Need assistance with correcting assignment from teachers feed back adding missing parts to attached document and the add 3 pages of new content.
Redteachers comments.
Green add missing sections to document
Purple New contend to be added 3 pages
Please add missing sections to assignment as noted in teacher’s feedback
opportunities for improvement:
> As worded, the problem in your capstone paper is not technology focused. Your problem must be solvable through scholarly research and analysis of technology solutions.
> Every sentence paraphrased or quoted from a reference requires an in-text citation. In your first paragraph, the in-text citation at the end of the paragraph indicates that only the last sentence came from the reference. I do not believe that was your intent.
> Provide an in-text citation to support the sentence ‘Health care organization is also one of the rapidly growing institutions in society with the integration of different technologies.’ or state it is your opinion.
> Add in a table of contents.
> Add the outline for the entire paper.
> The main text should be left justified.
> The first line of the main text should be the title of your paper.
> You seem to avoid using the AI acronym anywhere in your paper, but it is in the title and even there you must spell it out if it’s the first time.
> There are still a number of grammar, sentence structure, capitalization, and word choice errors in your paper that must be addressed (e.g., ‘Artificial Intelligence & Robotics Are used in the 21st century…’ and ‘Few strengths ask the company are as follows’).
> There are also sentences that are not understood as written (e.g., ‘The purpose of integrating customer artificial intelligence…’).
> Corp. is short for Corporation and should be spelled out the first time.
> In the sentence ‘ The company is an international health…’ you should state Cigna, so there is no confusion or misunderstanding by the reader.
> You must provide in-text citations for all company information.
Additional Comments:
> Avoid using quotation marks for anything except direct quotations (e.g., “Cigna Corp.” ).
Additional Comments:
> There are major issues and concerns with your paper. Contact me if you would like to discuss your paper and class expectations.
> I recommend you use the class provided outline to better organize your paper.
> The abstract is not required until IP5. I will not review or grade until then.
Computer Science Problem-Solving Research Project Report
This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of a Computer Science Problem-Solving Research Project Report document that is designed to solve a computer science problem. You will select a project or research topic and apply research and knowledge that you have gained from prior courses to the completion of the associated report according to the instructions for each week.
You will select a project as the topic for the research that you will execute and document in this course. The project should represent a computer science problem that you will solve through research and your application of knowledge and skills gained in the courses taken in your program of study. This is the course Key Assignment that you will make contributions to each week.
Project Selection
The first step will be to select a project as the target for your Computer Science Problem-Solving Research Project Report document. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:
Nontrivial: The project should be nontrivial and should require research as part of the solution, and the project should be large enough to allow reasonable exercise of the technology research process.
Scope: The project scope should be appropriate for the 5-week class duration.
Domain knowledge: You should be familiar enough with the problem domain to allow focus on the project tasks without significant time required for domain education.
Accessibility: You should have sufficient access to the people and other information related to the project because this will be an important part of the process.
Select a project that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.
Assignment
For the assignments in this course, you will be developing a comprehensive Computer Science Problem-Solving Research Project Report document that identifies a computer science problem and works through a formal scientific research process to first provide a proposed solution to the problem, then define the hypothesis and research question, as well as design the experiments to collect data to validate the solution. Your first task in this process will be to select a project to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.
The following are the project deliverables:
Submit the project proposal to your instructor for approval.
Computer Science Problem-Solving Research Project Report document
Use Word
Title Page
Course number and name
Project name
Student name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
It should be on a separate page.
It should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
Section Headings (create each heading on a new page with TBD as the content except for sections listed under New Content each week.)
Template of the Content
Project Outline (Week 1)
Project Outline (Week 1)
1.1 Company Overview (Week 1)
1.2 Project Introduction (Week 1)
1.3 Problem Identification (Week 1)
1.3.1 Problem Context and Background (Week 1)
1.3.2 Problem Statement (Week 1)
2. Solution Identification (Week 2)
2.1 Solution Framework (Week 2)
2.2 Hypothesis Statement (Week 2)
2.3 Research Questions (Week 2)
2.4 Related Works (Week 2)
3. Research Methodology (Week3 )
3.1 Research Matters (Week 3)
3.2 Experiment Design (Week 3)
3.2.1 Experiment Requirements (Week 3)
3.2.2 Experiment Procedures (week 3)
4. Project Plan (Week 4)
4.1 Project Plan for Data Collection & Analysis (Week 4)
4.2 Risk and Cost-Benefit Analysis (Week 4)
5. Conclusion and Future Works (Week 5)
5.1 Conclusion (Week 5)
5.2 Limitations (Week 5)
5.3 Future Works (Week 5)
Abstract and Keywords (Week 5) (Put them on the title page)
References (add new references as needed every week)
New Content for Week 1
1. Project Outline
1.1 Company Overview
Give a brief description of the organization (can be a hypothetical organization) that the problem relates to. Include the company size, location(s), and other pertinent information.
1.2 Project Introduction
Give a brief description of the main business products and/or services that the company is currently offering. Include the strength and weakness of the products and/or services, the competitors, and the challenges, etc.
1.3 Problem Identification
1.3.1 Problem Context and Background
Provide an overview of the problem that is suitable for a nontechnical audience. The overview must present the context and the background of the problem and the potential impact on the company or organization.
1.3.2 Problem Statement
Formulate a problem statement for the project. The problem statement should be one sentence that describes both the problem symptom and the problem root cause. The standard format for one sentence problem statement is “The problem symptom due to the problem root cause.”
For example, let’s assume that in one evening, the severe weather has caused a sudden power outage at one of CTU’s campuses. We can use a one sentence “problem statement” to describe such problem: “In the campus, all classrooms are now embedded in the darkness due to the sudden power outage.” In this statement, the problem symptom is “In the campus, all classrooms are now embedded in the darkness” while the problem root cause is “the sudden power outage”. That is this is an accurate one sentence problem statement for this situation.
Name the document “yourname_CS698_IP1 .”
Submit the document for grading.
Demonstrate the integration and utilization of key concepts and knowledge from prior courses to solve the problem
Prepare a formal technical report of the in-depth research and application of prior course concepts
Research current trends and utilize program concepts to support project solution
3 new pages in the Computer Science Problem-Solving Research Project Conducting research this is about conducting research
The definition of your problem should now be completed, and you should be ready for the research phase. This is a key step in the research process and should result in meaningful, measurable, and useful information that you will use later for analysis purposes. Proper execution of your research plan will play a large role in the success of your project.
For this assignment, you will continue your work on the project with the focus on identifying a solution which can address the root cause of problem. You will first select the suited framework which will guide you to develop the solution. Then you will define the specifics of the solution and put it into a one sentence hypothesis statement. After carefully study both the problem statement and the hypothesis statement, you will extract a pair of important concepts reflected in the two statements. A research question can be formulated based on these two concepts. You can also use these two concepts qualified with the problem subject area as the search keywords to find some references which report the similar research works completed by other researchers. After evaluating these references you need to find out what are the main differences between those research works and the solution that you have proposed. All of these will be written into the corresponding sections of the Template of the Content of the Computer Science Problem-Solving Research Project Report document, will be presented as part of the submission for the week.
The following are the project deliverables:
Update the Computer Science Problem-Solving Research Project Report document title page with a new date and project name.
Update the previously completed sections based on instructor feedback.
New Content for Week 2:
2. Solution Identification
2.1 Solution Framework
Based on the nature of the root cause of problem, discuss what computer science principles, models, concepts, algorithm, and platform, etc. should be applied in order to develop a proper solution to address the root cause of the problem. This part is considered as the theoretical foundation of the solution.
2.2 Hypothesis Statement
Base of the Solution Framework, you will define the specifics of a solution that can be applied to resolve the root cause of the problem. Because this solution is only an assumed solution, it will be treated as a hypothesis at this stage of the research. You need formulate a one sentence hypothesis statement in a format of “If the solution is implemented, then the root cause of the problem will be resolved”.
For example, to solve the problem of the darkness in the classroom due to a sudden power outage in the evening, which is described by the problem statement of “In the campus, all classrooms are now embedded in the darkness due to the sudden power outage”, an assumed solution could have several possibilities: such as finding a electricity generator powered by either diesel or man-power, or finding some pre-charged batteries for lightening, etc. Therefore, the corresponding one sentence hypothesis statement can be written as: “If we can find any of the following: an electricity generator powered by either diesel or man-power, or even some pre-charged batteries for lightening within the campus, we can effectively resume the classes.” From this hypothesis statement we can see clearly what solution has been proposed in order to address or resolve the root cause of problem: “the sudden power outage”.
2.3 Research Questions
Based on both the problem statement and the hypothesis statement, you should find out a pair of important concepts reflected in these two statements. Then you will treat one of the concepts as an Independent Variable, and the other concept as a Dependent Variable. Then use these two variables to formulate a research question in the format of “How will the values of the Independent Variable changes impact the outcome of the Dependent Variable?” This research question will become the guideline for designing research experiments in the nest step of the research process.
