Information Technology has currently become a strategic aspect in creating innovation, opportunities, and competitive advantage. However, what it entails is inherent risk related to integrity, confidentiality, and availability of information which require attention. COBIT 5 has been applied by companies to streamline the sharing of information, incorporating IT in to the strategy to reach corporate goals, minimizing and controlling risk management and information security, and optimizing the costs surrounding technology and IT (Shahi, Sadoughi & Ahmadi, 2015).
1. Describe how organizations establish the five (5) COBIT IT governance focus areas: strategic alignment, value delivery, risk management, resource management, and performance management
STRATEGIC ALIGNMENT: The Organization have concentrates on guaranteeing the linkage of business and IT arranges, on characterizing, keeping up and approving the IT esteem suggestion, and on adjusting IT operations to big business operations.
VALUE DELIVERY: They have attempted however much as could reasonably be expected to executing and actualize key arrangement the quality suggestion all through the conveyance cycle, guaranteeing that IT conveys the guaranteed advantages against the procedure, focusing on enhancing costs and demonstrating the inborn estimation of IT
political science assignment help
,
RESOURCE MANAGEMENT: Organizations have manage ideal interest in, and the best possible administration of, basic IT assets: forms, individuals, applications, foundation and data. Key issues identify with the enhancement of information and foundation.
RISK MANAGEMENT: Association have teach requires hazard mindfulness by senior corporate officers, a reasonable comprehension of the venture’s ravenousness for danger, straightforwardness about the huge dangers to the undertaking, and inserting of danger administration obligations into the association.
PERFORMANCE MEASUREMENT: They have kept up tracks and screens technique execution, venture consummation, asset utilization, process execution and administration conveyance, utilizing, for instance, adjusted scorecards that make an interpretation of system enthusiastically to accomplish objectives quantifiable past traditional bookkeeping.
2. Suppose senior management has tasked you with the planning of the COBIT compliance project. In terms of the COBIT framework, predict which key areas are likely to be problematic to implement. Suggest at least two (2) possible solutions to these problematic areas.
Risk management
IT hazard administration does not work “out of the container.” It is not an item to buy or a strategy to set up. Rather, it is a procedure of business danger administration that must be performed on a progressing premise. It is basic for an association to ceaselessly inspect the dangers and security destinations inside its business surroundings, and efficiently heat insurance into the way it works. This should be done to manage risks.
Information Security Governance
Overseeing interests in the execution and operation of controls is basic, since security can be a costly and tedious undertaking, and experience has demonstrated that vast totals of cash can be squandered on incapable or insufficiently actualized specialized arrangements. In any case, demonstrating security ROI can be troublesome since genuine decreases in misfortunes or occurrences must be appeared, and it is at times difficult to know whether a danger has been averted (Fletcher, 2006). Some of the possible solution toward achieving this is:
References
ISACA,
COBIT 5 Implementation
, USA, 2012, chapter 3 and chapter 6
Shahi, M., Sadoughi, F., & Ahmadi, M. (2015). Information Technology Governance 7(3), 200.
Fletcher, M. (2006). Five domains of information technology governance for consideration by boards of directors (Doctoral dissertation, University of Oregon).
Book Review
Name
Institutional Affiliation
Date Submitted
Freedom Struggles
Book Review
The book Freedom Struggles by Adriane Danette Lentz-Smith examines accounts of more than 200,000 black soldiers who were in the frontline of the war and the impact of what they saw during warfare. The author starts with a captivating statement which says that she does not want to tell a story about war but rather wishes to tell a story through war. The book goes on further to state that the American modern civil rights movement which turned out to be one of the most vital moments in recent history in terms of social movements was a result of the struggle to bring down Jim Crow (Lentz-Smith, 2009). The issues that the soldiers had to go through during the war are also highlighted in the book which focuses on the definition and ideology of war in the mind of African Americans. For them it was not yet over after 1918 and this brought about a sense of the need for the American nation to restore democracy through equal citizenship. The war highlighted the need for urgent equal rights. Lentz Smith says that the war’s end the black American soldiers ceased the need to earn equal rights and sought to demand them. Black and white soldiers at the frontline clashed with one another just as they did their enemies. The African Americans fought back fiercely.
The war which lasted from 1914-1918 had originally been thought to last only for a few weeks but went on to last four years (Guglielmo, 2018). The American president then Mr. Woodrow Wilson had initially promised to keep America out of the war, citing that it was a European issue that he didn’t need to concern himself with. By the time it was 1917 however the elements of the war had reached American shores after Germany sank several vessels carrying American passengers in the Atlantic Ocean. The president then declared that “the world must be made safe for democracy” and said that America’s involvement in the war is to make the world safe for the rights of democracy to prevail on a global level. Many African Americans identified themselves with this statement by the president and in turn used it as a driving statement for their civil rights movement. They said that America should first of all clean its own mess within its borders by recognizing all citizens as equal before embarking on a global crusade to do the same. It was the driving force of the impending civil rights movement that was to happen. Many African Americans refused to take part in the war terming it as hypocritical that America would treat them as second class citizens and still demand” 100 percent Americanism” in the war.
Different societies at certain times in history have been wronged by others and therefore this hinders great multicultural development among the generations to come which is the moral lesson learnt from the book. This is part of the reason why even politics, sports and other fields of life are filled with claims of racial profiling and making decisions based on ethnic or racial discrimination (Lentz-Smith, 2009). Some black celebrities get entangled in messy or controversial situations like sex scandals, jail convictions and drugs and end up losing a successful career that would have otherwise been the inspiration to many people in the black community.
References
Lentz-Smith, A.D.(2009). Freedom Struggles. Havard University Press.
Guglielmo, T.A (2018).A Martial Freedom Movement: Black GI’s Political Struggles during World War II. Journal of American History, 104(4), 879-903.
Code of Ethics
Name
Institutional Affiliation
Date Submitted
Code of Ethics
In the current world, businesses are both driven and disrupted by software, which is created at a record-setting pace to run nearly everything. The continuous technological evolution has hugely changed the manner in which firms are run today. As the race hits up among firms looking to be leaders-to-market with the next products or services, consideration on the implications of such gadgets and systems which they may have on the society often are overlooked. Code of ethics is therefore required among tech companies in order to ensure that their intentions are good willed when it comes to delivering goods and services. Among the most effective ways which businesses can achieve transparency is through developing their own internal code of ethics which may include;
1) Outside Activities
Unless an employee has been appropriately authorized and disclosed, in general, he or she should not engage in outside activities, perform outside services or accept outside employment for compensation; including a fee received for consultation, and if the action will subject the company to criticism, lead to conflict of interest, reflect adversely on the company, interfere with one’s regular duties, or, encroach upon working time. Any worker is encouraged to seek guidance from Senior Compliance Officer or their supervisors in the determination of the appropriateness of any such activities (Trevino, Linda & Katherine, 2016).
Unless required by judicial order, the company’s Executive Officer must approve any public testimony, in advance before any governmental agencies or legislative bodies, or any other outside speaking engagement, publications, or industry conferences, referring or relating to the company business.
Subject to the general limitations, one may engage in other outside speaking engagements, publications, or public testimonies which do not refer or relate to the company, such as speaking or writing
finance homework
.
2) Corporate Opportunities
The company employees who are covered by the Code owe a duty to the company to advance its business interests when such opportunities arise, and they are prohibited from; using corporate information or property for individual gain; taking personal opportunities discovered through exploitation of the company property; competing with the company during employment.
The business opportunities which are actively solicited by, or that were pursued by, or are offered to, any individual covered by the code using the company’s facilities, funds, or personnel belong to the business (Riek & Howard, 2014). An employee should not take for his or her own benefit, to assist others take for their benefit an opportunity which belongs to the company unless such opportunity sis first offered to the company and declined, and if the worker’s involvement will not pose a conflict. Such business opportunities may include; lease, loans, investment, or other transactions. An employee should not engage in self-dealing with the company, or any other business which the company competes with it.
https://smashingessays.com/tag/finance/
3) Fair Dealing
Any person covered by the code must undertake to deal fairly with the company’s fellow employees, guests, competitors, and suppliers. Again no individual should stake unfair advantage or another through manipulation, abuse of privileged information, concealment, misrepresentation of material facts, or other unfair dealing practices.
Workers must disclose prior to the time of hire if other employment agreements exist, non-solicitation or non-compete agreement, confidentiality agreement or similar agreement which in any manner prohibits or restricts the performance of responsibilities and duties of their positions with the company (Kaplan, Francis, Hermann, Baca, Good nough, Hodges & Wade, 2017). Copies of such agreements should be provided to the company’s Senior Compliance Officer together with another authorized Executive Officer to permit the agreement evaluation highlight of the worker’s position.
In no any event will workers be entitled to using any proprietary information, trade secrets, or other similar acquired in the course of employment with other employers, in his or her duty performance for or on behalf of the business.
References
Trevino, Linda K., and Katherine A. Nelson. Managing business ethics: Straight talk about how to do it right. John Wiley & Sons, 2016.
Riek, L., & Howard, D. (2014). A code of ethics for the human-robot interaction profession.
Kaplan, D. M., Francis, P. C., Hermann, M. A., Baca, J. V., Goodnough, G. E., Hodges, S., … & Wade, M. E. (2017). New concepts in the 2014 ACA Code of Ethics. Journal of Counseling & Development, 95(1), 110-120.
https://onlyessayhelp.com/tag/music-assignment-help/
DataModeling and Warehousing
Institution Affiliation
Name
Date
Data warehousing can be described as a centralized storehouse that reserves data from various info sources such like marketing, sales, in supply chain management among others. This is aimed at changing the information into understandable models with are easy for analysis and querying in instances like universities.
A university is a large organization which becomes very complex when trying to identify the best business drivers. In that case, software makers give out programs that aid in assisting big institutions in identifying and monitoring their business drivers. The best business drive that a university can adopt is data warehousing that stores data from multiple sources and this is enabled by the enterprise resource planning software. Most universities face difficulties when it comes to sorting and arranging data that exists with the new data. For instance in a case of a certain university in the United States, they had to acquire and get their data manually which is very tiresome and a lot of time is wasted. In additional, the university also had to incur a lot when updating their new infrastructure due to update in technology
college essay help
.
Using softweb gave the university an organized view of the important data in the institution and which included a data warehousing solution. With good and organized dashboards, it has become very easy for the university to analyze, get clear statistics and also maintain contracts within the organization. We can argue that in the coming ten years that all big institutions that will not have been grounded deeply embedded in their way of their business model will have a likelihood of ceasing to exist (Jarke, 2013).
Transactional systems are best used for class enrolment because it a type of information system that compiles, stores, reorganizes and reclaims all data transactions of an institution. The transactional systems have components similar to those of quick enroll component. The transactional processing system reduces workload and gives out accurate information needed when enrolling students. This system has certain features that are considered important when enrolling learners. The first one is performance which is measured by a good number of transactions made in the certain period. The system is also always available in all this process of class enrollment. Most institutions depend on transactional processing system since it does not disrupt operations being carried out.
Transactional system is able to handle both software and hardware issues without corrupting the existing data. The large numbers of users have the right to be protected from attempts of interfering with data. The system is also very easy to use and helps the users avoid data entry errors as much as possible. This system is flexible for growth and does not require any replacement. It is easy to add, change or even replace hardware and software components and does not require shutting down the whole system.
Transactional systems might fail to work due to various reasons such as human errors, system and hardware failures, data which is invalid or wrong, viruses, software errors or even disasters caused by nature or man. It might not be possible to prevent all this errors from the systems but TPS is able to detect the errors and cope up with them (Bog, 2014).
A university should always be updated on the new technology to ensure their infrastructure is good. The institution should also come up with the best business drives to ensure that their data is secure and also be able to allocate data when needed. Universities need to use the best systems to ensure that they run their programs effectively and avoid any errors.
References
Bog, A. (2014). Benchmarking transaction and analytical processing systems: The creation of a mixed workload benchmark and its application. Berlin: Springer.
Assignment help
Jarke, M. (2013). Fundamentals of data warehouses. Berlin: Springer.
