Description
- After the system has been completely installed, a team member states that the systems analysts will now be in charge only of “putting out fires” experienced within the new system. How would you react to this statement?
- Elaborate on what can be done to proactively prevent system problems, rather than just reacting to them after they happen.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
After the system has been completely installed, a team member states that the systems analysts will now be in charge only of “putting out fires” experienced within the new system. How would you react to this statement?
- that every member should be trained in preventive measures because its should be a team work to ensure safely measure are taken in place and that would help to prevent much damage
- Elaborate on what can be done to proactively prevent system problems, rather than just reacting to them after they happen.
- Look at your recurring problems and incidents. Use incident management
and problem management skills to identify the cause and make sure a work
around is already in place to handle them. A work around is a temporary
fix. To prevent future problems a permanent solution must be found also Monitor your services, systems, projects and every area of IT so that
you become aware of potential problems before they can cripple your
business
Completion Status:
100%
Review
Review
Anonymous
Awesome! Perfect study aid.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of Maryland Global Intellectual Property Rights Discussion
This week, your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CS ...
University of Maryland Global Intellectual Property Rights Discussion
This week, your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CSO). This office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. At least one competitor is known to have received copies of the company's intellectual property through an economic development office within its country's government. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information from Padgett-Beale's existing hotel property within that geo-political jurisdiction. Another competitor, also operating in that geographic area, contacted Padgett-Beale's Corporate Security Office and disclosed that it had been sent URLs for web pages containing links to the resort plans by an unknown party. The other firm wanted to make it clear to Padgett-Beale that they did not condone nor participate in such illegal and unethical taking or receiving of another company's intellectual property.
As part of the company's response to this theft, the CSO's office has been asked to prepare a background briefing for company's executives that addresses the problem of protecting intellectual property stored in digital form. The briefing must include recommendations for best practices that the company's executives should be adopting to prevent / respond to such thefts.
Begin by reading the readings for this week. Then find additional information through your own research.
Write a 2 page summary of your research and analysis for review by the CSO's senior staff. Your summary should begin by explaining the problem of intellectual property theft. Next, address the reasonable and customary processes and procedures which should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company's intellectual property (at a minimum, you must address data classification and marking, separation of duties, and least privilege). You should also identify and explain five or more best practices which the company should implement as it responds to this growing problem.
AIU Windows PowerShell Script for Registry Check Questions
Assignment Description
One of the major causes of system performance issues is programs that run in the background and are ...
AIU Windows PowerShell Script for Registry Check Questions
Assignment Description
One of the major causes of system performance issues is programs that run in the background and are started when the system starts. These programs are usually installed, so they are started from one of two entries in the system registry:
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run
As a network administrator, you would like to gather information about these registry entries for all the computers in the network. You have selected Windows PowerShell to write a script for this task. Your plan will result in a document with a script for the tasks involved. Because there are security issues that prevent executing the scripts on remote computers, the script will be distributed to all users on the network as a download link on the company intranet. For purposes of this exercise, security issues can be ignored, so the script is not required to take security issues into account.
Prepare a document to submit your work:
Use Word.
Title Page
Course number and name
Project name
Student name
Date
Provide well-documented source code for a Windows PowerShell script that will perform the following tasks:
Read the registry entries from both of the locations named in the project description.
Compare each entry to a list of acceptable entries. The acceptable entry list is from a text file named "Acceptable_Reg.txt" that will accompany the script when the script is downloaded.
Produce a text file report that lists all unacceptable registry entries. Save the report using the computer name as the file name.
Transmit the report file to the following intranet address:
11 pages
Use Cases
1. A use case that documents the event of a bank customer withdrawing money from A use case represent a list of various ac ...
Use Cases
1. A use case that documents the event of a bank customer withdrawing money from A use case represent a list of various actions or the steps. Use case ...
33 pages
Cloud Orchestration And Automation Report
BallotOnline's cloud infrastructure, platforms, and applications have all progressed significantly. It's also constantly e ...
Cloud Orchestration And Automation Report
BallotOnline's cloud infrastructure, platforms, and applications have all progressed significantly. It's also constantly evolving as the company's ...
The University of Cumberlands General Electric Company Cloud Computing Essay
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profi ...
The University of Cumberlands General Electric Company Cloud Computing Essay
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Similar Content
UOC Business innovation Technology Discussion
Assignment 1:Food and Grocery ---> Whole foods --> Does the response indicate that the company/entity has an effect...
Securing an Organization
A:You
have been asked to explain the concept of a firewall policy. Research firewall
policies, and in a 2–3-paragraph ...