For example, we can easily extract two concepts: “Type of Electricity Generator” and “Effectiveness of Electricity Generating” through evaluating the problem statement and the hypothesis statement. We will use the “Type of Electricity Generator” as the Independent Variable as it can have at least three possible “values”. We will also use the “Effectiveness of Electricity Generating” as the Dependent Variable. Therefore, we can have the research question defined as: “How will the values of the Type of Electricity Generator changes impact the outcome of the Effectiveness of Electricity Generating?”
As you now can easily see that to answer this research question, all we need to do is to do the experiments by trying each type of electricity generator and measure the corresponding effectiveness of their electricity generating. That is the research question in fact has provided a clear guidance of how to design the research experiments.
2.4.Related Works
By using the Independent Variable and Dependent Variable plus the subject area of the problem as the search keywords, you can easily find out some research works that are relevant in the publications. These publications should be used as the references for you to investigate what are the difference in details from the solution that you have chosen. You should select at least 5 such references, and make a short summary for each reference. The summary should point out the main technical feature, and the pros and cons of the research work, as well as the main difference from your solution.
For example, if we use “Electricity Generator” or “Effectiveness of Electricity Generating” or “Solution for Electricity Recovering during Sudden Power Outage” as the search keywords to find the similar research works, we should be able find many references that are discuss the solution similar to what we are researching.
After collecting the relevant references, all we have to do is to first classify them into categories, then make a summary on the main technical feature, the pros and cons of each category of solution, as well as the main difference between each category of solution and your solution. These summaries become the content of the section of Related Works.
Be sure to update your table of contents before submission.
Name the document “yourname_CS698_IP2 .”
Submit the document for grading.
Running Head: SECURITY ASSURANCE PLAN 3
SECURITY ASSURANCE PLAN
Christopher Slaton_CS661_IP1 .
Colorado Technical University
Contents
Introduction 3
The Information to the Security Plan Overview 4
The Nontechnical Overview 4
The Information Security 6
Existing potential risks and issue 6
Benefit of the company 6
Issues description 7
Management Server 7
Web-Based and Non-Web Based Applications 7
Data management 7
Cloud computing 8
References 21
Amazon took the Internet by storm in the mid-1990s and gradually began a multi-million dollar company, and all this occurred with the hard work of Jeff Bezo he developed and founded it. He was also responsible for his squad. One of the most famous companies is Amazon, which is among the few leading companies, and the list contains a trillion dollars or company list that covers resources for consumers, merchants, corporations, governments and, more and more, all offered around the world.
They also launched Amazon prime, and many more to teachers, parents and education; institutes and agencies. Amazon has created and has created several other organizations of all kinds, including Amazon Web Services, also known as AWS, which is bypassing the time.
The cloud storage software Amazon supplied was AWS. It offers service to enhance and broaden enterprises in a number of domains, including computing, storage, distribution and other functions. Some domains in AWS are used for the development and coordination of massive cloud-based systems in the form of services. The key reason that these programmers were built was to work together to achieve both visible and strong outcomes. In addition, networks are grouped into three distinct categories, including service infrastructure, applications and network. Amazon was founded in 2006 and was regarded as the world’s best cloud provider. The cloud OS provides various advantages, such as cost savings and overhead control reduction.
In order to develop an information management strategy, this plan would be accurate and then include an outline and explanation for the non-technical audience. When a company mitigates transfer, embraces and refuses risk information, the information management strategy is taken into account and often concerns procedures, technology and human capital. If a proven approach is developed, the outcomes of the organization will be good, and with this, it will be able to secure the available information properly, confidentially, and with honesty.
If an information security strategy is put in motion and this plan is somehow efficient, it is advantages for commercial reasons and it is very valuable, important and very relevant. Competitive benefits may be offered when bringing into work. The promises made to shareholders, the image of corporate partners as industry expectations of their clients, and both of them included, are also part of the strategic edge and help to keep the company running.
The relocation operations in remote data centers are currently very broad, and this can be updated according to specifications and interactions on the basis of the internet. Communications and computation are interconnected in several respects across numerous dimensions, including the network computing framework, which requires stability, durability, scalability and protection challenges, thus addressing potential network generation and offering a broad variety of IT services (Amazon Web Services, 2019)
Amazon Web Services offers the new, most secure technical know-how on the planet. Both people share the conventional approaches to connect with the outside world more effectively by using cloud computing. They will either demand or attempt to make a combined effort with personnel to ensure multiple users feel safe to share their work and files concurrently in the cloud computing.