Archive.py
#
!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# server.py
#
# Copyright 2014 Recursos Python –
www.recursospython.com
#
#
from socket
import socket
, error
def main():
s = socket()
# Escucharpeticionesen el puerto 6030.
s.bind((“localhost”, 6030))
s.listen(0)
conn, addr = s.accept()
f = open(“recibido “, “wb”)
while True:
try:
# Recibirdatos del cliente.
input_data = conn.recv(1024)
except error:
print(“Error de lectura.”)
break
else:
if input_data:
# Compatibilidad con Python 3.
if isinstance(input_data, bytes):
end = input_data[0] == 1
else:
end = input_data == chr(1)
if not end:
# Almacenardatos.
f.write(input_data)
else:
break
print(“El archivo se ha recibidocorrectamente.”)
f.close()
if __name__ == “__main__”:
main()
Clinen2.py
import socket
import os
import subprocess
s = socket.socket()
host = ‘127.0.0.1’
port = 1234
#def main():
s.connect((host, port))
while True:
f = open(“archivo “, “rb”)
content = f.read(1024)
while content:
# Enviarcontenido.
s.send(content)
content = f.read(1024)
break
while True:
data = s.recv(1024)
if len(data) > 0:
if data.decode(“utf-8”) == “ping”:
s.send(str.encode(“pong”))
else:
(“[Server] ” + data.decode(“utf-8”))
try:
s.send(chr(1))
except TypeError:
# Compatibilidad con Python 3.
s.send(bytes(chr(1), “utf-8”))
# Cerrarconexión y archivo.
s.close()
f.close()
print(“El archivo ha sidoenviadocorrectamente.”)
Server2.py
import socket
import sys
import threading
import time
from queue import Queue
NUMBER_OF_THREADS = 2
JOB_NUMBER = [1,2]
queue = Queue()
all_connections = []
all_address = []
flag_msg = False
# Create a Socket ( connect two computers)
def create_socket():
try:
global host
global port
global s
host = “”
port = 1234
s = socket.socket()
except socket.error as msg:
print(“Socket creation error: ” + str(msg))
# Binding the socket and listening for connections
def
bind_socket()
:
try:
global host
global port
global s
print(“Binding the Port: ” + str(port)+”\n”)
s.bind((host, port))
s.listen(5)
except socket.error as msg:
print(“Socket Binding error” + str(msg) + “\n” + “Retrying…”)
bind_socket()
def accepting_connection():
for c in all_connections:
c.close()
del all_connections[:]
del all_address[:]
while True:
try:
conn, address = s.accept()
s.setblocking(1) #Prevents Timeout
all_connections.append(conn)
all_address.append(address)
print(“[ New Slave ] [ IP : “, address[0] , ” ] [ PORT : ” , address[1] , ” ]”)
recvmsg(conn,address)
except socket.error as msg:
print(“Error Accepting Connections: “+msg)
def start_menu():
while True:
server_input = input(“> “)
if (server_input==’list’):
list_slaves()
elif(‘select’ in server_input):
conn = get_slave(server_input)
if (conn is not None):
send_msg_to_slave(conn)
else:
print(“[ Command not found ]”)
def list_slaves():
results = “”
for i, conn in enumerate(all_connections):
try:
conn.send(str.encode(“ping”))
conn.recv(201480)
except:
del all_connections[i]
del all_address[i]
continue
results = results + str(i) + ” ” + str(all_address[i][0]) + ” ” + str(all_address[i][1]) + “\n”
print(“—- SLAVES —-” + “\n” + results)
def get_slave(server_input):
try:
slave_id = server_input.replace(‘select ‘,”)
slave_id = int(slave_id)
conn = all_connections[slave_id]
print(“[ Connected to “+ str(all_address[slave_id][0]) +” ]”)
print(str(all_address[slave_id][0]) + “>”,end=””)
return conn
except:
print(“[NOT VALID ID]”)
return None
def send_msg_to_slave(conn):
while True:
try:
msg = input(“”)
if msg == “quit”:
break
if len(str.encode(msg)) > 0:
conn.send(str.encode(msg))
except:
print(“[Error sending msg to Slave]”)
def
start_threads()
:
for _ in range(NUMBER_OF_THREADS):
t = threading.Thread(target=work)
t.daemon = True
t.start()
def recvmsg(conn,addr):
f = open(“recibido.py”, “wb”)
while True:
try:
# Recibirdatos del cliente.
input_data = conn.recv(1024)
except error:
print(“Error de lectura.”)
