You are designing a multi-tier architecture for a web application on AWS. The application requires high availability and fault tolerance. Which AWS service or feature would you use to achieve this for the web servers?
Category: Computer Science homework help
Scenario The project manager for GDS is in the process of developing the Proje
Scenario
The project manager for GDS is in the process of developing the Project Scope Statement for the PMO Cloud Implementation Project. You were chosen to assist the project manager in creating the schedule and updating the Project Scope Statement.
Your first duty in preparing the schedule is to create the WBS in outline format, identifying activities and tasks to complete the project. After validating the project tasks to develop the WBS in outline format, you will transfer the WBS outline to your Project Management Information System (PMIS) software, Microsoft Project to establish Gantt chart and project milestones. The software tool Microsoft Project will make it easier for the project manager to monitor and control each phase of the project.
High- level, tasks for this project include, but not limited to the following:
Project Management
Local and Online Configuration
Unit and Integrated Testing
Client and Web application training
Develop User Manuals
Software Deployment
Business Impact Analysis (BIA) and Business Continuity Plan (BCP) Senior managem
Business Impact Analysis (BIA) and Business Continuity Plan (BCP)
Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.For this part of the project:
Research BIAs and BCPs.
Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
Critical business functions
Critical resources
Maximum acceptable outage (MAO) and impact
Recovery point objective (RPO) and recovery time objective (RTO)
Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.
Module 5 – Lab: File processing Introduction In this lab, you will create a GUI
Module 5 – Lab: File processing
Introduction
In this lab, you will create a GUI application that can read and write to a file. View the lab instructions and video provided below to help guide you through your efforts.
Module 5 – Project: Read and Write to Files Introduction In this part of t
Module 5 – Project: Read and Write to Files
Introduction
In this part of the project, you will use read and write to files. Read the CIS355A Module 5 Project GuideLinks to an external site. and view the project video below for instructions and details to help guide you through your efforts.
Need a 2 page answers for the attached 2 questions. All the details needed are i
Need a 2 page answers for the attached 2 questions. All the details needed are in the document. APA format, intext citations and references are must.
need answers in 12 Hours
Evaluate the most significant security problems associated with the web. First,
Evaluate the most significant security problems associated with the web. First, explain which threats are most significant and why. Next, discuss how identifying these potential threats can assist in the creation of an effective plan to mitigate these threats. Finally, in responding to your peers’ posts, discuss any potential threats that were not identified as well as the potential harm these threats could cause.
In order to effectively respond to applicable threats, information technology ad
In order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and fire wall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities.
Prompt
In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Specifically, the following critical elements must be addressed:
Risk Assessment
Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
Evaluate the threat environment of the organization.
Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.
What to Submit
Your paper must be submitted as a three- to four-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Using the Campus Bikes case study found in your module resources, complete the
Using the Campus Bikes case study found in your module resources, complete the Module Five Homework Activity. Using a Word document, you will answer four prompts based on the case.
Submit your assignment here. Make sure you’ve included all the required elements by reviewing the guidelines and rubric.
Using the case study Campus Bikes, complete the Module Five Homework Activity. Using a Word document, students will answer four prompts based on the case.
Answer the following prompts via a Word document:
List possible objects in the new bike shop system, including their attributes and methods.
Identify at least three possible use cases and two actors.
Create a use case diagram that shows how service requests are handled.
Create a state transition diagram that describes typical customer states and how they change based on specific actions and events.
What to Submit
Homework Activity Module Five should follow these formatting guidelines: 1–2 pages, double-spacing, includes identification of 3 objects, 2–3 methods and attributes, 3 use cases and 2 actors for each of the objects in the new bike shop’s system, 12-point Times New Roman font, one-inch margins, and APA citations.
In your initial post, discuss your thoughts on the value of developing case diag
In your initial post, discuss your thoughts on the value of developing case diagrams. Do you believe case diagrams will benefit the process, or do you believe they do not bring value to the process? Support your opinion. There is not a right or wrong answer. This is a reflection of your thought. This topic in particular is one that is and can be very polarized in an IT department.
In responding to your peers, select a post you align with, and discuss how you will work with Dan DisAgree on your project team. Dan DisAgree has the opposite opinion of case diagrams than you; however, Dan is reasonable and open to change. In your post, include at least one of Dan’s disagreements and provide a persuasive response to influence Dan’s opinion.