The data from around the world can support to encourage access for people who use this tool, but must have internet. The data can be used by any computer worldwide. Cloud storage will provide the scalable infrastructure available in businesses that will save your computer management costs. Today, a cloud-based protection day is more popular and the highest of them will be open. With this different protection, customers have control, and retain their records, even if they can save their extra expenses, without paying any costs (Bozicevic, 2019)
It is very important to carry out frequent checks of various networks, facilities and processes so that federal and municipal agencies, including customers, are not complied with, and every state is taken seriously. Various forms of company laws and procedures may be considered. The protection mechanisms will cover these considerations and I.T is very important to ensure that and analyse the safety and safety of multiple layers and their forms applied and imputed.
The different level of data has a different level and this protection can be measured so that the enterprise and the agency such as Amazon Web Services are trained and able to fix the issue from the source or maybe they don’t have the capability to look correct and simple into the problem. (Evans, 2015)
For the IT department of Amazon Web Service, a separate collection of securities and assessments will be made. This assessment must be carried out annually or on a daily basis in the most authentic manner. The aim is to limit the destruction of data by malware, infringements or illegal cybersecurity concerns of all data contained in them. (Amazon Web Services, 2019)
Private or specific customers can benefit from spreading not only from the providers, but also from many other big corporations, government agencies and enterprises. As the business interacts with other areas of the globe, it opens the door to potential capabilities that can compare and improve function after searching and analyzing resources from other businesses.
The black box is the most common concern. Providers who have web networks which have little access to the metrics, manually operate, have network traffic diverted. Net DevOps are used now to detect issues with network efficiency such that problems with improved organization in future can be eliminated.
The alleged and adverse device will theoretically cause the problem and can be used for driver updates as well. Perhaps because of the case, there are explanations why the helper-script should be used and the instance affected is unable to function effectively. (Bozicevic, 2019)
The server has caused a network fault and the link is broken. The warning message would be displayed and entered to show a web application problem and to explain the use of non-web apps. Data recovery does not occur during the reparation phase of the server, so you can work with unlocked objects.
To keep up the capability and to inform the customer that the device is already overwhelmed, data stored in the system may be too big. Most of the time the data management fails or may even crash. This means all is minimal only if the company takes special precautions everything can be better preserved. (PAGE, 2020)
Any technological difficulties and security problems will occur and can arise due to small machine failures. It will store all sorts of data and in particular essential information and risk the information. Since everything has advantages and drawbacks and not everything on the Internet is safe.
References
Amazon Web Services, Inc. (2019). AWS Cloud Development Kit (AWS CDK). Retrieved from AWS: https://docs.aws.amazon.com/cdk/latest/guide/assets.html
Amazon Web Services, Inc. (2019). AWS Cloud Security. Retrieved from AWS: https://aws.amazon.com/security/
Amazon Web Services, Inc. (2019). Standardized Architecture of NIST-based Assurance Frameworks on the AWS Cloud: Quick Start References Deployment. Retrieved from AWS: https://docs.aws.amazon.com/quickstart/latest/compliance-nist/welcome.html
Amazon Web Services, Inc. (2019). VPC Network Management and Monitoring. Retrieved from AWS: https://aws.amazon.com/answers/networking/vpc-network-management-and-monitoring/
Beaver, K. (2015, September 28). The Importance of a Security Culture Across the Organization. Retrieved from SecurityIntelligance : https://securityintelligence.com/the-importance-of-a-security-culture-across-the-organization/
Caudill, B. (n.d.). AWS Vulnerabilities and the Attacker’s Perspective. Retrieved from Rhino Security Labs: https://rhinosecuritylabs.com/cloud-security/aws-security-vulnerabilities-perspective/
Commvault. (2019). Amazon Web Services (AWS) Data Management Move, Manage and Use Your Data with Commvault on AWS. Retrieved from Commvault: https://staging.commvault.com/partners/amazon-web-services
Elsevier B.V. (2019). Security Countermeasures. Retrieved from ScienceDirect: https://www.sciencedirect.com/topics/computer-science/security-countermeasure
Evans, B. (2015, Juy 8). The Importance of Building an Information Security Strategic Plan. Retrieved from SecurityIntelligence: https://securityintelligence.com/the-importance-of-building-an-information-security-strategic-plan/
Kiuwan. (2019). Security standards in software development. Retrieved from Kiuwan: https://www.kiuwan.com/blog/security-standards-in-software-development/
Mustoe, L. (2020, July Friday). What is PCI Compliance? Retrieved from digitalguardian: https://digitalguardian.com/blog/what-pci-compliance
PAGE, V. (2020, May). What Is Amazon Web Services and Why Is It so Successful? Retrieved from investopedia: https://www.investopedia.com/articles/investing/011316/what-amazon-web-services-and-why-it-so-successful.asp
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.