break
else:
if input_data:
# Compatibilidad con Python 3.
if isinstance(input_data, bytes):
end = input_data[0] == 1
else:
end = input_data == chr(1)
if not end:
# Almacenardatos.
f.write(input_data)
else:
break
print(“El archivo se ha recibidocorrectamente.”)
f.close()
def work():
while True:
x = queue.get()
if x==1:
create_socket()
bind_socket()
accepting_connection()
if x==2:
start_menu()
queue.task_done()
def
create_jobs()
:
for x in JOB_NUMBER:
queue.put(x);
queue.join()
start_threads()
create_jobs()
Corrected Server.py
import socket
import sys
import threading
con=threading.Condition()
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
host=’192.168.1.101′
port=1234
data=”
true=True
s.bind((host,port))
s.listen(5)
def clientin(c,name):
global true,data
while true:
try:
t=c.recv(1024).decode(‘utf8’)
if not t:
c.close()
return
NotifyAll(t)
print(data)
except:
NotifyAll(name+’Exit’)
print(data)
return
def NotifyAll(word):
global true,data
if con.acquire():
data=word
con.notifyAll()
con.release()
def clientout(c,name):
global true,data
while true:
if con.acquire():
con.wait()
if data:
try:
c.send(data.encode(‘utf8’))
con.release()
except:
con.release()
return
print(‘Chat Established’)
while true:
c,addr=s.accept()
print(‘Connected to slave’+addr[0])
name=c.recv(1024).decode(‘utf8’)
NotifyAll(‘welcome’+name+’Slave’)
print(data)
cin=threading.Thread(target=clientin,args=(c,name))
cin.start()
cout=threading.Thread(target=clientout,args=(c,name))
cout.start()
s.close()
Corrected Client.py
#!/usr/bin/python
“””
client.py
simple port knocking client
Usage: ./client.py
{ikalantzis, vrachnis}@ceid.upatras.gr
“””
import socket
import sys
import time
def knock(sock, port, host):
“”” Ping the given host:port “””
sock.sendto(‘PING’, (host, port))
print “PING on %s:%s…” % (host, port) ,
# dont wait to print PONG
sys.stdout.flush()
try:
data, server = sock.recvfrom(100)
except socket.timeout:
print “Connection timeout.”
return False
if data != ‘PONG’:
print “Invalid server response (not PONG)”
return False
print “PONG!”
return True
def run(host, ports, tcpport):
“”” Begin the port-knocing sequence “””
udpsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# timeout after 3 secs, should be enough
udpsock.settimeout(3)
for port in ports:
if not knock(udpsock, port, host):
sys.exit()
# give the server some time to prepare
time.sleep(0.1)
if not opentcp(tcpport, host):
sys.exit()
def opentcp(port, host):
“”” Open the TCP connection after the port-knocking sequence “””
tcpsock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
tcpsock.connect((host, port))
tcpsock.send(‘PING’)
except socket.error:
print “Connection refused.”
return False
print tcpsock.recv(100)
tcpsock.close()
return True
def getopts(args):
“”” Validate command line arguments “””
if len(args) < 3:
print “Wrong parameters”
sys.exit()
# first argument is the server addr
host = args[0]
# the last is the tcp port
tcp = args[-1]
# the rest are udp ports
udp = args[1:-1]
try:
# validate host, we also support hostnames
host = socket.gethostbyname(args[0])
except socket.error:
print “Unknown server address.”
sys.exit()
try:
# convert string parameters to ints
return host, [int(x) for x in udp], int(tcp)
except ValueError:
print “Wrong parameters.”
sys.exit()
if __name__ == ‘__main__’:
host, ports, tcp = getopts(sys.argv[1:])
print “Server address: %s \nUDP ports: %s \nTCP port: %s \n” % (host, ports, tcp)
run(host, ports, tcp)
https://smashingessays.com/tag/nursing-coursework-help/