amend your existing business analytics implementation plan developed in Module 3.

Assignment 2: LASA 2—Business Analytics Implementation Plan Part 2
Paper , Order, or Assignment Requirements

You began writing your business analytics implementation plan in Module 3. In addition, you already have gained information about the various technological solutions discussed in the previous modules. In this assignment, you will now address ways to implement the plan along with any associated costs, as this will complete the proposal for management to make their decision.
Description of LASA
In this assignment, you will amend your existing business analytics implementation plan developed in Module 3. You will amend the existing proposal to discuss the importance of managing information systems, describe the techniques and tools used to manage the data, and explain how utilizing technology can help the organization.
Scenario
You have been hired as a business analyst for a well-known design firm. Currently, they utilize technology for their day-to-day operations but not to analyze data that could help with making business decisions. Your task is to convince management that the usage of business analytics would be a great benefit to the business and it would help the business to make well-informed decisions and thus action plans that would align with the business’s strategic planning.
The firm currently has technology in place but does not have any connected systems. The databases are all independent of each other but they do utilize a client/server environment. The firm currently has one location but is looking to add a second location in another part of the state but is unsure about whether it would be beneficial to the firm.
**The firm liked your implementation plan but have questions about how they will manage the data and how data driven decision making can help the organization versus just being an additional expense for the organization (cost of new equipment or resources).
Instructions
Using the Argosy University online library resources and the Internet, research business analytics implementation plans, especially methods of developing a rationale in support of implementation. Select at least 6 scholarly sources for use in this assignment.
Amend your existing proposal addressing the importance of Management Information Systems and managing the data for the organization.
Objectives of proposals:
1. Revise the previous proposal based upon the comments from your instructor.
2. Explain the importance of MIS in relation to data-driven decisions.
3. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools.
4. Explain how the techniques and tools can be utilized to present data to management and other organizational decision makers. Be sure to include at least 3 innovative examples that follow current best practices for managing data.
5. Explain to management how the data can add value to the business in day-to-day operations as well as long-term strategic planning. Use examples to further demonstrate how value is added to an existing organization.
Write the paper from the perspective that it will be presented to the firm’s management team as you are trying to persuade them to utilize business analytics for data-driven decision making.
The paper should contain:
• Cover Page (update date)
• Table of Contents (auto-generated by Microsoft Word and updated)
• Introduction
• Implementation Plan (5–6 pages of content revised as per instructor feedback)
• Management Information Systems Section: (5–6 pages of new content)
o Importance of MIS
o Techniques and Tools Utilized Along with examples
o Added Value to Organization
• Conclusion
• References

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Identify at least five (5) potential physical threats that require attention.

IT professional in charge of security for a small pharmacy
Paper , Order, or Assignment Requirements

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.
1) Firewall (1)
4) Desktop computers (4)
2) Windows 2012 Active Directory Domain Controllers (DC) (1)
5) Dedicated T1 Connection (1)
3) File Server (1)
Write an eight to ten (8-10) page paper in which you:
1. Identify at least five (5) potential physical threats that require attention.
2. Determine the impact of at least five (5) potential logical threats that require attention.
3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.
4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.
5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Explain the role of access controls in implementing a security policy.
• Explain how businesses apply cryptography in maintaining information security.
• Analyze the importance of network principles and architecture to security operations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

: a design document and a revised Gantt chart or project plan.

Database and Programming Design
Paper , Order, or Assignment Requirements

This assignment consists of two (2) sections: a design document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
One (1) of the main functions of any business is to transform data into information. The use of relational databases has gained recognition as a standard for organizations and business transactions. A quality database design makes the flow of data seamless. The database schema is the foundation of the relational database. The schema defines the tables, fields, relationships, views, indexes, and other elements. The schema should be created by envisioning the business, processes, and workflow of the company.

