identify and describe key ethical concerns raised by Carol’s actions outlined in this case study? (About 250 words)

Task 2.2.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Carol’s actions in this case study (About 250 words) Task 3 Research the following advanced network attack type – the Advanced Persistent Attack Research the concept of an advanced network attack known as an Advanced Persistent Attack. Explain what is meant by the concept of an Advanced Persistent Attack and describe the steps, resources and activities that would need to be under-taken by a hacker to mount such as attack on an organisation and the possible consequences for an organisation if compromised by an Advanced Persistent Attack (About 500 words)

 

Buy Research Paper about this assignment here (Email us: writersestate@gmail.com)

ORDER NOW your custom paper to have it completed successfully on time.

Assignment 3 Marking Criteria

Student No: Student Name: Task Marks Obtained Comments Task 1.1 Discuss what is a transaction code and its main purpose in the SAP R/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under- take a security audit of an organisation’s SAP R/3 System (About 500 words) 10 Excellent coverage and critical analysis 8 Very good coverage and critical analysis 6 Good coverage and critical analysis 4 Poor coverage and critical analysis 2 Very poor coverage and critical analysis 0 No attempt 0 Task 1.2.1 Discuss the important role that the user master record in SAP plays in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 250 words) 5 Excellent coverage and critical analysis 4 Very good coverage and critical analysis 3 Good coverage and critical analysis 2 Poor coverage and critical analysis 1 Very poor coverage and critical analysis 0 No attempt 0 Task 1.2.2 As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words) 5 Excellent coverage and critical analysis 4 Very good coverage and critical analysis 3 Good coverage and critical analysis 2 Poor coverage and critical analysis 1 Very poor coverage and critical analysis 0 No attempt 0 Task 2.1.1 Identify and describe the key ethical concerns raised in this case study? (About 250 words) 10 Excellent coverage and critical analysis 8 Very good coverage and critical analysis 6 Good coverage and critical analysis 4 Poor coverage and critical analysis 2 Very poor coverage and critical analysis 0 No attempt 0 Task 2.1.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Faisal in a recent distributed Records Management system project (About 250 words) 5 Excellent coverage and critical analysis 4 Very good coverage and critical analysis 3 Good coverage and critical analysis 2 Poor coverage and critical analysis 1 Very poor coverage and critical analysis 0 No attempt 0 Task 2.2.1 Identify and describe key ethical concerns raised by Carol’s actions outlined in this case study? (About 250 words) 10 Excellent coverage and critical analysis 8 Very good coverage and critical analysis 6 Good coverage and critical analysis 4 Poor coverage and critical analysis 0 2 Very poor coverage and critical analysis 0 No attempt Task 2.2.2 Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Carol’s actions in this case study (About 250 words) 5 Excellent coverage and critical analysis 4 Very good coverage and critical analysis 3 Good coverage and critical analysis 2 Poor coverage and critical analysis 1 Very poor coverage and critical analysis 0 No attempt 0 Research the concept of an advanced network attack known as an Advanced Persistent Attack. Explain what is meant by an Advanced Persistent Attack and describe the steps, resources and activities that would need to be under-taken by a hacker to mount such as attack on an organisation and the possible consequences for an organisation if compromised by an Advanced Persistent Attack (About 500 words) 30 Excellent coverage and critical analysis 25 Very good coverage and critical analysis 20 Good coverage and critical analysis 15 Poor coverage and critical analysis 8 Very poor coverage and critical analysis 0 No attempt 0 Quality of Research, Writing, Presentation and Referencing 20 Excellent research, writing, presentation and referencing 16 Very good research, writing, presentation and referencing 12 Good research, writing, presentation and referencing 8 Poor research, writing, presentation and referencing 4 Very poor research, writing, presentation and referencing 0 No attempt 0 Total Date Marked: Marker Initials: General Comments and Feedback: Task 2.1 Helen the IT Consultant ACS Code of Professional Conduct values and relevant clauses of the Code of Professional Conduct 1.2.1 Public Interest b) raise with stakeholders any potential conflicts between your professional activity and legal or other accepted public requirements; e) endeavour to preserve the integrity, security, continuity and utility of ICT; g) endeavour to preserve the confidentiality and privacy of the information of others. 1.2.2 Quality of Life c) understand, and give due regard to, the perceptions of those affected by your work; 1.2.4 Competence a) endeavour to provide products and services which match the operational and financial needs of your stakeholders; e) advise your stakeholders when you believe a proposed project, product or service is not in their best interest Task 2.2 Fred in the State Department ACS Code of Professional Conduct values and relevant clauses of the Code of Professional Conduct 1.2.1 Public Interest d) take into consideration the fact that your profession traverses many other professions, and has implications for other social systems and organisations; g) endeavour to preserve the confidentiality and privacy of the information of others. 1.2.2 Quality of Life a) recognise, in your work, the role that ICT can play to enhance the quality of life of people, particularly the disadvantaged or those with disabilities; 1.2.4 Competence d) respect and protect your stakeholders’ proprietary interests;

Buy Research Paper about this assignment here (Email us: writersestate@gmail.com)

ORDER NOW your custom paper to have it completed successfully on time.