Advanced Systems Analysis And Design
Assignment 2: Creating a Use CaseDue Week 4 and worth 150 pointsRefer to the RMO CSMS marketing subsystem shown in Figure ...
Week 8 Discussion
Using proper APA formatting write an additional 200- 300 relating to the following.What was most compelling to you in this...
How to configure Dlink N300 wifi?
How to configure Dlink N300 wifi?...
"Preventing System Problems" Please respond to the following:
Elaborate on what can be done to proactively prevent system problems, rather than just reacting to them after they happen....
Confidentiality Integrity And Availability B
The C-I-A Triad is an acronym that stands for Confidentiality, Integrity, and Availability and is a model intended to show...
201610072337376025 Final Paper 1 Correcrtion 2
Formatting issues with this document which need to be addressed. Additional proof readingis needed. Content appears to be ...
Memo Final
The NIPP structure provides the link between existing and the future CIKR insurance efforts and dynamic techniques in an o...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of Maryland Global Intellectual Property Rights Discussion
This week, your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CS ...
University of Maryland Global Intellectual Property Rights Discussion
This week, your internship assignment takes you to the Corporate Security office, headed by the Chief Security Officer (CSO). This office has recently completed an investigation into how a competitor may have obtained copies of the confidential architectural drawings and design plans for a new type of resort that the company had planned for a recently acquired island property. At least one competitor is known to have received copies of the company's intellectual property through an economic development office within its country's government. It is suspected that an Advanced Persistent Threat mechanism may have been used to exfiltrate information from Padgett-Beale's existing hotel property within that geo-political jurisdiction. Another competitor, also operating in that geographic area, contacted Padgett-Beale's Corporate Security Office and disclosed that it had been sent URLs for web pages containing links to the resort plans by an unknown party. The other firm wanted to make it clear to Padgett-Beale that they did not condone nor participate in such illegal and unethical taking or receiving of another company's intellectual property.
As part of the company's response to this theft, the CSO's office has been asked to prepare a background briefing for company's executives that addresses the problem of protecting intellectual property stored in digital form. The briefing must include recommendations for best practices that the company's executives should be adopting to prevent / respond to such thefts.
Begin by reading the readings for this week. Then find additional information through your own research.
Write a 2 page summary of your research and analysis for review by the CSO's senior staff. Your summary should begin by explaining the problem of intellectual property theft. Next, address the reasonable and customary processes and procedures which should be used to discourage or make it difficult for employees, managers, and executives to inadvertently misuse and/or steal the company's intellectual property (at a minimum, you must address data classification and marking, separation of duties, and least privilege). You should also identify and explain five or more best practices which the company should implement as it responds to this growing problem.
AIU Windows PowerShell Script for Registry Check Questions
Assignment Description
One of the major causes of system performance issues is programs that run in the background and are ...
AIU Windows PowerShell Script for Registry Check Questions
Assignment Description
One of the major causes of system performance issues is programs that run in the background and are started when the system starts. These programs are usually installed, so they are started from one of two entries in the system registry:
HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Run
As a network administrator, you would like to gather information about these registry entries for all the computers in the network. You have selected Windows PowerShell to write a script for this task. Your plan will result in a document with a script for the tasks involved. Because there are security issues that prevent executing the scripts on remote computers, the script will be distributed to all users on the network as a download link on the company intranet. For purposes of this exercise, security issues can be ignored, so the script is not required to take security issues into account.
Prepare a document to submit your work:
Use Word.
Title Page
Course number and name
Project name
Student name
Date
Provide well-documented source code for a Windows PowerShell script that will perform the following tasks:
Read the registry entries from both of the locations named in the project description.
Compare each entry to a list of acceptable entries. The acceptable entry list is from a text file named "Acceptable_Reg.txt" that will accompany the script when the script is downloaded.
Produce a text file report that lists all unacceptable registry entries. Save the report using the computer name as the file name.
Transmit the report file to the following intranet address:
11 pages
Use Cases
1. A use case that documents the event of a bank customer withdrawing money from A use case represent a list of various ac ...
Use Cases
1. A use case that documents the event of a bank customer withdrawing money from A use case represent a list of various actions or the steps. Use case ...
33 pages
Cloud Orchestration And Automation Report
BallotOnline's cloud infrastructure, platforms, and applications have all progressed significantly. It's also constantly e ...
Cloud Orchestration And Automation Report
BallotOnline's cloud infrastructure, platforms, and applications have all progressed significantly. It's also constantly evolving as the company's ...
The University of Cumberlands General Electric Company Cloud Computing Essay
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profi ...
The University of Cumberlands General Electric Company Cloud Computing Essay
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Earn money selling
your Study Documents