After reading about Business Processes think of a business of your choice. Think of the processes such as: taking an order, filling the order, and receiving payment.
Create a basic flowchart showing the high level steps used. Then create a second flowchart indicating where you would recommend improvements to the processes. Add a short 1 paragraph explanation of why you think your new process is improved.
Optional ideas to create your flowchart include Smart Art in PowerPoint, Word, Excel, or Google drawings/shapes in a Google document or similar software of your choice.
Initial post should be based upon the assigned reading for the week, so the textbook must be the only source utilized and listed in your reference section (and properly cited within the body of the text). Other sources are not required and are a waste of time to search and utilize. Only use the textbook.
Do not provide a Reflection or Chapter Overview. Provide only a graduate-level response to each of the following questions:
1) Thoroughly define and discuss the four different roles that are assigned in a RACI Chart. Why does at least one person/need to be Responsible for an Activity? Why is it necessary to have only one person assigned Accountability for an activity? What would be the issue if a person was assigned two roles (i.e., Responsible and Accountable or Accountable and Consult)?
Your post must be substantive and demonstrate insight gained from the course material.
Title: Contemporary Project Management
Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells
Publisher: Cengage Learning
Publication Date: 2018-02-08
Answer the following in an 1h30 mins
1 Differentiate between project and process management. 25pt
2 Describe the basic competencies required of project managers as defined in the Project Management Body of Knowledge (PMBOK) created by the Project Management Institute. 25pt
3 Describe the basic functions of project management. 25pt
4 Describe systems operation, support, and security issues in the SDLC.
Sherwood Associates is an IT consulting firm that develops new systems and maintains older systems for its clients. Sherwood recently was hired to address security concerns regarding an existing system that was developed by another firm. The client is concerned about the security of customer information. They recently terminated several employees for poor performance and are worried that confidential data might have been compromised. Also, after an extensive audit, several laptops seem to be missing:
What IT security measures should the firm adopt? Prepare a security checklist, and be sure to consider all six security levels.
Regarding physical security, how will these security measures impact the operation of the system and necessary supports? 25 pts
Case 1: Determining Software Engineering Risks for Alexander Rocco
After reviewing all the applications Alexander Rocco uses, you notice that many have been modified or changed during the past couple of months. Two of the company’s financial applications are written in C and, according to Randy Stegner, the IT security administrator, monitor the company’s accounts and financial data. Mr. Stegner discovered that several modifications were made to one program, with no documentation indicating who made the changes or why.
a. Based on this information, write a memo to Mr. Stegner with your findings and any recommendations you might have for improving the security of the company’s software engineering practices.
b. Search the Internet for any information on securing company software. Does the OSSTMM address any of these issues?
c. What improvements should you recommend to better protect this information?
Case 2: Developing a Security-Testing Tool
Your manager at Security Consulting Company has asked you to develop a tool that can gather information from several hundred computers running Windows 10 at Alexander Rocco. The tool needs to verify whether any computers are left running at certain hours in the evening, because management has requested that all computers be turned off no later than 6:00 p.m.
a. Write a memo to your supervisor describing the programming language you would use to develop this tool and the method for verifying the information Alexander Rocco management requested.
Case 3: Securing an Older Linux OS
After conducting footprinting and using social-engineering techniques on the Alexander Rocco network, you have determined that the company is running several applications on Linux computers. You also discover that the payroll system runs on several Red Hat Enterprise Linux 5.8 (RHEL 5.8) servers. You need to ensure that this version will be supported with patches from the vendor until the new payroll system is installed in 2017.
a. Based on this information, write a brief report stating whether the systems can be secured until they’re replaced in 2017, and include recommendations for securing these systems.
Case 4: Detecting Unauthorized Applications
In conducting a review of the OSs running on the Alexander Rocco network, you detect a program that appears to be unauthorized. No one in the department knows how this program got on the Linux computer. The department manager thinks the program was installed before his start date three years ago. When you review the program’s source code, you discover that it contains a buffer overflow vulnerability.
a. Based on this information, write a report to the IT manager stating what course of action should be taken and listing recommendations for management.
Case 5: Validating Password Strength for Alexander Rocco Corporation
After discovering that most computers and servers at Alexander Rocco run many different versions of Windows, your supervisor has asked you to write a report on the issue of password vulnerabilities.
a. Write a one-page memo to your supervisor describing the password-cracking areas you will test. Your memo should be based on the information you find in Section 11, “Password Cracking,” of the OSSTMM.
Which ERP is the best? Do some original internet research and compare two leading ERP systems to each other.
Write 1 page:
The offerings of each ERP and what type of business they might best serve
Cost to implement and maintain (if you can find this information)
Is there any companies that use these ERPs that you can use as an example? (ie. Starbucks Oracle Customer Spotlight (Links to an external site.))
Is there anything unique about these ERPs?
Be sure to give attribution to your sources.
Write 1 page:
Information systems are integrated into all components of business today, but can they bring competitive advantage? Over the years, there have been many answers to this question.
Describe some examples of information systems that have provided businesses with a competitive advantage.
Why do you think this company succeeded or failed?
How do you think the company in your example has or will continue to thrive?
Remember based on our reading, a strategic information system attempts to do one or more of the following:
Deliver a product or a service at a lower cost;
Deliver a product or service that is differentiated;
Help an organization focus on a specific market segment;
Here are some examples of information systems that fall into this category.
Business Process Management Systems
Electronic Data Interchange
Download and read the document and answer all questions in the document. Please see attached document H7 & APA Criteria doc.
1. at least 2~3 pages of study report (cover page is not countable).
2. Required (if you cannot do the simulation, at least have article review, but please do not have any plagiarize issue)
(1) Use Microsoft Access, MySQL, SQLite, or any available one, no matter commercial/freeware/online to create database, tables, and configuration of the management system.
(2) demonstrate the creation, processes, and configuration info in your report by using screenshot or substitute method to display your process/result.
OverviewEthical questions and dilemmas frequently occur during scientific resea
(3) please also have a short introduction of the used tool and a short concluding in your report.
free tool reference website: https://www.w3resource.com/index.php
If you use Mac, you may install some freeware from https://business.tutsplus.com/articles/best-free-open-source-mac-database-software-2018–cms-31480.
If you can not get any available software for installing and have simulation, you can have some related article review for substitution. It is acceptable, too.
Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic
Please review this article and write a one-page summary of it.