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report


Buy Order Now for the complete paper here.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Description 

Due date: 26th August 2016

CIS2005-S2-16-Assignment 2 – SAP Practical Written Report

Assignment 2 – SAP Practical Written Report

Marks : 100

Weighting: 15%

The key concepts and frameworks covered in modules 1–4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

1. analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

2. demonstrate an ability to communicate effectively both written and orally about the management of information security in organisations And assesses the following graduate skills: The Academic & Professional Literacy and Written & Oral Communication at level 2. Assignment 2 consists of three specific tasks regarding SAP R/3 System Security.

Your Assignment 2 report must be structured as follows:

● Cover page for your assignment 2

● Table of contents

● Body of report – main section for each task with appropriate use of subsections for each task sub report

● Task 1 Login to SAP System Student Account and Complete and Save System/User Profile/Own Data Fields

● Task 2 – Eight reports as specified (include an Excel spreadsheet or Access database) with your submission of Assignment 2 report

● Task 3 – SAP System Security Settings

● List of References

Task 1 Specifications – Login to SAP R/3 System using your student SAP userid and password and Complete System/User Profile/Own Data fields that are currently blank as per Screenshot below

Task 1 Requirements – Complete and save following fields in your SAP R/3 Student Account User Profile Title, Last name, First name, Function, Department, Room Number, Floor and Building and provide a screen capture of completed fields in System/User Profile/Own Data Screen in your SAP R/3 Student Account for Task 1 in your Assignment 2 Report 2

Task 2 Specifications – Analyze SAP Security Audit Log Data.

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields:

Field Description

USERID USERID identifies an unique user

YYYYMM YYYYMM describes when the user action took place.

YYYYMM is useful for summarising user activity by month.

TCODE TCODE refers to the transaction (option on the menu) performed by the user.

TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.

TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).

TCD TCD is the same as TCODESTAT, except there is no -0 or -1.

TSTATUS TSTATUS indicates whether the action was successful or not (0/1).

TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month

YYYYMM. TTEXT TTEXT is the narrative description of the TCODE.

Task 2 Requirements Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reportslisted below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are: 1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040. 2. List of users performing unsuccessful activities. 3. List of transaction codes performed, with their frequency by each user. 4. List of users engaging in security-related actions. 5. Top 10 users in terms of frequency of activity. 6. List of users who are dormant – in the range USER-001 to USER-050. 7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format. 3 TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings. You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting. Task 3 Requirements complete the following sub tasks: Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature. GLOBAL BIKE COMPANY Table 1 SAP System-Wide Security Settings Date: Prepared by: SAP System Security Settings User-Defined Value System Default Value Recommended Value No auto user SAP* Failed logins to end Failed logins to lock Auto failed unlock Min password length Password expiry (days) Idle Screen logout (seconds) No check on Tcodes Login client No Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum. Note: Submission of your assignment 2 report documents will be via the Assignment 2 submission link on the course studydesk. Assignment 2 submission consists of two documents (1) a word document for the Assignment 2 report and (2) an accompanying spreadsheet or an Access database for task 2 of Assignment 2. Note carefully University policy on Academic Misconduct such as plagiarism, collusion and cheating. If any of these occur they will be found and dealt with by the USQ Academic Integrity Procedures. If proven Academic Misconduct may result in failure of an individual assessment, the entire course or exclusion from a University program or programs.

Order Now for the complete paper here.

Buy paper on this assignment here (Email us: writersestate@gmail.com)

CIS5101 S2 2016: Assignment 1, Research Proposal on Business/Organization


Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

 

CIS5101 S2 2016: Assignment 1; Research Proposal on Business/Organization

Marking Criteria

Student name: Student No:
Mark Comments
1. Preliminary Research Findings (company background, business strategy
and objectives, structure, revenue model, etc.)
20 Excellent A perfect piece of work.
18 Very good A very good piece of work that meets all specified criteria
15 Good Competently meets the criteria specified. 20
10 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
2. Company capabilities (skills, qualifications, testimonials, exemplars)
15 Excellent A perfect piece of work.
13 Very good A very good piece of work that meets all specified criteria
11 Good Competently meets the criteria specified. 15
8 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
3. Web Design Components (design, promotion, security, maintenance)
30 Excellent A perfect piece of work.
25 Very good A very good piece of work meeting all specified criteria.
20 Good Competently meets the criteria specified. 30
15 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.
4. Cost and Deliverables (Costs, deliverables, timelines)
20 Excellent A perfect piece of work.
18 Very good A very good piece of work meeting all specified criteria.
15 Good Competently meets the criteria specified. 20
10 Average Adequately meets the criteria as specified.
6 Poor Did not sufficiently meet the criteria as specified.
3 Very poor Clearly does not meet criteria to pass.
0 Not Attempted No attempt made or irrelevant.

Page 1 of 2

5. PRESENTATION (Structure; appropriate graphics, images, animations,
tables, etc; speaker’s notes; bullet points; spelling, punctuation, grammar etc.)
15 Excellent
13 Very good
11 Good presentation 15
8 Average
6 Poor
3 Very poor
0 Little or no attempt to make appropriate use
TOTAL (maximum 100) 0
Marker’s initials: _________________________ Date:  _________________

Markers general comments and feedback

Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

  1. Your web design consultancy company has been invited to tender for the design of a web site for a newly formed business/organization.
  2. As part of the tender process you are required to present a proposal to the management team of the company.
  3. If your proposal is eventually accepted, you will be asked to develop a prototype of your design in WordPress in Assignment 2.
  4. The client’s business category/model will be supplied to you via email in the first week of the semester (along with your cloudaccess.net/WordPress credentials).
  5. Your design proposal MUST address the specific and unique needs of the business category/model you have been assigned. You are also required to ensure that both your Assignments 1 and 2 meet the criteria to be classed within, and is directly related to, the business category assigned to you. Failure to do so will result in your assignments being rejected and no marks will be allocated to them.
  6. You have been asked to do some preliminary research into the needs of the company and then demonstrate your capabilities and what you and your company can offer.
  7. Your company has been told from the outset that the website must incorporate a high-end and responsive web design that provides a great user experience while creating an atmosphere of trust and professionalism.
  8. You sent the management of the business a questionnaire and interviewed them for more information about the project and their requirements.
  9. You analysed the information they provided and promised to send them a proposal in the next few days.

 

  1. Prepare a professional web design and development proposal in the form of a PowerPoint presentation (16-30 slides) that will inform and impress the client.
  2. Include speaker’s notes for each slide, as well as images, graphics, tables, animations, etc. where appropriate.
  3. Do not include citations in your slides. Place all your sources of reference on your final slide.

 

Presentation Guidelines

 

Your PowerPoint presentation slides should include (but are not confined to):

  1. Title -. 0 slide
  2. Table of contents -. . 0 slide
  3. Preliminary research findings – 1 slide

Demonstrate that you know the client and you understand what they want. This is the first step in appealing to the client’s individual needs. 2 slide

  1. Your capabilities 2-slides
  • Present your capabilities by referring back to the client’s needs and state your relevant experience. 1 slide
  • Provide previous examples/references Major components -1 slide
  1. Web Design
  • Overall design strategy 1 slide
  • Site name registration 1 slide
  • Site design, features and functionalities 1 slide
  • Content Management System 1 slide
  • Custom Programming 1 slide
  • Major web technologies 1 slide
  1. Web promotion, SEO and analytics 2-3 slide
  2. Website maintenance Costs and deliverables 1 slide
  3. Provide cost and deliverable information based on the information you have Propose a detailed timeline for the work. Contact information . 1 slide
  4. Conclusion References . 0 slide

 

Buy paper (Research Proposal)  on this assignment here (Email us: writersestate@gmail.com)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Page 2 of 2

Business/organization customizable electronic goods


Buy paper on this assignment here (Email us: writersestate@gmail.com)

