Discipline: Information Systems

Security Architecture designSecurity Architecture design

Architecture and design represent one important side of delivering a security posture. That’s what this book is all about: How does one go about achieving an architecture and an architectural design that represent the security needs for a system? Answer the question with a short paragraph, with a minimum of 300 words. Reply to at least two […]

Critical Path Method (CPM)Critical Path Method (CPM)

There are a lot of tools that can be used to manage projects. The Critical Path Method (CPM) can be used as a project management tool for determining the duration and slack times of project activities. Describe how this tool can be used to recover from schedule overruns of specific activities that are not on […]

Performance RequirementsPerformance Requirements

Business users often describe requirements from their perspective and from what they want. System architects turn these desires into technical requirements. Within this process, there are many places for ambiguity to take hold. Complete the following: · Research and find a recent software/programming example where the final application did not meet the end user’s needs. […]

Project BlogProject Blog

 The objective of this project is to describe and explain a recent cybersecurity attack in at least 1,500 words, including details on the technologies used to perpetrate the attack. It is important to note that this work does not require it to be in any specific format, but the hyperlinks used should work correctly. The […]

July 19 DiscussionJuly 19 Discussion

No product or service lasts forever, but how do we determine or project when a particular item may fail and why is this important?  Watch the following video for ideas regarding certain “things” and their failure calculations:  Relate these concepts to your work experience and provide an example of a product or service that the […]