Section 1: Design Document
1. Write a five to ten (5-10) page design document in which you:
a. Create a database schema that supports the company’s business and processes.
b. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.
c. Create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved.
d. Normalize the database tables to third normal form (3NF).
e. Create an Entity-Relationship (E-R) Diagram through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note:The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
f. Explain your rationale behind the design of your E-R Diagram.
g. Create a Data Flow Diagram (DFD) through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
h. Explain your rationale behind the design of your DFD.
i. Create at least two (2) sample queries that will support the organizational reporting needs.
j. Create at least two (2) screen layouts that illustrate the interface that organizational users will utilize.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
• Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Gantt Chart / Project Plan
Use Microsoft Project or an open source alternative, such as Open Project, to:
2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with all the project tasks.

The specific course learning outcomes associated with this assignment are:
• Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.
• Demonstrate the ability to evaluate organizational issues with integrative technological solutions.
• Apply integrative information technology solutions with project management tools to solve business problems.
• Use technology and information resources to research issues in information technology.
• Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Identify possible network infrastructure vulnerabilities.

Network Infrastructure and Security
Paper , Order, or Assignment Requirements

• This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.
Section 1: Infrastructure Document
Write a five to ten (5-10) page infrastructure document in which you:
1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
4. Create and describe a comprehensive security policy for the company that will:
o Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
o Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
o Section 2: Revised Project Plan
Use Microsoft Project to:
1. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.
The specific course learning outcomes associated with this assignment are:
 Describe the methods and best practices in implementing process change in IT organizations.
 Describe the role and methods of technology-induced process improvement in organizations.
 Use technology and information resources to research issues in information systems.
 Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Prepare a document that specifies the critical mission data that will need to be included in your Disaster Recovery Plan.

Networking and Storage
Paper , Order, or Assignment Requirements

Data recovery processes should reflect an organization’s information system priorities. As big data plays a mission-critical role in an organization, disaster recovery becomes more of a focal point. Data recovery activities should take place in a pre-planned sequential fashion so that system components can be restored in a logical manner and should take into consideration:
1. Personnel: The IS leadership and workforce members, as well as the SIRT members, involved in data recovery processes will be the most valuable resource. These individuals may be asked to work at great personal sacrifice and resources shall be provided to meet their personal and professional needs.
2. Communication: Notification of internal and external business partners associated with the organization’s information systems.
3. Salvage of Existing IS Equipment and Systems: Initial data recovery efforts shall be targeted at protecting and preserving the current media, equipment, applications and systems. A priority shall be to identify and obtain storage media. The IS equipment shall be further protected from the elements or removed to a safe location, away from the disaster site if necessary (Alternative Sites).
4. Designate Recovery Site: It will be necessary to determine if the data recovery efforts can be carried out at the original primary site or moved to another location (see Command Recovery Center Alternative Site section). The choice of using an internal or a remote site will be dependent on the damage and estimated recovery of the computing and networking capabilities.
5. Backup/New Equipment: The recovery process will rely heavily on the ability of the organization’s vendors to quickly provide replacements for the resources which cannot be salvaged. Emergency procurement processes will be implemented to allow the IS leadership to quickly replace equipment, supplies, software and any others items required for data recovery.
6. Reassembly Process: Salvaged and new data recovery equipment and components shall be reassembled at the recovery site to begin data recovery processes.
7. Restoration of Data from Backups: Data recovery will rely on the availability of the backup data from the storage site. Initial data recovery efforts will focus on restoring the operating systems by pre-determined priority.
8. Restoration of Applications Data: IS leadership will work with the individual departments/application owners to restore each running application. As a period of time may have elapsed between the time that the backups were made and the time of the disaster requiring data recovery, the application owners must address mechanisms to capture and restore the lost interim data.
9. Move Back to Restored Permanent/Primary Site: If the data recovery process has taken place at an alternative site, the equipment and systems that have been assembled at the alternative site will need to be returned to the original site when available.
Directions: Prepare a document that specifies the critical mission data that will need to be included in your Disaster Recovery Plan. This document will become part of the larger developed plan that you will create throughout the term. You may need to perform a web-based search for a Disaster Recovery Plan template using a search engine like Google or Bing to help you determine what the plan will look like in its final form.
In your document, make sure to:
• Specify the different types of mission-critical data that need to be procured. This may include information from sections A-I above depending on the organization you’ve chosen.
• Explain why these types of data are important for your organization.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Discuss the principles of data integrity, professional ethics, and legal requirements related to data security, regulatory requirements, confidentiality, and client’s right to privacy. (PO #6)

NR361 Telenursing: Is It in My Future?
Paper , Order, or Assignment Requirements

This assignment enables the student to meet the following course outcomes:
CO #2: Investigate safeguards and decision-making support tools embedded in patient care technologies and information systems to support a safe practice environment for both patients and healthcare workers. (PO #4)
CO #6: Discuss the principles of data integrity, professional ethics, and legal requirements related to data security, regulatory requirements, confidentiality, and client’s right to privacy. (PO #6)
Scenario
The following scenario serves as the basis for your paper:
You have worked with Tomika for the past five years. Tomika shares with you that she has resigned and plans to work in an agency that installs telemonitoring equipment into the homes of those with chronic illnesses. Nurses monitor the patients using the equipment with the goal of detecting problems before patients need to be readmitted to the hospital. Tomika will be working from her own home, with occasional meetings at the agency. She would not be visiting her patients in their homes, but rather would be assessing and interacting with them via videoconferencing.She tells you that there are still job openings and encourages you to apply.
You are intrigued by this, and decide to investigate whether telenursing would be a good choice for you, too. Is telenursing in your future?
Directions
1. You are to research (find evidence), compose, and type a scholarly paper that describes telenursing as described above, and whether it is a good fit for you. Reflect on what you have learned in this class to date about technology, privacy rights, ethical issues, interoperability, patient satisfaction, consumer education, and other topics. Your text by Hebda (2013, Chapter 25) discusses telehealth in detail. However, your focus should be from the professional nurse’s role in telenursing. Do not limit your review of the literature to only what you read in your text. Nurses in various specialties need to know about the advantages and disadvantages of telenursing as it applies to their patients. For example, when you discharge a patient from an acute care setting, will a telenursing service assist that individual with staying out of the hospital? You may need to apply critical thinking skills to development of your paper. In the conclusion of your paper, describe your current employment situation, and whether a job in telenursing would, or would not, fit with your career goals and life situation once you graduate from Chamberlain.
2. Use Microsoft Word and APA formatting to develop your paper. Consult the Publication manual of the APA, 6th edition if you have questions, for example, margin size, font type and size (point), use of third person, and so forth. Take advantage of the writing service, Smarthinking, which is accessed by clicking on the link called the Tutor Source, found under the Course Home tab. Also, review and use the various documents in Doc Sharing related to APA.
3. The length of the paper should be 4–5 pages, excluding the title page and the reference page. Limit your references to key sources.
4. The paper should contain an introduction that catches the attention of the reader with interesting facts and supporting sources of evidence, which need to be mentioned as in-text citations. Keep in mind that APA guidelines state you are not to call this an “Introduction” but you should include it at the beginning of your paper. The Body should present the advantages and disadvantages of telenursing from your perspective as an employee, and the patient’s perspective as a recipient of the care nurses provide. The Conclusion and Recommendations should summarize your findings and state your position on whether you will apply for a position with the agency.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

demonstrate how to use the scientific method to make decisions and solve problems in your field of study or everyday life.

Assignment 1: Applications of the Scientific Method
Paper , Order, or Assignment Requirements

The scientific method is useful in problem solving and decision-making in a wide variety of fields. In this assignment, you will demonstrate how to use the scientific method to make decisions and solve problems in your field of study or everyday life.
Identify a specific problem often faced in your field of study or everyday life. Research your problem and assess your data / research. Examples of such problems could be: 1.Business 1.Developing a new product that is superior to competitor’s brands; or 2.Establishing a price for a new product using the law of supply and demand;
2.Information Systems and Technology 1.The use of personal electronic devices for work purpose, or 2.Determining in the most cost-effective computer for your business;
3.Criminal Justice 1.The reliability of eyewitness testimony, or 2.Determining what evidence reveals to you about a crime;
4.Everyday Life 1.Selecting a particular brand of detergent, or 2.Determining the most cost-efficient transportation / route for your commute.
Write a three to five (3-5) page paper in which you: 1.Explain the scientific method and describe the overall manner in which you would apply it in your field of study or everyday life. 2.Propose one (1) testable hypothesis to explain / solve the problem you have selected. State the expected outcomes of your actions and include criteria for determining whether or not these actions would succeed. Note: Your hypothesis should be stated very precisely. 3.Describe the main actions that you intend to put into place to test the hypothesis that you proposed in Question 2. Describe the way in which you would evaluate the success of your program. Include the results that you would deem as a success and the results that would be considered a failure. 4.Discuss the wisdom behind the strategy you would use to test the hypothesis from Question 3, and describe the additional steps you might take, depending on the results of your test. Note: These additional steps might be to revise your original hypothesis (if the results were unsatisfactory) or to propose new hypotheses. The goal is to continuously improve your understanding of the factors influencing your outcomes, to be able to achieve greater results over time. 5.Use at least two (2) quality resources / references in this assignment. Note: Wikipedia and personal blogs do not qualify as quality resources.
Your report must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are: •Apply concepts in physical sciences to evaluate current trends and issues in the modern world. •Describe the physical processes influencing climate and weather. •Use technology and information resources to research issues in physical sciences. •Write clearly and concisely about physical sciences using proper writing mechanics.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Business Process and Functional Modeling

CIS Week 4 Assignment
Paper , Order, or Assignment Requirements

Assignment 1: Business Process and Functional Modeling
Due Week 4 and worth 110 points
Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships with Fortune 500 companies. Its areas of services range from software development and network engineering to geo-information systems. It has 50 plus regional offices in U.S. and five (5) offices in Canada. It plans to expand to other countries in the future.
When an ABS client company determines that it will need a contractor or temporary professional, it issues a staffing request against the contract it had previously negotiated with ABS. The contract manager in ABS reviews the staff request and ensures that the request is valid with its current contract with its client from the database.
• If the request is not valid, the contract manager sends the staffing request back to the client and explains the reasons and asks for the need for starting a new contract.
• If the request is valid, the contract manager will start recruiting requests by putting the request into its staffing database. The staffing request is then sent to ABS placement department.
In the placement department, the placement specialists will check the job requirements and candidate’s qualifications.
• If there is a qualified candidate, the specialist will notify the candidate and put a note in the database.
• If a qualified candidate cannot be found or not immediately available, the specialist notifies contract managers and the recruiting department; the recruiting department starts searching outside immediately.
The recruiting department normally has 30 days to find an outside candidate and send the qualified candidates to the placement department to review. If an internal qualified candidate is confirmed with his / her availability, the confirmation will be sent to the arrangement department. In the arrangement department, the candidate works with the specialists to further confirm the placement details, such as starting date, location, compensation (e.g., per diem), and travel arrangement. The final confirmation will be sent to the client along with a billing schedule. If the client agrees with the arrangement, he/she acknowledges the arrangement with contract managers in the contract department. The contract manager then puts a memo into its database and closes the request.
Write a four to five (4-5) page paper in which you:
1. Create a use-case diagram to include at least three (3) actors for the system described in this case through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
2. Create an activity diagram for the business process described in this case through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
3. Develop a use-case description for each major use case.
4. Verify and validate the functional models for this case.
5. Create a high-level requirements document which captures the major functions of the system.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Investigate Restore & Recover Tools for System Integrity

Investigate Restore & Recover Tools for System Integrity
Paper , Order, or Assignment Requirements

Purpose: Assess and Document Tools to Restore and Recover System Integrity for Windows 8.1 Workstations. 1. Assess and document the uses of the Windows 8.1 System Restore utility as part of the incident response process. 2. Assess and document the uses of the Windows 8.1 Programs and Features utility during the incident response process. Overview: For this activity, we will focus upon assessing and documenting tools that can be used in the preparation phase of the Incident Response Process (as defined in NIST SP 800-61r2). During this phase, incident responders create “images of clean OS and application installations for restoration and recovery purposes” (Cichonski, Millar, Grance, & Scarfone, 2012, p. 23). These tools are also used during the containment, eradication, and recovery phase to limit workstation access to resources (containment strategies), return workstations to known-good states (eradicate threats and restore system integrity), and restore system availability (recovery). Situation Report: Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon the company and its SCADA lab operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting. These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson SCADA lab, is protected from unauthorized disclosure. This information includes software designs and source code for Industrial Control Systems for which Sifers-Grayson is providing software support and maintenance. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner. The engineering and design workstations in the Sifers-Grayson SCADA Lab were upgraded from Windows XP to Windows 8.1 professional three years ago after the lab was hit with a ransomware attack that exploited several Windows XP vulnerabilities. A second successful ransomware attack occurred three months ago. The company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case). The SCADA Lab is locked into using Windows 8.1. The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system. This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities. Reference Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide (NIST SP 800-62 rev. 2). http://dx.doi.org/10.6028/NIST.SP.800-61r2 Your Task Prepare draft incident response guidance to be included in the Sifers-Grayson Incident Responder’s Handbook. Your draft guidance will explain the use of Windows 8.1 operating system features (utilities) and describe how each could be used as part of an incident response process. The guidance documents to be completed under this task are: (a) Creating, Using, Removing System Restore Points and System Image Backups under Windows 8.1 (b) Managing Windows 8.1 Programs and Features
Instructions Part (a):

Creating, Using, Removing System Restore Points for Windows 8.1 1. Identify appropriate sources of information and instructions for using the Windows 8.1 System Restore Point utility. Using those sources, research the procedures required to perform the following tasks: a. Create a system restore point for a Windows 8.1 system b. Use a system restore point to roll-back changes made to a Windows 8.1 system c. Remove system restore points from a Windows 8.1 system 2. Identify how the tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include: a. Prepare a known-good backup for operating system files and data structures (e.g. the system registry and the information stored within it) b. Remove unauthorized configuration changes c. Restore the system to full operating status after an attack or suspected attack d. Remove failed software installations and/or unwanted changes to the operating system, applications software, and/or files. 3. Write a guidance document that identifies the tool, explains the capabilities it provides, and then lists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using this tool?”
Part (b):

Managing Programs and Features for Windows 8.1 1. Identify appropriate sources of information and instructions for using the Programs and Features tool. Using those sources, research the procedures required to perform the following tasks: a. Turn Windows Features On or Off b. Modify, Repair, or Uninstall a program from a Windows 8.1 system c. Select and Install Updates for Windows and Windows Applications, Find an installed Update, Remove an installed update 2. Identify and research how the tool could be used during the incident response and recovery process. Typical uses include: a. Turn off undesired Windows features, e.g. location services or remote access b. Turn off features to implement a containment strategy c. Remove unauthorized programs d. Remove unwanted changes to operating system utilities or features, applications software, and/or patches / updates 3. Write a guidance document that identifies the tool, explains the capabilities it provides, and then lists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using this tool?”
Finalize Your Deliverable 1. Using the grading rubric as a guide, refine your incident response guidance. Your final products should be suitable for inclusion in the Sifers-Grayson Incident Responder’s Handbook. Remember that you are preparing multiple guidance documents, which must be presented separately. 2. As appropriate, cite your sources using footnotes or another appropriate citation style. 3. Use the resources section to provide information about recommended readings and any sources that you cite. Use a standard bibliographic format (you may wish to use APA since this is required in other CSIA courses). Information about sources and recommended readings, including in-text citations, should be formatted consistently and professionally. 4. Each file should start with a title page which lists the following information: • Lab Title and Number • Date • Your Name 5. The CSIA 310 Template for Lab Deliverable.docx file is set up to provide the required title page and two incident response guidance templates. Use the first template for your “System Restore Points” guidance. Use the second template for your “Managing Programs and Features” guidance.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"