Business/organization customizable electronic goods

  1. Your web design consultancy company has been invited to tender for the design of a web site for a newly formed business/organization.
  2. As part of the tender process you are required to present a proposal to the management team of the company.
  3. If your proposal is eventually accepted, you will be asked to develop a prototype of your design in WordPress in Assignment 2.
  4. The client’s business category/model will be supplied to you via email in the first week of the semester (along with your cloudaccess.net/WordPress credentials).
  5. Your design proposal MUST address the specific and unique needs of the business category/model you have been assigned. You are also required to ensure that both your Assignments 1 and 2 meet the criteria to be classed within, and is directly related to, the business category assigned to you. Failure to do so will result in your assignments being rejected and no marks will be allocated to them.
  6. You have been asked to do some preliminary research into the needs of the company and then demonstrate your capabilities and what you and your company can offer.
  7. Your company has been told from the outset that the website must incorporate a high-end and responsive web design that provides a great user experience while creating an atmosphere of trust and professionalism.
  8. You sent the management of the business a questionnaire and interviewed them for more information about the project and their requirements.
  9. You analysed the information they provided and promised to send them a proposal in the next few days.

 

  1. Prepare a professional web design and development proposal in the form of a PowerPoint presentation (16-30 slides) that will inform and impress the client.
  2. Include speaker’s notes for each slide, as well as images, graphics, tables, animations, etc. where appropriate.
  3. Do not include citations in your slides. Place all your sources of reference on your final slide.

 

Presentation Guidelines

 

Your PowerPoint presentation slides should include (but are not confined to):

  1. Title -. 0 slide
  2. Table of contents -. . 0 slide
  3. Preliminary research findings – 1 slide

Demonstrate that you know the client and you understand what they want. This is the first step in appealing to the client’s individual needs. 2 slide

  1. Your capabilities 2-slides
  • Present your capabilities by referring back to the client’s needs and state your relevant experience. 1 slide
  • Provide previous examples/references Major components -1 slide
  1. Web Design
  • Overall design strategy 1 slide
  • Site name registration 1 slide
  • Site design, features and functionalities 1 slide
  • Content Management System 1 slide
  • Custom Programming 1 slide
  • Major web technologies 1 slide
  1. Web promotion, SEO and analytics 2-3 slide
  2. Website maintenance Costs and deliverables 1 slide
  3. Provide cost and deliverable information based on the information you have Propose a detailed timeline for the work. Contact information . 1 slide
  4. Conclusion References . 0 slide

 

Buy paper on this assignment here (Email us: writersestate@gmail.com)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Task 2 Specifications – Analyze SAP Security Audit Log Data.


ORDER NOW your custom paper to have it completed successfully on time.
Buy research paper on this assignment here (Email us: writersestate@gmail.com)

 

Task 2 Specifications – Analyze SAP Security Audit Log Data.

 

Userdata.xls is a spreadsheet log file containing summarized records of user activity on a client’s SAP R/3 system. Each record contains the following fields: Field Description
USERID USERID identifies an unique user
YYYYMM YYYYMM describes when the user action took place. YYYYMM is useful for summarising user activity by month.
TCODE TCODE refers to the transaction (option on the menu) performed by the user.
TEXT TEXT describes the outcome of the transaction action, including its success or failure. Some tcodes are blank.
TCODESTAT TCODESTAT is an invented transaction code for each action indicating whether the action was successful (-0) or failed (-1).
TCD TCD is the same as TCODESTAT, except there is no -0 or -1.
TSTATUS TSTATUS indicates whether the action was successful or not (0/1).
TCOUNT TCOUNT is the number of times the user has performed this action, with this outcome, in the month YYYYMM.
TTEXT TTEXT is the narrative description of the TCODE.

 ORDER NOW your custom paper to have it completed successfully on time.

Task 2 Requirements

Use a software of your choice (spreadsheet, database, statistical package etc) to analyze the provided SAP Security Audit Log File (Userdata.xls), and generate the required eight user activity reports listed below and provide a brief description for each user activity report (About 500 words in total for all eight required reports/graphs) (hint this assignment 2 task 2 is best done using MS Excel pivot tables or Microsoft Access database SQL queries). The required eight user activity reports are:

 

  1. Alphabetic list of all actions and their frequency by any selected user, e.g. USER-040.
  2. List of users performing unsuccessful activities.
  3. List of transaction codes performed, with their frequency by each user.
  4. List of users engaging in security-related actions.
  5. Top 10 users in terms of frequency of activity.
  6. List of users who are dormant – in the range USER-001 to USER-050.
  7. You should also produce at least 2 reports or charts based on any of the above previous reports that summarise user activity over time using YYYYMM date format.

 ORDER NOW your custom paper to have it completed successfully on time.

TASK 3 Specifications – Analyze and discuss SAP System-Wide Security Settings.

You are required to review the system-wide security settings on a SAP R/3 system. The data file SAP_RSPARAM_Basis.xlsx contains an extract from the client’s system. Note you should open this file using an excel spreadsheet to view the system-wide security settings so the fields are aligned correctly. Hint you can use the search function to locate the appropriate SAP system wide security settings and their related values in the data file SAP_RSPARAM_Basis.xlsx. Note you will need to research the relevant SAP System Security literature in order to determine what are recommended values for each SAP System Security Setting.

Task 3 Requirements complete the following sub tasks:

Task 3a) For each SAP System Security Setting listed in Table 1 complete the User Defined Value, System Default Value and Recommended Value based on your analysis of the SAP_RSPARAM_Basis.xlsx file and the relevant SAP System Security Literature.

 

Table 1 SAP System-Wide Security Settings User-Defined Value System Default Value Recommended

Value

User-Defined Value
No auto user SAP* 0 0 0 0
Failed logins to end 0 3 3 0
Failed logins to lock 5 5 5 5
Auto failed unlock 0 0 1 0
Min password length 0 6 7 0
Password expiry (days) 0 0 40 0
Idle Screen logout (seconds) 1800 1800 900-1200 1800
No check on Tcodes 0 0 Y 0
Login client No 100 100 100 100

 

Task 3b) Provide a written evaluation of each SAP System Security Setting, in terms of User Defined Value, System Default Value and Recommended Value in the completed Table 1, describing the SAP System security setting, highlighting any weaknesses exist and if so provide recommendations for improving the current SAP System Security Setting. Your discussion here should be supported by appropriate in-text references (1000 words approx). Note some relevant literature resources on SAP System Security Settings will be provided in Tutorials and Assignment 2 discussion forum.

 

1.      No auto user SAP*
2.      Failed logins to end
3.      Failed logins to lock
4.      Auto failed unlock
5.      Min password length
6.      Password expiry (days)
7.      Idle Screen logout (seconds)
8.      No check on Tcodes
9.      Login client No

 

Buy research paper on this assignment here (Email us: writersestate@gmail.com)
ORDER NOW your custom paper to have it completed successfully on time.

CIS30111 Project Specification


Buy Report on CIS30111 Project

CIS30111 Project Specification

The project is about the non- profit organisation the organization is AKSHYA foundation this foundation accepts the donations from the sponsors and help the poor for the studies

Report Structure

Report contains all of the required parts listed below:

  • Letter of Transmittal
  • Report Title Page
    • Team Name
    • All students’ names and student numbers
  • Executive Summary
  • Table of Contents
  • List of References

Project Schedule

Project Schedule with project’s tasks, major milestones and timetable.  Tasks are broken down into relevant subtasks which are allocated to individual members.   Schedule also clearly identifies ALL student activities, personal or school/work related, which will impact on the project.

Project Background

Provide the context in which the project exists.  If the project is for a specific organisation, discuss the organisations background first and then discuss the project within the context of the organisation.  This section must provide a sufficient briefing on the project background and any technology it incorporates such that the reader will understand the context and importance of your project.  Remember, do not assume any prior technical knowledge.  All technical terms must be explained and all acronyms defined.

Purpose of App

Describe the purpose of your project.  Explain to your reader what problem(s) you are trying to solve and why it is important to do so.  Keep in mind that the purpose of the report you are writing is to persuade whoever you need to fund your project, that your project is worth funding from a ‘Why should I care?’ point of view and also for the anticipated intrinsic and intangible benefits gained by the organisation due to the deployment of  your application.

Problem Solution

Discuss how you plan to address the problem outlined above.  Make sure you clearly describe how your proposed solution will address the problems(s) you’ve discussed.

CIS30111 Project Specification Marking Criteria

 

Report Structure   / 10
Professional appearance   / 5
Written Presentation   / 15
Executive Summary   / 10
Project Background   / 10
Purpose of App   / 10
Problem Solution   / 10
Project Schedule   / 20
PENALTIES    
Original Project/

Non- profit Organisation

  -25

 

TOTAL    
Comments:

 

 

 

Report Structure 10  
  /5 HD [5] A [4] B [ 3]: C [2] F [0]
    Report contains all of the required parts listed below:

·         Letter of Transmittal

·         Report Title Page

o    Team Name

o   All students’ names and student numbers

·         Executive Summary

·         Table of Contents

·         List of References

·         Appropriate use of Appendices [optional]

Letter of Transmittal /5 HD [5] A [4] B [ 3]: C [2] F [0]
See guidelines and example in the Communications Skills Handbook   □       The letter meets all formatting requirements.

□       Body of letter meets all content requirements: positive opening, a further explanation, and a goodwill message.

□       The letter meets most formatting requirements.

□       Body of letter meets most content requirements: positive opening, a further explanation, and a goodwill message.

 

□       The letter meets some formatting requirements.

□       Body of letter meets some content requirements: positive opening, a further explanation, and a goodwill message.

 

□       The letter meets few of the formatting requirements.

□       Body of letter meets few of the content requirements: positive opening, a further explanation, and a goodwill message.

□       The letter was either missing or incomplete or unsuitable.

 

Professional appearance 5  
  / 5 HD [5] A [4] B [ 3] C [2] F [0]
See guidelines in the Communications Skills Handbook   □       Appropriate use of Headers and/or Footers.

□       Page numbers match the Table of Contents and are numbered appropriately (roman numerals for executive summary, etc)

□       Headings and Sub-headings should be numbered per Table of Contents example 2., 2.1, 2.1.1

Written Presentation 15  
  / 15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
Overall mark for this section    
Writing style is tailored for the intended audience.   HD A B C F
    □       Writing style is consistent throughout report.

□       Writing style is specifically tailored for the intended (non-technical) audience.

□       Writing style is mostly consistent throughout report.

□       Writing style is mostly tailored for the intended (non-technical) audience.

□       Writing style is sometimes consistent throughout report.

□       Writing style is sometimes tailored for the intended (non-technical) audience.

□       Writing style is rarely consistent throughout report.

□       Writing style is rarely tailored for the intended (non-technical) audience.

□       Writing style is inconsistent or non-existent throughout report.
Clear and appropriate paragraphing   HD A B C F
    □       All paragraphs are appropriately structured so each contains a single topic, and  evidence and argument within them are logically ordered. □       Paragraphs are mostly appropriately structured so that each contains one topic and evidence and arguments within them are logically ordered. □       Paragraphs generally contain a single topic with related evidence and argument.

□       Some are less well developed (fragments) or have more than one topic (overly long).

□       Paragraphs show some arrangement into related ideas but the topic is implicit or unclear.

□       Paragraphs tend to be fragmentary or overly long.

□       Paragraph topics are unclear and there is little structure for ideas.  

□       Paragraphs are generally fragmentary or overly long.

Grammar, punctuation, spelling   HD A B C F
    □       Your paper is free of grammatical and syntactic errors and demonstrates clarity, and sophistication, of expression. □       Only a few grammatical or syntactic errors with generally clear written expression. □       Some grammatical and syntactic errors but not so many so as to significantly affect the clarity of your written expression. □       Significant evidence of grammatical and syntactic errors, which has affected the clarity of your written expression. □       You have made many grammatical and syntactic errors, so your written expression is difficult to follow.
Appropriate in-text referencing   HD A B C F
    □       In-text references skilfully integrated into the essay in a way that increases its authority. □       All research appropriately referenced but some awkward instances. □       Most ideas/evidence is reference but there are gaps or too much reliance on direct quotes. □       Only some ideas are referenced;

□       Too much reliance on direct quotes for issues and concepts;

□       Only direct quotations referenced.

□       Few (if any) referenced ideas, facts or opinions.
Appropriate reference list   HD A B C F
    □       Fully compliant with current Harvard system. Few (if any) errors. □       Compliant with Harvard system, with some errors. □       Broadly compliant but inconsistent use of Harvard format.

□        Missing page numbers.

□       Non-Harvard system used and/or many errors are present.

□       No consistent referencing standard applied.
Project elements 70  
Project Schedule /20 HD [20 – 16.5] A [16 – 14.5] B [ 14 – 12.5]: C [12 – 5] F [10 – 0]
    □       Project Schedule with project’s tasks, major milestones and timetable.  Tasks are broken down into relevant subtasks which are allocated to individual members.   Schedule also clearly identifies ALL student activities, personal or school/work related, which will impact on the project.
Executive Summary /15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
See guidelines in the Communications Skills Handbook   □       The executive summary is an appropriate length (10% under or over inclusive).

□       The summary meets all formatting requirements.

□       The summary meets all content requirements: purpose, analysis, findings, and recommendations.

□       The executive summary is an appropriate length (10% under or over inclusive)..

□       The summary meets most formatting requirements.

□       The summary meets most content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary is an appropriate length (10% under or over inclusive)..

□       The summary meets some formatting requirements.

□       The summary meets some content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary is slightly over or under the required length (exceeding 10%).

□       The summary meets few of the formatting requirements.

