Harnessing Information Management, the Data, and Infrastructure

Harnessing Information Management, the Data, and Infrastructure
In Assignment 1, you investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected
in Assignment 1 (ATTACHED). Use the Internet or Strayer Library to explore the relationship between information management and data storage techniques.

Write a four to six (4-6) page paper in which you:

Ascertain the importance of information management for the company or industry that you have chosen.
Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT
architecture impacts the effectiveness or efficiency of information management and vice versa.
Suggest at least two (2) data storage methods regarding database, data warehouse, and / or date formart for your chosen company or industry. Provide a rationale for
your response.
Determine the optimal data storage method between the methods that you suggested in Question 3. Provide a rationale for your response.
Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference
page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:

Compare and contrast the strategic and operational use of data management systems.
Summarize the complexities of information technology and practices.
Use technology and information resources to research issues in information systems and technology.
Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 110 Assignment 1: Web Server Application Attacks
Criteria Unacceptable
Below 70% F Fair
70-79% C Proficient
80-89% B Exemplary
90-100% A
1. Examine three (3) common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your
response.
Weight: 20% Did not submit or incompletely examined three (3) common Web application vulnerabilities and attacks; did not submit or incompletely recommended
mitigation strategies for each. Did not submit or incompletely provided a rationale for your response. Partially examined three (3) common Web application
vulnerabilities and attacks; partially recommended mitigation strategies for each. Partially provided a rationale for your response. Satisfactorily examined three
(3) common Web application vulnerabilities and attacks; satisfactorily recommended mitigation strategies for each. Satisfactorily provided a rationale for your
response. Thoroughly examined three (3) common Web application vulnerabilities and attacks; thoroughly recommended mitigation strategies for each. Thoroughly
provided a rationale for your response.
2. Using Microsoft Visio or an open source alternative such as Dia, outline an architectural design geared toward protecting Web servers from a commonly known Denial
of Service (DOS) attack.
Weight: 25% Did not submit or incompletely outlined an architectural design geared toward protecting Web servers from a commonly known Denial of Service (DOS)
attack, using Microsoft Visio or an open source alternative such as Dia. Partially outlined an architectural design geared toward protecting Web servers from a
commonly known Denial of Service (DOS) attack, using Microsoft Visio or an open source alternative such as Dia. Satisfactorily outlined an architectural design geared
toward protecting Web servers from a commonly known Denial of Service (DOS) attack, using Microsoft Visio or an open source alternative such as Dia. Thoroughly
outlined an architectural design geared toward protecting Web servers from a commonly known Denial of Service (DOS) attack, using Microsoft Visio or an open source
alternative such as Dia.
3. Based on your research from the Network World article, examine the potential reasons why the security risks facing U.S. government Websites were not always dealt
with once they were identified and recognized as such.
Weight: 20% Did not submit or incompletely examined the potential reasons why the security risks facing U.S. government Websites were not always dealt with once
they were identified and recognized as such, based on your research from the Network World article. Partially examined the potential reasons why the security risks
facing U.S. government Websites were not always dealt with once they were identified and recognized as such, based on your research from the Network World article.
Satisfactorily examined the potential reasons why the security risks facing U.S. government Websites were not always dealt with once they were identified and
recognized as such, based on your research from the Network World article. Thoroughly examined the potential reasons why the security risks facing U.S. government
Websites were not always dealt with once they were identified and recognized as such, based on your research from the Network World article.
4. Suggest what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to
which the article refers. Propose a plan that the U.S. government could use in order to ensure that such mitigation takes place. The plan should include, at a minimum,
two (2) mitigation or defense mechanisms.
Weight: 20% Did not submit or incompletely suggested what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name
System Security Extensions (DNSSEC) concerns to which the article refers. Did not submit or incompletely proposed a plan that the U.S. government could use in order to
ensure that such mitigation takes place. Did not submit or incompletely included, at a minimum, two (2) mitigation or defense mechanisms. Partially suggested
what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the
article refers.Partially proposed a plan that the U.S. government could use in order to ensure that such mitigation takes place.Partially included, at a minimum, two
(2) mitigation or defense mechanisms. Satisfactorily suggested what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain
Name System Security Extensions (DNSSEC) concerns to which the article refers.Satisfactorily proposed a plan that the U.S. government could use in order to ensure that
such mitigation takes place. Satisfactorily included, at a minimum, two (2) mitigation or defense mechanisms. Thoroughly suggested what you believe to be the best
mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the article refers. Thoroughlyproposed
a plan that the U.S. government could use in order to ensure that such mitigation takes place. Thoroughlyincluded, at a minimum, two (2) mitigation or defense
mechanisms.
5. 3 references
Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required
references; all references high quality choices. Exceeds number of required references; all references high quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present

Order from us and get better grades. We are the service you have been looking for.