Create a report on which team members developed each part. Group Project things

Create
a report on which team members developed each part.
Group
Project things to do: Create table, add integrity, primary keys, foreign keys,
and start inserting data.
We need to
define the relationship between Orders Tables and Pizza and Nonpizza Tables
(including all sub-Tables) to ensure data flows appropriately.
Team lists of tasks
designated for each person. Please insert the data in the table assigned to
you.
Shamyog: Pasta, Sauces, Chips, Fountain_Drinks
Yasmin: Specify the relationship between each table and make
sure Primary Keys and Foreign Keys specified based on the relationship
Ahmed: Customers, Pizza_Toppings, Sizes, Store,
and Pizza
Wenjian: Pizza_Toppings, Toppings,
and Employees, Cookies
Kevin: Orders, Chicken_Wings, Toppings, Cheese_Breads,
Crust
Alana: You will ensure all parts flow well when
it is submitted.
Alana creates
a report who developed each part of this experience.

Assignment Details: It is time to consider how you will approach the development

Assignment Details:
It is time to consider how you will approach the development or acquisition of the application or system that you have designed.
For this assignment, you will develop 2 proposals for your development strategy: (1) outsourcing (buy), and (2) insourcing (make). You will present the pros and cons of each. Finally, you will make a recommendation on which is the best proposal or strategy.
In a 3-5 page paper, complete the following:
Development Strategy
Develop a proposal for each of these approaches: insourcing, outsourcing, and a combination of the two.
Present the pros and cons or benefit analysis for each of the 3 proposals.
Recommend 1 of these proposals and your reason for selection of that proposal.
Name the document “yourname_IT425_IP4.doc.”
Individual Project Rubric
The Individual Project (IP) Grading Rubric is a scoring tool that represents the performance expectations for the IP. This Individual Project Grading Rubric is divided into components that provide a clear description of what should be included within each component of the IP. It’s the roadmap that can help you in the development of your IP.
Expectation Points Possible Points Earned Comments
Insourcing approach: students are expected to propose and insourcing approach and present the pros and cons of this approach
25
Outsourcing approach: students are expected to propose and Outsourcing approach and present the pros and cons of this approach
25
Combination approach: students are expected to propose and Combination approach and present the pros and cons of this approach
25
Recommendation and reasoning: students are expected to recommend 1 of these proposals and a reason for selecting of that proposal.
25
Organization: Assignment presents information logically and is clearly relevant to discussion topic.
15
Professional Language: Assignment contains accurate grammar, spelling, and/or punctuation with few or no errors. (APA formatting is required or style specified in assignment).
10

Key Assignment Draft The project is going well so far, and the analysis and disc

Key Assignment Draft
The project is going well so far, and the analysis and discussion of the vulnerabilities was well-received. You realize that when vulnerability scanning takes place, employees need to know what the expectations are for handling the findings. You want to ensure that the policies and expectations for action are in place. Discuss the following:
The purpose of a policy
Create a policy for your organization that will cover one of the following (choose just 1):
Intrusion Detection
Incident Handling
Vulnerability Assessment and Handling
Add the discussion about the definition of a policy and the sample policy to the section titled: Intrusion Detection System Policies.

This assignment has 2 sections each section should have 200-225 words totally 40

This assignment has 2 sections each section should have 200-225 words totally 400-450 words answering the questions. The references are below
Section 1 – Describe a simple 4-step decision-making process to use in determining appropriate risk countermeasures, mitigation, or cost strategies. Discuss how ethics apply within this process. Discuss challenges that can arise throughout this decision-making process, and explain how you would manage the challenges.
Section 2 – Many employees perceive information security as a hindrance to their productivity. How would you communicate the importance of information security to employees to enable them to aid in the managing of risks in the organization? Provide a specific example to illustrate your ideas.
Sources
1) – PDF attached – Wheeler, E. (2011). Security risk management: Building an information security risk management program from the ground up. Waltham, MA: Syngress. ISBN-13: 9781597496155
Building an Enterprise Security Program in Ten Simple Steps,” by Dattatreya, from CIO (2008).
URL:
http://www.cio.com/article/2432981/risk-management/building-an-enterprise-security-program-in-ten-simple-steps.html

The purpose of this project is to capture the components of an effective Informa

The purpose of this project is to capture the components of
an effective Information Security Management Plan.
This project is to
develop an Information Security Management Plan for a company of your choice.
It doesn’t need to be an actual company, but it should be a realistic one. You
will need to identify the size of a company: small, medium-sized, large
organization, or Government contracting company etc. Make sure you understand
the organization’s network structure, operators, and users.
As an IT team member in your company, it is realistic that
you will have a Security Management Plan that will require periodic review and
updating. Or worse case, your company does not have an official Security
Management Plan and acts on Best Practices, Carnal Knowledge, and or other
Ad-Hoc practices. Unfortunately, this happens more often than expected.
The paper should include biblical perspectives as a source as well.
Assignment requirements:
Your final submission should include at a minimum:
a) Cover page
b) Define information security management.
c) Describe the kinds of resources information security
management involves.
d) Apply topics covered in the course to your organization
choice to include:
i. Compliance: Laws & Ethics
ii. Strategic Plan &
Information Security Policy
iii. Program Roles iv. Risk
Management
v. Security Management Models and
Practices
vi. Contingency Plans
vii. Protection Mechanisms