Excel Analysis Asiignment

I have uploaded the rubric please read it.

2.I have uploaded the excel anlysis instructions as well so please read them.

2.I have uploded the required data points to solve and complete the following :

Your Deliverable:

· Write up your findings in a Word Document with Executive Summary (no more than 900) that answers your boss’ questions. Use screen clippings of the analysis you did in Excel as evidence to support your conclusions (75%).

· Also submit your Excel workbook that shows your calculations, charts, figures, tables, etc. (25%).

· At this point, you should be very comfortable with some of the analytical tools within Excel, and this is an opportunity to show that. Be sure to follow the guidelines set in the BA 325 Information Literacy Assessment Rubric (You may use any font size/style/paragraph spacing/line spacing that you are comfortable with).

Strategic Management and Strategic Competitiveness

Strategic Management and Strategic Competitiveness

Overview

Choose one public corporation in an industry with which you are familiar. Research the company on its own website, the public filings on the Securities and Exchange Commission EDGAR database, the University’s online databases, the Nexis Uni database, and any other sources you can find. The annual report will often provide insights that can help address some of these questions.

Requirements

Write a four- to six-page paper in which you do the following:

  • Assess how globalization and technology changes have impacted the corporation you researched.
  • Apply the industrial organization model and the resource-based model to determine how your corporation could earn above-average returns.
  • Assess how the vision statement and mission statement of the corporation influence its overall success.
  • Evaluate how each category of stakeholder impacts the overall success of this corporation.
  • Go to Basic Search: Strayer University Online Library and locate at least three quality references. Note: Wikipedia and similar Websites do not quality as academic resources.

Use the Assignment 1 Template [DOCX] to ensure that your assignment meets the above requirements.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcome associated with this assignment is the following:

  •  Determine the impact of globalization and technology changes, strategic models, vision and mission statements, and stakeholders on a corporation’s success.

Grading for this assignment will be based on answer qua

Discussion On Successful Organizations

Throughout the term you have explored an examined numerous topics around management and leadership.  Successful organizations require an environment of support, sustainability, and life-long learning.  As an emerging leader share two lessons learned and how you will implement them within your current role and organization.

Cloud Migration

You are a systems engineer contracted to move The Grass is Greener, Inc. (GIG, Inc.) from their on-premises data center to the cloud. GIG, Inc. is a large landscaping company that has outgrown their current IT structure. They have a strong online presence that provides 50% of their new customer traffic and the convenient online payment section for customers. Both of these front-ends are connected to a back-end database that houses critical data that includes inventory, scheduling, pricing history, and personal identifiable information of their customers. Below are the company’s requirements:

  • The company has a webserver and database that they definitely want to move to the cloud. The system will need to be accessed from different offices as well as in the field.
  • Secure network connectivity to the environment is a must.
  • They also have a file server that they are considering migrating based on long-term costs.
  • The company keeps files for a period of 5 years for compliance reasons.
  • Company management is very concerned about increased technology costs.
  • Last year, the company lost several thousand records due to a hard drive failure. They would like to ensure that any solution provided takes into account redundancy and reliability.

Create a 2- to 3-page summary that discusses the benefits and concerns of moving to a cloud environment. Ensure you include this information in your summary:

  • Costs
  • Technology
  • High level design options (IaaS, SaaS and PaaS)
  • Security
  • Reliability

Linux Training Guide

Introduction

<You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a tutorial that will demonstrate how to install Linux and provide an overview of several common commands, as listed below.>

<The recommended format is to provide screenshots incorporated within the written narrative. No sources are required for this phase of the project; however, the screenshots must all be your own. Screenshots from external sources are not permitted.>

<Provide the reader with an introduction that includes what you intend to cover in the training guide.>

 

Part 1

<Use any hypervisor of your choice to install Linux. Many hypervisors are available, including Oracle’s VirtualBox, an open source (free) virtualization product. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. Ask your Professor for access to VMware.>

<NOTE: It is not necessary to include screenshots of installing the hypervisor software.>

<Walk the technician through an install of the distro, using appropriate screenshots for the major steps. You should include at least 3 screenshots (e.g., disk partitioning, time zone selection, creating the default account) of your installation accompanied by a brief explanation of what you did.>

Example screenshot

<Example Distro Homepage Screenshot>

<After downloading, how will you ensure the file has not been tampered with prior to use?>

A screenshot of a cell phone  Description automatically generated

<Example Distro Install in progress Screenshot>

…and so on. 

