Info Analysis and Communication

User Generated

fnpuva10

Business Finance

Description

Discussion Board 1

Briefly describe the next steps in your MAP process and list a few milestone goals for phase development leading up to and upon reaching the MAP Project Management. Consider including a Project Schedule or Gantt chart using software (e.g. MSProject, https://www.smartsheet.com).

  • Implementation
  • Operation/Support

My project name is - Improving security of business websites by using Intelligent Agent.

Discussion board has to write with in 300 words.

Assignment

Reflect on the importance and steps you will take to maintain Confidentiality, Integrity, and the

Availability aspects of your MAP project.

Watch short video https://www.youtube.com/watch?v=yFRc-wpQc9c

My project name is - Improving security of business websites by using Intelligent Agent.

paper should be 4-5 pages.

No plagiarism,

reference should be must.

please follow the question and answer properly

Totally you have to do one discussion board and one Assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Improving security of business websites by using Intelligent Agent
An intelligent agent intended to design its activities ahead of time. Such capacity is basic
to accomplish canny conduct and its usage is critical in down to earth applications. The
milestone of all schedules and tasks of this project involves the following: interaction, reports
such like forwarding the alarms within the organization of business, sending mental attitudes,
security events, filtering, and also deliberation and implementation. The interaction task done by
Lee, includes reporting the goals, monitoring the business activities done by customers for
security purposes, and also, detection for various information from users/clients. Also, this task
include sending various mental attitude of the users and alarms which will be handled by Kim. In
the security events, Lauren will check all the breaches that might be occurred accidentally or
intentionally by the users. Lim, also will handle the filtering process. He will formulate this
process in which it needs to check security occasions created in the system, as indicated by
occasion classes determined in a location objective. To be sure, the occasions happening in
arrange are not all gathered. Actually, when a recognition objective is sent to a specialist, an
arrangement of occasion classes to watch is indicated to it. Therefore, when an occasion happens
in the system, the specialist tests in the event that it matches the occasion classes indicated in the
objective. In the event that it matches, it is gathered. The separated events are then put away,
holding up to be dealt with by the pondering capacity. Next is the deliberation and
implementation. In this task, the Security administration lead by Berney and Glen must manages
noteworthy system qualities, for example, its ceaseless variety, especially regardin...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags