ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 02 May 2017 My Price 8.00

This course has been designated a system assessed course

Question:

This course has been designated a system assessed course. As a system assessed course, this final project will assess the following outcomes based on the assessment plan and will account for 15% of the final grade for the course.• Implement and maintain computer-based information systems to support the decision-making function of management.• Protect information assets through the implementation of security models and standards.• Analyze and assess computer attack models.

Directions:COMPLETE the following scenario. This project will be graded by the attached rubric at a value of 150 points. Each part (a-e) is worth 30 points.

 

Scenario 1

The "Tooth Fairy" a local dentist office has hired you an IT consultant. They are a newly established business and have nothing more than the four dentists and two new hires thatwill work the receptionist area. Provide the following:

a) An initial network diagram detailing the physical layout of the equipment in the building

b) An equipment inventory sheet listing the products purchased and associated costs

c) A memo to the owner of the company detailing your intentions to implement security and how you intend to address standards. For example how will you address the handling of patient records?

d) A memo seeking justification for additional funding in order to purchase software and or hardware that can protect the system from attacks.

e) An updated network diagram showing the implemented security equipment

Answers

(11)
Status NEW Posted 02 May 2017 01:05 AM My Price 8.00

-----------

Not Rated(0)