Analyze the differences in the types of authorization

Assignment Help Computer Engineering
Reference no: EM131309898

Assignment 1

System Security Certification and Accreditation

Becoming better acquainted with the history of accreditation and authorization has made you aware that you need to start planning tasks in order to complete a system authorization in a timely manner. In addition you need to clarify the additional assurance provided to justify the extra resources to your CIO.

The project deliverables for week 2 are as follows:

• Update the Case Study Report title page with new date and project name.
• Update previously completed sections based on instructor feedback.
• The History of Accreditation and Authorization Section:

o Analyze the differences in the types of authorization.
o Explain how the authorization process applies to the new database system.
o Give your CIO a brief clarification of the additional assurance provided by the the NIST RMF process, to justify the extra time and money for additional tasks.

Assignment 2

Project Planning, Execution and Closure

Assigning team members to task roles is a delicate and critical task. When done correctly, the team members will be excited about their role on the project, feel confident they can successfully complete the tasks assigned, and know they will have some conquerable challenges as they move through the project.

To effectively assign tasks to people (and people to tasks), the project manager must perform the following:

• Identify the roles needing to be filled.
• Determine the skills required for each role.
• Determine the skill sets of the team members.
• Assign team members to roles.

The objective for this assignment is to effectively select your team from the following people:

• Pat is available for 24 hours a week at $115 per hour. Pat was involved in several upgrade projects for this package and can act as business analyst, developer, or tester. Pat is very comfortable with the legacy system and does not see the benefit of moving to the Web-based version. He feels that the end users do not fully utilize the functionality they already have and will not use this new functionality effectively.

• Terry is available for 24 hours a week at $100 per hour. Terry was involved in the original installation and every upgrade since then. She tends to be in developer or tester roles for this system but acts as business analyst for other systems. She is very excited about the Web-based package and the functionality it provides. She is concerned, however, that the end users do not have the computer savvy to use it.

• Robin is available for 30 hours per week at $100 per hour. She was involved in the last two upgrades as a business analyst and has been trying to become involved in other systems and business areas. She was actively involved in the development of a custom Web-based application as a programmer. This was considered a skills development opportunity because her Web programming skills are not strong.

• Chris is available for 24 hours per week at $80 per hour. He is new to the IT department; he was previously a customer service representative. He just completed his undergraduate degree in computer science and has experience with Web programming and software testing techniques.

• Jan is available for 16 hours per week at $115 per hour. Jan is also new to the IT department. She was previously a consultant and was on process reengineering projects, including several for billing functions. She previously worked with the Web version product of the vendor's competitor.

Assignment Guidelines:

• In this assignment, you are planning to fill the roles for the following 3 positions:

o End user
o Business analyst
o Team leader

• For each role,
o Describe the main responsibilities of the role.

o Identify the skills that are necessary.
o Select one of the candidates listed in the assignment description, and thoroughly explain why you have chosen each person for his or her role.

- Explain any conflicts or problems that you encountered while making your selections.

Use correctly APA style formatted references of solid academic quality for your resources and use correctly formatted APA style in-text citations to your references to substantiate your information and positions as well as to give credit to other author's work.

Reference no: EM131309898

Questions Cloud

Encodes a string by replacing all letters : Write a program ReplaceTester that encodes a string by replacing all letters "i" with "!" and all letters "s" with "tiny_mce_markerquot;. Use the replace method. Demonstrate that you can correctly encode the string "Mississippi". Print both the ac..
Explain the role of ethics and social responsibility : Define and explain the role of ethics and social responsibility in developing a strategic plan while considering stakeholder needs and agendas.
What was your real rate of return : You earned nominal returns of 12.31 percent on your investments for a time period when the risk-free rate was 7.3 percent and the inflation rate was 7.56 percent. What was your real rate of return?
Preferred stock and remainder in common equity : You were hired as a consultant to ABC Company, whose target capital structure is 43% in debt, 29% in preferred stock, and remainder in common equity. The before-tax cost of debt is 3.7%, the cost of preferred stock is 8%, and the cost of common equit..
Analyze the differences in the types of authorization : Analyze the differences in the types of authorization. Explain how the authorization process applies to the new database system. Determine the skill sets of the team members.
Summarize what you have learned regarding personal case : Summarize what you have learned regarding personal case and what you believe should be the actions taken next to either make the change successful, permanent, or put it back.
Write a brief description of the presenting problem : Write a description and critique of the beginning tasks and skills that you used during the interview based on what you have learned about these tasks and skills. Click the link below for an inventory of beginning tasks and interviewing skills Beg..
Write a graphics program that draws your name in red : Write a graphics program that draws your name in red, contained inside a blue rectangle. Provide a class NameViewer and a class NameComponent.
Equity plan and levered plan : ABC Corporation is comparing two different capital structures, an all equity plan (Plan I) and a levered plan (Plan II). Under Plan I, ABC would have 74,250 shares of stock outstanding. Under Plan II, there would be 39,125 shares of stock outstanding..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd