Archive for December, 2021

cloud storage

Assignment #3

No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page
1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.

2.  If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)

3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.

Format Requirements

Paper must be double spaced, 11 or 12 pt font and 1 margins all around.
All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information.  These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.
Due Date
Apr 27, 2021 11:59 PM
Hide Rubrics
Rubric Name: 321 Assignment #3 Rubric

This table lists criteria and criteria group names in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method. You can give feedback on each criterion by tabbing to the add feedback buttons in the table.
Criteria   
Exceeds Expectations
Meets Expectations
Approaching Expectations
Below Expectations
Criterion Score
Content
20 points
Student explained clearly and in detail what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed exemplary critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.

Student thoroughly and clearly presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.

Student clearly, and in detail, explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed exemplary critical thinking in this discussion and substantiated their response with more than 2 resources.

Points Available: 18-20

17.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud. Student displayed solid/good critical thinking as evidenced by their response to this question and usage of resources to substantiate their response.

Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so. Student’s discussion addressed each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and used resources to substantiate their response.

Student explained at least three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed solid/good critical thinking in this discussion and substantiated their response with  2 resources.

Points Available: 16-17.9

15.9 points
Student explained what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud in a limited/incomplete/incorrect manner. Student displayed limited or no critical thinking as evidenced by their response to this question and lack of usage of resources to substantiate their response.

Student presented the key considerations to be taken into consideration for someone to protect their data on their computer and why they should take steps to do so in a limited/incomplete/incorrect manner.  Student’s discussion did not address each key element (i.e., intrusion, issues such as ransomware, how incidents occur, etc.) in a clear manner and/or response was limited/incomplete/incorrect. Student used 1 or less resources to substantiate their response.

Student explained less than three ways that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession. Student displayed limited to no critical thinking in this discussion and substantiated their response with  1 or less resources. 

Points Available: 14-15.9

13.9 points
Did not  fulfill  one or more requirements for this assignment.

Points available D: 12-13.9

Points available F: 0 -11.9

Score of Content,/ 20
Format/Grammar/Spelling/Timeliness
10 points
Student followed APA format correctly (Cover page, in text citations and reference page)

Student followed all format directions for this assignment

Student had no more than 1 grammar or spelling error

Student submitted assignment on time

Points available: 9-10

8.9 points
Student mostly used APA format correctly but does have one or more errors (Cover page, in text citations and reference page)

Student mostly followed all format directions for this assignment but has 1 or more errors.

Student submitted assignment on time

Points available: 8-8.9

7.9 points
Student did not follow APA format correctly and has more than one error (Cover page, in text citations and reference page)

Student mostly followed the format directions for this assignment but has more than 2 errors.

Student submitted assignment on time or within 2 days of the deadline passing

Points available: 7-7.9

6.9 points
Did not  fulfill format/grammar/spelling/timeliness expectations for this assignment

Assignment was 5 or more days past due.

Points available D: 6-6.9

Points available F: 0-5.9

Score of Format/Grammar/Spelling/Timeliness,/ 10

Coursework 2

The report length is 3500 words. When counting your words, please exclude the text in figures, tables, Section 1 (Title Page and Table of Contents) and Section 7 (References). The word count must be included in the Title Page.

This assessment uses the work undertaken in Coursework 1 as its foundation. This time however, you must take the opportunity to demonstrate your learning from all OR many of the units of the module to present a case study that shows how theory can be useful in appraising activities and performance of an organisation.

The formal learning outcomes that coursework 2 will contribute to are:

1.      Evaluate the role of an organisations internal capabilities and how these may be structured to attain competitive advantage.

2.      Appraise the role and scope of specific business functions and their contribution to an organisations success.

3.      Analyse and evaluate the significance of key, cross functional processes essential to the delivery of customer value.

The Task: Written report (organisation case study)

The task requires you to:

briefly recap on the introduction to your chosen organisation from Coursework Summative Task 2 introduce the elements of theory that you are using.
discuss the ways in which you can see the theoretical principles being applied (or ignored) in the organisation.
The assignment should demonstrate your understanding of the concepts, the ability to select and discuss relevant literature and to apply knowledge of functional areas to the overall process.

The most important part of this assignment is critical appraisal of the extent to which the current models of good practice in management can be seen to contribute or not to the organisations success.
The report must include the following activities, which you will be grouping in 5 sections:

1.    Identification and description of organisation

Using the same organisation as you did in Coursework Summative Task 2, you can then re-use most of the same data.  If for some reason you have had to change the organisation you must make clear the background to the new organisation and justify the reasons for using it as a focus for your study.  Details should be placed in an Appendix.

2.    The Value and Supply Chains: Establishing relevant theoretical underpinning and application of theory to the particular organisation

This is essential to demonstrate that you are able to take the theoretical material included in each section of the module and apply relevant selected parts of it to use a foundation or framework for the examination of practice in a live organisation.  There must be explicit use of, and referencing to, published academic sources. Evidence of wider reading and research will enhance your mark in this area.

The evidence presented by you of the practice in your organisation must be related to the theory you have chosen to use – there must be a fit between the theory and the practical evidence.  The facts relating to your organisation must be relevant and clearly explained.

3.    Appraisal of contribution of other models to organisational success including SWOT analysis

This is another very important ability for you to demonstrate. You are expected to come to a conclusion about the relevance and suitability of the theory in relation to the organisation you have chosen to study. This appraisal must be reasoned and grounded in the evidence you have presented. It is the strength of your reasoning that matters here and the justification of  your conclusion.

4.    Design and layout

Your work should communicate your ideas in an interesting and appropriate way that adds to the evaluation and discussion within the text.

5.    Quality of text and diagrams or graphics as appropriate

Text, diagrams and any graphics should be clear, readable and used in an appropriate context.

Bibliography and references

The sources of ALL the information should be referenced in proper format. If you are unsure about the proper way to construct a bibliography and cite references, the library has guidance notes available.

The bibliography demonstrates the range of your reading. Remember that there must be evidence in the text that you have applied the reading you have done.