Practical Connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements: 

Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. 

Subject: Project risk & Quality management
Working as a supply chain consultant in an automovtive compamany. so something relatible can be written.

Report Paper

Summarise the response in the Discussion thread in the attached file using the template below

 

Discussion Thread 1

Title:

… Article Summary …

… Summary of Individual Postings…

… Final Opinion…

Computer 5

What are some of the latest advances in encryption technologies? Conduct some independent research on encryption using scholarly or practitioner resources, then write a two pages paper that describes at least two new advances in encryption technology.

  • Prepare a summary of issues related to Encryption Technology. 
  • Consider and discuss:
    • the impact of encryption on organizations and society
    • regulations/laws/standards related to encryption
    • limitations and issues
    • Be sure to give attribution to your sources.

Computer 4

In this week’s chapter we learned about the information security triad, security tools, and how to secure yourself digitally. Thinking about your own security, and maintaining good passwords, keeping software up to date, etc., we should also discuss the security risks associated with social media.

With online activity, one may be curious about privacy. For example, many folks probably use Facebook, YouTube, WhatsApp, Instagram, Snapchat, etc. Have you viewed and of these sites’ privacy pages recently?

Write 1 page to answer questions below:

  • Do you own your “personal data”?
  • Is it easy to be anonymous online?
  • Do you have any other thoughts or concerns around online privacy related to social media or other technology? 
  • Name at least one online privacy regulation, standard, or law. What are your thoughts on this?
  • Was there anything surprising or interesting about the privacy policy of any of the social media platforms listed?

Computer 3

Write 2 pages

Imagine you are an Information Technology professional that has been at your job for 4 years. Your boss has just asked you to find a cloud based Data Warehouse colocation center that your company can use to house all of its data that comes in from all company information systems.  

  1. Please search the web to find 2 Data Warehouse choices to present to your boss.
  2. Include the following: name of the data centers and web addresses.
  3. Include a list of main features that each one has.
  4. Include any other determining factors (pros/cons) 
  5. In addition to this information, include a 1-2 paragraph business case of why you think each one would be a good fit for your company.  
  6. Remember: you are trying to convince your boss to choose one of the options you have researched, so be clear, concise, convincing, and make it visually appealing.

Discussion 300 words

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?