□       The summary meets few of the content requirements: purpose, analysis, findings, and recom-mendations.

□       The executive summary was either missing or incomplete or unsuitable.

 

Project Background /15 HD [15 – 12.75] A [12.5 – 11.25] B [ 11 – 9.75]: C [9.5 – 7.5] F [7 – 0]
    Provide the context in which the project exists.  If the project is for a specific organisation, discuss the organisations background first and then discuss the project within the context of the organisation.  This section must provide a sufficient briefing on the project background and any technology it incorporates such that the reader will understand the context and importance of your project.  Remember, do not assume any prior technical knowledge.  All technical terms must be explained and all acronyms defined.
Purpose of App /10 HD [10 – 8.5] A [8 – 7.5] B [ 7 – 6.5]: C [6 – 5] F [4.5 – 0]
    Describe the purpose of your project.  Explain to your reader what problem(s) you are trying to solve and why it is important to do so.  Keep in mind that the purpose of the report you are writing is to persuade whoever you need to fund your project, that your project is worth funding from a ‘Why should I care?’ point of view and also for the anticipated intrinsic and intangible benefits gained by the organisation due to the deployment of  your application.
Problem Solution /10 HD [10 – 8.5] A [8 – 7.5] B [ 7 – 6.5]: C [6 – 5] F [4.5 – 0]
    Discuss how you plan to address the problem outlined above.  Make sure you clearly describe how your proposed solution will address the problems(s) you’ve discussed.
  /100 TOTAL MARKS

 

IT Paper


IT Paper

If you have not installed Microsoft Visual Studio Software in a prior course, follow these instructions for installation steps.
Download the provided Unit2.zip document and save it to your computer. Click here to download the Unit2.zip document.
Right-click the Unit2.zip folder and Extract All.
Open Visual Studio and select File > Open Web Site from the menu.Navigate to the extracted Unit2 folder and select it to open the Website in Visual Studio.
Select Website > Add New Item from the menu and select Style Sheet from Add New Item dialog box. Name the style sheet Unit2.css.
Add style rules to Unit2.css to accomplish the following:
Ensure that the semantic elements format in older browsers.
Eliminate the default spacing around all elements.
Use the Verdana font or any available sans-serif font for the text.
Set the font size for the body to 80% of the browser’s default font size.
Set the width of the window to display the document to 700.
Center the text in the header.
Provide spacing at the top of the level-one heading in the header to the equivalent of one capital M without affecting the spacing of the image.
Set the font size for the level-one heading in the header to three times the browser’s default font size.
Display the image in the header to the right of the text.
Ensure the text of the section does not flow around the image in the header.
Display the image in the first paragraph to the left of the text.
Set the font size for the level-one heading in the section to two times the browser’s default font size.
Center the text in the level-one heading in the section.
Provide spacing at the bottom of the level-one heading in the section to the equivalent of one capital M.
Set the font size for the level two headings in the section to one and one-half times the browser’s default font size.
Center the text in the level two headings in the section.
Center the text in the navigation.
Provide spacing at the bottom of the navigation to the equivalent of two capital Ms.
Bold the text of a hyperlink when the user hovers over the hyperlink or a hyperlink gets the focus.
Set the text of a hyperlink to red when the user hovers over the hyperlink or a hyperlink gets the focus.
Display the footer on the right side of the page.
Set the font size of the text in the footer to 75% of the browser’s default font size .
Validate the CSS style rules.
Zip (compress) the Visual Studio project folder into a .zip file to submit.

CSEC 630 FINAL Exam. Cyber Security Action Plan


CSEC  630 FINAL  Exam

Order Now for a complete custom paper on this assignment. (Email us: support@customwritings-us.com)

Cyber Security Action Plan

100 points

This examination is worth 20 percent of your total grade. There are five semi open ended questions (worth 70 points) along with an accompanying cyber security action plan template (worth 30 points). You are to answer each of the five questions and to complete the Cyber Security Action Plan template based on best practices and your understanding of the case.

Please refer to the FAQ concerning the maximum length answer for each question You are not required to use APA formatting.  For the open ended questions you are to provide your answers immediately follow the question as follows:

  1. Describe…

Response

  1. Discuss…

Response

And so forth…

On the Cyber Security Action Plan template for each Action Plan item include your response. You can add additional space if needed.

——-

Sections in the Plan Description
Security risks Enumerates the types of security hazards that affect your enterprise.
Security strategies Describes the general security strategies necessary to meet the risks.
Public key infrastructure policies Includes your plans for deploying certification authorities for internal and external security features.
Security group descriptions Includes descriptions of security groups and their relationship to one another. This section maps group policies to security groups.
Group Policy Includes how you configure security Group Policy settings, such as network password policies.
Network logon and authentication strategies Includes authentication strategies for logging on to the network and for using remote access and smart card to log on.
Information security strategies Includes how you implement information security solutions, such as secure e-mail and secure Web communications.
Administrative policies Includes policies for delegation of administrative tasks and monitoring of audit logs to detect suspicious activity.

—————————————————————————————————

ABC HEALTHCARE CASE BACKGROUND

Healthcare companies, like ABC Healthcare, that operate as for-profit entities, are facing a multitude of challenges. The regulatory environment is becoming more restrictive, viruses and worms are growing more pervasive and damaging, and ABC Healthcare’s stakeholders are demanding more flexible access to their systems.

The healthcare industry is experiencing significant regulatory pressures that

mandate prudent information security and systems management practices.

Furthermore, the continued pressure to reduce cost requires that management

focus on streamlining operations, reducing management overhead and

minimizing human intervention. The regulatory focus at ABC Healthcare is on the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX). Both pieces of legislation highlight the need for good systems administration and controls, but focus on different aspects of the business. The main focus of HIPAA is to protect personally identifiable health information while SOX is concerned with data that impacts financial reporting. Violations may be met with both civil and criminal penalties. Therefore, the company must be ever watchful of new threats to their systems, data, and business operations.

The most prevalent security related threat to on-going business operations is the

continued development and propagation of viruses and worms. Virus and worm

prevention or containment is a vital component to the overall risk mitigation

strategy. Virus and worm outbreaks have multiple cost aspects for the company

including lost patient charges due to system unavailability, lost productivity

because of recovery efforts due to infection, and potential regulatory impacts

depending on the virus or worm payload. However, the company must balance

risk with opportunities in order to serve the stakeholders and grow the business.

ABC Healthcare’s stakeholders include multiple groups that depend on or need access to clinical and/or financial systems in order to help support and grow the company. The access requirements and associated risk model varies by user group. The main access groups are internal only users (i.e. nurses, hourly employee, etc.),

internal/remote users (i.e. salaried employees, doctors, etc.), and business

partners (i.e. collection agencies, banks, etc.). Risk mitigation solutions must be

developed for each user group to help ensure that the company recognizes the

benefit that each group brings and to minimize the risk to business operations.

The high-level management goals of the network design implementation are as

follows:

  • Support the business and balance security requirements without introducing significant overhead and complexity;
  • Maintain and enhance security without significantly increasing management overhead or complexity;
  • Implement systems that are industry supported (standards where appropriate), scalable, and fault-tolerant;
  • Ensure that the design is implemented to help ensure compliance with any and all applicable regulations;
  • Proper management of access control for legitimate users and malicious users is of the utmost importance for the security of the ABC Healthcare management system. The threat is not limited to outside malicious users but also legitimate users engaged in illegitimate activity.

Based on the above description you are to provide a recommendation of how you would address each of the following ABC Healthcare’s computer network security requirements. Note, whereas cost is typically an important factor, this is not a consideration for this case analysis. Therefore, you do not need to include cost estimates. Your solution should have the “right feel”, despite the lack of depth or details necessary to be accepted by upper management.  Be specific in your answers.  Write them as if you were writing a proposal to your boss.  Since you are developing a solution to a specific circumstance, material that is copied from an outside source will not likely fit so everything should be in your own words.

  1. Describe your technical recommendation for addressing the security requirements in the overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects. Untrusted would include user connectivity to the Internet. The “trusted” network has the main purpose of supporting the business functions of known entities (i.e. partners, suppliers, etc.) which have a business relationship with the company. Note that you are toconcentrate on the physical and logical level, including the type of hardware  and software, however you are not expected to provide specific low level details in terms of equipment suppliers or model numbers, etc. for your recommended design.  (30 points)
  1. Discuss the way you will address requirements for system monitoring, logging, auditing, including complying with any legal regulations. (10 points)

 

  1. Describe how the system will identify and authenticate all the users who attempt to access ABC Healthcare information resources. (10 points)
  1. Discuss how the system shall recover from attacks, failures, and accidents. (10 points)
  1. Discuss how the system will address User Account Management and related security improvements. (10 points)

 

  1. Complete the Cyber Security Action Plan template (30 points)

Order Now for a complete custom paper on this assignment. (Email us: support@customwritings-us.com)

%d bloggers like this: