Purdue University Global Cloud Security and Development Strategies Questions
SECTION 1
Create a 2- to 3-page outline of identified cloud computing security issues and possible solutions. This can be construed as a project definition/project charter (outline). This outline is the result of your preliminary work. New things and priorities may be discovered and should be included as you progress. Project development is an iterative process.
The result of this assignment will be used to complete your cloud security practice improvement paper due in Unit 9. The more work you do here, with this assignment, the less will be required in Unit 9. A rough guideline is that when you have properly completed this outline, you may be 30–40% of the way to completing the major paper due in Unit 9.
Identify the cloud security policies, systems, and practices at your internship location that could be improved upon. Discuss options with your supervisor. What would be a desired security improvement for the client? A policy upgrade? Updated cloud security practices? A disaster recovery plan? An incident response plan? An intrusion detection scheme? User training? Use of a security framework?
What topics could you research to benefit the company and provide a set of suggestions by end of term? See the partial topic list you might consider (some or all) below:
Include as complete an evaluation/explanation as possible of the four bullet points below. See the enhanced explanation of each below the list of topics.
- Identify the following cloud security improvement focus at place of internship.
- Identify the data or system(s) that would be protected from the security improvement.
- Identify three to five key milestones necessary to adopt the practice improvement.
- Describe strategies to achieve results.
Evaluation and validation of new system:
Topic List:
Utilize the following topic list to identify possible/probable areas for your work, evaluation, and solution recommendations. Address, as a priority list based on your client’s current situation, some of the following topics:
- What the weakest link in the information security chain is and why.
- What different types of users there are.
- How to govern different types of users with policies.
- What the acceptable use policies (AUPs) are.
- What the significance of a privileged-level access agreement (PAA) is.
- What security awareness policies (SAPs) are.
- What the best practices for user domain policies are.
- What the difference between least access privileges and best fit access privileges is.
- What some case studies and examples of user domain policies are.
- What the basic anatomy of a cloud infrastructure policy is.
- What the common remote access domain policies are.
- What the common system/application domain policies are.
- What the common telecommunications policies are related to the IT infrastructure.
- What some cloud infrastructure security policy best practices are.
- What some cloud computing case studies and examples of IT infrastructure security policies are.
- What the common data classification policies are.
- What the common data handling policies are.
- What the common business risks related to information systems are.
- What a risk and control self-assessment (RCSA) is and why it is important.
- What the common risk assessment policies are.
- What the methods of quality assurance (QA) and quality control (QC) are.
- What the common best practices for risk management policies are.
- What some case studies and examples of cloud risk management policies are.
Guidelines:
Use the following guidelines to help structure your paper for maximum clarity and impact. Review the detailed grading rubric for this assignment to understand all the detailed requirements of this paper.
- Identify the following cloud computing security improvement focus at place of internship:
Describe the problem or system that would benefit from a new advancement, renovation, or augmentation. Include sufficient detail so that your instructor can really understand the scope of this project. It is a good idea to have your work supervisor involved in this project with you to help ensure that you clearly understand the problem.
- Identify the data or system(s) that would be protected from the cloud computing security improvement:
It is important to understand as much as possible the full impact of the problem. By identifying all impacted systems, you will be in a better position to provide a strong solution.
- Identify three to five key milestones necessary to adopt the practice improvement:
Describe how you will measure project accomplishment as you progress through the design, planning, and actual implementation of the project (keep in mind that you will likely only be planning the implementation). Acknowledgement: I realize I cannot actually implement the upgrade during my brief service, but I will make recommendations and propose a solution in my final report.
- Describe strategies to achieve results:
Describe the recommended strategies to achieve the results. Will this require a new workflow, additional contractors, upgraded equipment and training, or new employee protocols? What key elements are necessary to achieve your objectives?
- Evaluation and validation of new system:
Describe how you will evaluate and validate your security practice improvement(s). Explain how you would validate any gains resulting from the new system due to increased efficiencies, more secure data archives, complete disaster recovery plans, or increased security practice among the users in your target organization.
SECTION 2
Part 1 Instructions and Requirements
Scenario: Avery’s Gym has had some limited success providing athletic training and physical therapy…but she’s struggling a bit to expand her presence and her brand to expand her business. Avery is considering expanding her web presence and is interested in exploring what her competitors are doing. She thinks a great way to do that would be to build a website that could serve as a home for her marketing efforts. There are two parts to the assessment. First, research other similar sites to serve as a launching point for your creative efforts. Second, draft an original wireframe diagram using Visio that may serve as the starting point of a web system design project.
You can expand your research options to explore themes related to three main areas. Creativity is encouraged!
- Gym or Physical Fitness center
- Physical Therapy
- Mental Health and Wellness centers
Because Avery is focused on crafting personalized training and experiences, she is looking for local inspiration. Choose a gym, physical fitness center, physical therapy site, or mental health and wellness facility that is close to you (preferably independent). Do not choose a large national business or chain as the starting point for your research.
Part A: Home Page Research
Find an appropriate corresponding website home page with the purpose of researching similar sites for inspiration for your own design. Provide the following information focusing primarily on the home page, features, and branding of the site. Think of this as a “walk through evaluation.” In addition to providing a URL and screenshot – write a brief analysis addressing some of the common elements listed below.
Provide the full URL of your inspiration.
Include a screenshot
Provide additional written documentation to accompany your research. Adding labels and annotation to the screenshot highlighting your analysis is preferred.
Paragraph 1: Organization and Design (at least 75 words)
Describe the design elements:
- Main features and purpose
- Navigation menu(s)
- Layout
- Any whitespace
Paragraph 2: Branding and Communication (at least 75 words)
Describe the key features of marketing and communication elements:
- The use of color (combinations, locations)
- Text (families, variety of sizes, alignment)
- Multimedia (images, graphics, videos, etc.)
- Social media/communications
Part B: Original Diagram
Consider what you learned about the organization of your research and develop your own proposed design for your client. Create an original wireframe and storyboard for your client’s home page. Visio is required.
- Design your wireframe for a website homepage.
- Include the location of the logo, navigation, main area for home page content, and other elements you feel are necessary.
- Identify and label key elements.
- Do not simply copy the design of the page you reviewed; create your own design.
- Actual content is not necessary! This should be a line drawing showing where items should be placed on the screen. Placeholders could be included.
- Your wireframe should look something like the image below, although of course with your own page organization and detail and relating to the client's needs:
Original Image by Paul Shryock, (CC BY-NC-ND 4.0) Image modified by cropping to focus on website wireframe example. Retrieved from https://creativecommons.org/licenses/by-nc-nd/4.0/
Provide additional written documentation to accompany your Visio wireframe. Elaborate on your design decisions, identify the key features, address important aspects of navigation, marketing, and communications.
Paragraph 1: Organization and Design
Describe the design elements (at least 100 words):
- Main features and purpose
- Navigation menu(s)
- Layout
- Any whitespace
Paragraph 2: Branding and Communication (at least 100 words)
Describe the key features of marketing and communication elements:
- The use of color (combinations, locations)
- Text (families, variety of sizes, alignment)
- Multimedia (images, graphics, videos, etc.)
- Social media/communications
Review all instructions above and the rubric below before submitting to the Assessment Dropbox.
Reminders
- Proofread your work for grammar, spelling, punctuation, capitalization, and formality.
Part 2: Program Design Concepts
Designing programs that perform system logic is challenging and varied. Analysts must define instructions for programs that describe how to covert the ideas depicted in logical models into actual code and programming logic. Structure charts are one technique that describes a program at a high level. This assessment asks you to explain key concepts associated with program design. Write a short essay response to each of the following questions.
Module Outcomes practiced in this assessment:
- Revise logical data flow diagrams into physical data flow diagrams.
- Describe features of structure charts.
- Develop Program Specifications.
Assessment Requirements
- Include a title page and reference page.
- Written work is provided in Standard English.
- Provide a header for each question and answer.
- Each question should include at least one APA reference and inline citation.
- At least 3 pages in length, not counting the title page and reference page.
Questions:
- What is the purpose of creating a logical process model and then a physical process model? How are they different? What information is found on the physical DFD that is not included on the logical DFD?
- List the steps necessary transform logical models to physical models.
- Define a structure chart and explain the importance of sequence, selection, and iteration.
- Provide an example of a structure chart you have found online (citation necessary). Explain the purpose of this chart.
- What does a data couple depict on a structure chart? What symbols are used to depict it? What does a control couple depict on a structure chart? What symbols are used to depict it?
- List the seven types of coupling. Give an example of good coupling and an example of bad coupling.
- What is meant by the characteristics of fan-in and fan-out?
- Discuss three ways to improve the quality of a structure chart.
Part 3: Entity Relationship Diagram
Module Outcomes practiced in this assessment:
- Validate data models.
- Describe the process of normalization.
- Create an entity relationship diagram.
Purpose
Entity Relationship Diagrams are used to help show how information in a system is organized. This assessment will have you analyze data from a business situation, construct an ERD, and explain process of normalization and reasons when denormalization may be important.
Assessment Instructions and Requirements
Avery’s gym has partnered with a partner physical therapy business to provide treatment for some of its gym members. Gym members have the option to participate in special physical therapy sessions.
The main feature of this partnership provides gym members with the options to participate in physical therapy sessions. Each Physical Therapy Session must include a gym member, a trainer, and a therapist. Each session generates a unique Claim. Sessions also need to record the date, time and purpose of the sessions. Physical therapy sessions are billed back to insurance and claims must be filed with each physical therapy session.
You have been tasked with developing an Entity Relationship Diagram to help show this part of the larger gym system. You have also been asked to explain the importance of both normalization and denormalization of data structures.
You have been given a report as an example of some of the information generated by the system, and the file contains the following fields. Hint: unique IDs may need to be created to correctly generate the data model.
- Physical Therapy Session
- Session Date
- Session Time
- Session Details/Purpose
- Member Name
- Member Address
- Member Phone
- Member Age
- Member Email
- Insurance Number
- Insurance Name
- Insurance Address
- Insurance Plan details
- Trainer Name
- Trainer Phone
- Trainer Email
- Trainer Specialty
- Therapist Name
- Therapist Phone
- Therapist Email
- Therapist Specialty
- Insurance Claim Number
- Claim Cost
Complete the following tasks:
- Normalize the data. Organize the information into data fields appropriate for a relational database. Analyze the information provided and normalize the data to create a database model.
- Based on that information construct an ERD. Use Visio. Identify primary and foreign keys. For each entity, develop appropriate and thorough attributes. Use crow's feet to show relations between entities.
- Explain the importance of normalization: provide a summary of the steps necessary for each 1NF, 2NF, 3NF and importance. A minimum of 120 words is expected.
- Explain denormalization and explain the main reasons for it. A minimum of 60 words is expected.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.