<The last step in part 1 should show the final distro desktop>

 

Part 2

<Demonstrate command-line operations that will provide the following information. Ensure you provide clear screenshots to show the results of each command you run:>

<Ensure all Linux commands are displayed in lowercase and explain acronyms on first use, (e.g., Secure Shell (SSH)).

· The manual page for a given command.

· The current directory.

· Display a listing of files in a directory and common file attributes. The display should list the most recent files last.

· Create a file, then copy it to a different directory. Create a second file and move it to a different directory. Remove the first file, as well as the copy you created.

· Create a text file, then use an editor to modify the content. Then display the content of the modified file.

· Show running processes on the system. Demonstrate how to search for a specific process.

· Forcibly stop a running process.

· View the system logs. Determine what logging system is in place. Display the configuration for the logging system.

· View the state for the logging daemon.

· Backup the file used for local name resolution.

 

Part 3

<This portion of the training guide helps determine your submission is unique. Thus, you must include the specific screenshot as seen below or your project will not be accepted.>

<Open a command line and type in the following commands (without the quotes) :>

“date”
“echo CMIT391”
“echo <your name here>” (Replace your name here with your name)

example of final screenshot

<Example Final Screenshot>

Conclusion

<Provide a conclusion of at least a paragraph summarizing why using Linux is beneficial for employees, management, and the organization as a whole>.

 

References

<These example citations use IEEE style. Ask your instructor for clarification on the style to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ Encryption. [Accessed December 1, 2019].

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed December 6, 2019].

[3] Canonical Ltd. “Download Ubuntu Desktop,” Ubuntu Downloads, 2019 [Online]. Available: https://ubuntu.com/download/desktop. [Accessed Sept. 23, 2019].

Cyber Security Application Portfolio

 

Southampton Solent University

Coursework Assessment Brief

Assessment Details

 

Unit Title: Cyber Security Application
Unit Code: COM713
Unit Leader: Andy Farnell
Level: 7
Assessment Title: Cyber Security Application Portfolio
Assessment Number: 1
Assessment Type: Portfolio
Restrictions on Time/Word Count: 3000 words
Consequence of not meeting time/word count limit: There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.
Individual/Group: Individual
Assessment Weighting: 100%
Issue Date: 21st January 2020
Hand In Date: 26th May 2020
Planned Feedback Date: 24th June 2020
Mode of Submission: on-line
Number of copies to be submitted: 1
Anonymous Marking

 

This assessment will be marked anonymously

Assessment Task

 

As a motive to writing your portfolio imagine a context, like a company or organisation you work for, for example consider the following scenario (you can pick another if you like as a frameork for your system security portfolio):

 

Oppression Watch is a rights organisation supplying legal advice, counselling and information to a vulnerable group. Having many political enemies, foreign and domestic, online  and offline, the organisation is a high exposure target.

 

As a member of the software security and privacy task force you are to audit and make recommendations for the transformation of their systems, policies and processes.

 

Alternatively you may choose your own fictional organisation with complex digital security needs.

 

Scope

 

You are to consider the areas of:

 

  • Data storage, integrity, privacy, compliance.
  • Secure communication for both organisational staff and clients
  • System hardening, including servers, offices, and mobile devices
  • Personnel and operational security

 

 

Your portfolio should include an understanding and appreciation of a range techniques related to the principles and technologies of cyber security in practical application. In particular you should demonstrate awareness of:

 

  • Threat and vulnerability modelling, risk prioritisation
  • Anticipation of emerging threats
  • Access control, authorisation
  • Defensive system design principles, in depth and breadth
  • Scope, lifecycle, maintenance and sustainability
  • Technologies, options for technical implementation
  • Encryption for communications and storage
  • Policies , monitoring, response plans
  • Cost, roles, skills and human resources
  • Trade-offs, compromises and push-backs

 

Presentation

 

A 3000 word concise technical report will for the basis of your portfolio, and it may include screenshots, terminal logs, tables, lists, flow diagrams, or any other appropriate graphics or formulae summarising key techniques and considerations. Emphasise the practical execution of auditing and hardening tasks and comment on difficulties or lessons learned.

 

 

COVID-19 mitigations:

 

 

Due to the inaccessibility of the labs and the fact that not everyone has access to

virtual machine technology you may either choose to create portfolio material on your own using a terminal emulator, or to submit referenced exerpts of quality HOTO guides (for example StackExchange) to illustrate what you would do. Citations must be given.

Assessment criteria

Your submission will be assessed against the following criteria:

 

Criteria Below threshold Grade D Grade C Grade B Grade A
Security Engineering principles Little or no evidence of security thinking. Contradictory, dangerous or misunderstood technique. Weak security engineering with partial understanding of some key issues. Viable security thinking with understanding in most key areas. Fair understanding of risks and mitigations. Good security thinking with some flair for grasping complex risk concepts and some defences. Broad and deep understanding, holistic integrated approach, pragmatic   and balanced. Evidence of complexity thinking. Informed by best practice and relevant policy. Insightful understanding of current and emerging threats.
Technologies Implementation Configuration No technological basis for implementing the process is shown. Unrealistic implementation or poor choices of technologies. Misconfiguration or misunderstandings of tools.

No substantial plan.

A plausible set of tools and technologies with proper description of their set-up and use. Some treatment of planning and test. Extensive set of technical measures and ideas to deal with multiple threats. Evidence of research and understanding of the resources needed to deploy. A textbook deployment of state-of-the-art solution. Comprehensive, well researched proposal, with milestones, test criteria, depth, redundancy,

cost and skill-set needs.

Presentation and communication of ideas Incoherent, unreadable report without structure, substantial content or references. Poorly structured and written report, lacking strong communicative skills, no use of visual or tabulated data, few or no references, or poor quality research sources. An adequate report that communicates the key ideas in an effective and concise way. References given as evidence of research reading. Appropriate sourcing. A good report that concisely but extensively deals with significant scope. Well researched, argued points. Good use of visuals and structure. Great referencing from well chosen high quality sources. An excellent report with well written, well informed  compelling arguments, concise and nicely structured. Clever use of compact visual devices. High quality, up to date research with excellent referencing.

 

 

 

 

 

Learning Outcomes

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions

 

Students are reminded that:

 

  • If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;
  • If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;
  • If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy-annex-1-assessment-regulations.pdf?t=1411116004479

 

Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not ‘fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.

 

A summary of guidance notes for students is given below:

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-4/4p-extenuating-circumstances-procedures-for-students.pdf?t=1472716668952

 

 

Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.

 

Procedures relating to student academic misconduct are given below:

 

http://portal.solent.ac.uk/support/official-documents/information-for-students/complaints-conduct/student-academic-misconduct.aspx

 

 

 

Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.

 

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2s-university-ethics-policy.pdf

 

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.

 

Policy:           http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf

 

 

Guidance for online submission through Solent Online Learning (SOL)

 

http://learn.solent.ac.uk/onlinesubmission

 

 

 

Software Design and Development

Southampton Solent University

Assessment Brief

Assessment Details

 

Unit Title: Software Design and Development
Unit Code: COM714
Unit Leader: Prins Butt
Level: 7
Assessment Title: Tourist Office
Assessment Number: 1
Assessment Type: Software Artefact with Report
Restrictions on Time/Length : 2000 Words for Report + Software Artefact
Individual/Group: Individual
Assessment Weighting: 100
Issue Date: 16th March 2020
Hand In Date: 8th June 2020
Planned Feedback Date: 6th July 2020
Mode of Submission: Online
Mode of Marking: Online
Mode of Feedback: Online
Number of copies to be submitted: 1

 

 

 

Scenario

 

An internationally well-known city is developing an application, to be installed in tourist offices, to allow tourist information centre staff to look up and book hotels in the city on behalf of customers.

 

A tourist would visit the tourist office and ask the staff to look up hotels of a given star rating, where 1-star is the cheapest and 5-star the most expensive. The tourist office staff would then search for matching hotels using the application.

 

Having searched for a hotel, the tourist office staff should then be able to view the full details of a given hotel and book it for the tourist.

 

The application should also allow staff to add new hotels.

 

 
Task

 

Your task is to analyse this problem and design, build and test a prototype application in Java using a Swing GUI. (You do NOT need to worry about the implementation details of touchscreen applications.)

 

To do this, you should do the following:

 

  1. a) Derive an initial domain model for this scenario.
  2. b) Draw up a use case diagram for the following use cases:

 

* View full details of a given hotel by name (assume that no two hotels have the same name). Full details should include price, address and number of free rooms.

* Search for hotel by star rating

* Book a hotel. Payment does not need to be taken, this is done when the tourist visits the actual hotel.

* Add a new hotel

 

  1. c) Create initial, analysis-level use-case texts for the use cases above.
  2. d) Using the use-case texts and domain model, draw up robustness diagrams for the use cases above.
  3. e) Use the robustness diagrams to refine the use-case texts and domain model, as appropriate.
  4. f) Draw up sequence diagrams for the use cases above.
  5. g) Use the sequence diagrams and domain model to derive a class diagram for the system.
  6. h) Implement the system in Java using a Swing GUI.

 

Report

 

Your analysis, design and testing artefacts and code must be accompanied by a report. This should include discussion of the following (half a page to a page for each – I am not looking for reams and reams of text!):

 

* Decisions you made when drawing up your domain model and use-case texts.

* Any new objects discovered when drawing up your robustness diagrams.

* Detail on any changes made to the domain model or use-case text as a result of drawing up your robustness diagrams, and why.

* Any decisions made when drawing up your sequence diagrams

* Detail on places where your code did not match your design, and why.

* Critical evaluation of your code and/or design

 

Handing in

Please upload a ZIP file to SOL containing all your code, analysis and design artefacts and report by the deadline.

Marking Criteria

 

  A1-A4 B1-B3 C1-C3 D1-D3 F1-F3
Analysis and design (30%) Work fully complete; additional considerations beyond the basics have been made in your design. Analysis and design artefacts all consistent with each other.

 

Work complete, analysis and design correct and artefacts all consistent with each other (a small number of inaccuracies or inconsistencies are permissible for a lower B).

 

Work complete, diagrams predominantly correct and consistent with each other, but with a number of inaccuracies.

 

Work mostly complete; significant inaccuracies and/or inconsistencies in your analysis and design.

 

(F1) Some parts of the analysis and design completed, but others incomplete.

(Lower F) minimal effort.

Implementation (30%) An implementation of all specified use cases which makes use of the more advanced implementation technologies covered in the unit. Robust error handling and a user-friendly interface. Implementation matches design, or if not, the reasons for this are explained clearly in the writeup.

 

All specified use cases implemented. There may be room for improvement in your error handling. Some evidence of use of the more advanced implementation technologies covered in the unit. Implementation matches design, or if not, the reasons for this are explained clearly in the writeup.

 

At least three out of four use cases implemented. Little error handling. Little evidence of use of the more advanced implementation technologies covered in the unit. Implementation matches design, or if not, the reasons for this are explained clearly in the writeup.

 

At least two use cases implemented, one of which should be something OTHER than the “search for hotel” or “view full details of hotel” use case. Implementation matches design, or if not, the reasons for this are explained clearly in the writeup.

 

A minimal effort; up to one use case (or the “search for hotel” and “view details of a hotel” use cases) successfully implemented.
Testing

(20%)

Comprehensive range of JUnit tests undertaken, evidence of both black- and white- box testing. A wide range of JUnit tests undertaken. There may be a small number of omissions Significant number of JUnit tests undertaken but with a number of omissions A small number of JUnit tests undertaken with significant omissions Little or no testing undertaken
 

Report (20%)

Clear justifications of decisions made when drawing up your analysis and design artefacts. including insightful comments. Considerations beyond the basics are made. Clear rationale for tests.

 

Clear justifications of decisions made when drawing up your analysis and design artefacts. Clear rationale for tests.

 

Largely clear justifications of decisions made when drawing up your analysis and design artefacts but unclear at times. Rationale for tests mostly clear.

 

Writeup clear and accurate in some places but unclear and/or inaccurate in others. A significant number of omissions.

 

Predominantly unclear and/or inaccurate writeup. Little understanding demonstrated

 

 

Implementation must match the design!

 

Please note that it is not possible to achieve higher than a grade D at best for an implementation which significantly differs from your design, unless you clearly and satisfactorily describe the reasons for the difference in your writeup. Grades for the implementation criterion will be reduced as follows if your code is significantly different from the design, and you do not provide a satisfactory reason why (a partial mismatch will result in a partial reduction):

 

Original grade Reduced grade
A1 to A4 D1 to D3
B1 to B3 F1
C1 to D3 F2
F1 to F3 F3

 

Other information

Copyright

Please note that using images or text from other websites is infringing copyright and is therefore illegal and not to be done! The only exceptions are if the source website has given you permission, or the material is available in the public domain or under a liberal licence (e.g. Creative Commons). By all means use creativity in the design of your app (though note that you will not be given credit for visual design), but use your own material or material you are legally allowed to make use of.

Learning Outcomes

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Extenuating Circumstances

The University’s Extenuating Circumstances procedures are in place if there are genuine circumstances that may have affected your academic performance. Remember however you need to be ‘fit to study’, this means that you can either submit your assessed work or declare extenuating circumstances, but you cannot do both.

A summary of guidance notes for students is given below:

http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234570925

 

Academic Misconduct

Any submissions must be your own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook, includes the definitions of all practices that will be deemed to constitute academic misconduct. You should check this link before submitting your work.

Procedures relating to student academic misconduct are given below:

http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234570157

 

Ethics Policy

The work being carried out by the student must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then the student will need an ethics release or an ethical approval prior to the start of the project.

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234569791

 

 

Anonymous Marking

A copy of the University’s Policy on Anonymous Marking, process details and student guidance on submission sheet completion can be found on the following links, which are also uploaded on the Student Portal.  The guidance ‘fact sheet’ will be available at Faculty Reception Points.

Policy:  http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234574213

Process:  http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234574215

Fact Sheet:  http://docman.solent.ac.uk/DocMan8/OCSFile?RN=1234574214

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless you have been specifically informed otherwise your marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on myCourse. The guidance ‘fact sheet’ is available at the Faculty Reception Points.

Policy: http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234569864

Fact sheet:  http://docman.solent.ac.uk/DocMan8/OCSFile?RNS=1234576014

 

 

 

 

 

 

 

Cyber Security Application

 

Southampton Solent University

Coursework Assessment Brief

Assessment Details

 

Unit Title: Cyber Security Application
Unit Code: COM713
Unit Leader: Andy Farnell
Level: 7
Assessment Title: Cyber Security Application Portfolio
Assessment Number: 1
Assessment Type: Portfolio
Restrictions on Time/Word Count: 3000 words
Consequence of not meeting time/word count limit: There is no penalty for submitting below the word/count limit, but students should be aware that there is a risk they may not maximise their potential mark.
Individual/Group: Individual
Assessment Weighting: 100%
Issue Date: 21st January 2020
Hand In Date: 26th May 2020
Planned Feedback Date: 24th June 2020
Mode of Submission: on-line
Number of copies to be submitted: 1
Anonymous Marking

 

This assessment will be marked anonymously

Assessment Task

 

As a motive to writing your portfolio imagine a context, like a company or organisation you work for, for example consider the following scenario (you can pick another if you like as a frameork for your system security portfolio):

 

Oppression Watch is a rights organisation supplying legal advice, counselling and information to a vulnerable group. Having many political enemies, foreign and domestic, online  and offline, the organisation is a high exposure target.

 

As a member of the software security and privacy task force you are to audit and make recommendations for the transformation of their systems, policies and processes.

 

Alternatively you may choose your own fictional organisation with complex digital security needs.

 

Scope

 

You are to consider the areas of:

 

  • Data storage, integrity, privacy, compliance.
  • Secure communication for both organisational staff and clients
  • System hardening, including servers, offices, and mobile devices
  • Personnel and operational security

 

 

Your portfolio should include an understanding and appreciation of a range techniques related to the principles and technologies of cyber security in practical application. In particular you should demonstrate awareness of:

 

  • Threat and vulnerability modelling, risk prioritisation
  • Anticipation of emerging threats
  • Access control, authorisation
  • Defensive system design principles, in depth and breadth
  • Scope, lifecycle, maintenance and sustainability
  • Technologies, options for technical implementation
  • Encryption for communications and storage
  • Policies , monitoring, response plans
  • Cost, roles, skills and human resources
  • Trade-offs, compromises and push-backs

 

Presentation

 

A 3000 word concise technical report will for the basis of your portfolio, and it may include screenshots, terminal logs, tables, lists, flow diagrams, or any other appropriate graphics or formulae summarising key techniques and considerations. Emphasise the practical execution of auditing and hardening tasks and comment on difficulties or lessons learned.

 

 

COVID-19 mitigations:

 

 

Due to the inaccessibility of the labs and the fact that not everyone has access to

virtual machine technology you may either choose to create portfolio material on your own using a terminal emulator, or to submit referenced exerpts of quality HOTO guides (for example StackExchange) to illustrate what you would do. Citations must be given.

Assessment criteria

Your submission will be assessed against the following criteria:

 

Criteria Below threshold Grade D Grade C Grade B Grade A
Security Engineering principles Little or no evidence of security thinking. Contradictory, dangerous or misunderstood technique. Weak security engineering with partial understanding of some key issues. Viable security thinking with understanding in most key areas. Fair understanding of risks and mitigations. Good security thinking with some flair for grasping complex risk concepts and some defences. Broad and deep understanding, holistic integrated approach, pragmatic   and balanced. Evidence of complexity thinking. Informed by best practice and relevant policy. Insightful understanding of current and emerging threats.
Technologies Implementation Configuration No technological basis for implementing the process is shown. Unrealistic implementation or poor choices of technologies. Misconfiguration or misunderstandings of tools.

No substantial plan.

A plausible set of tools and technologies with proper description of their set-up and use. Some treatment of planning and test. Extensive set of technical measures and ideas to deal with multiple threats. Evidence of research and understanding of the resources needed to deploy. A textbook deployment of state-of-the-art solution. Comprehensive, well researched proposal, with milestones, test criteria, depth, redundancy,

cost and skill-set needs.

Presentation and communication of ideas Incoherent, unreadable report without structure, substantial content or references. Poorly structured and written report, lacking strong communicative skills, no use of visual or tabulated data, few or no references, or poor quality research sources. An adequate report that communicates the key ideas in an effective and concise way. References given as evidence of research reading. Appropriate sourcing. A good report that concisely but extensively deals with significant scope. Well researched, argued points. Good use of visuals and structure. Great referencing from well chosen high quality sources. An excellent report with well written, well informed  compelling arguments, concise and nicely structured. Clever use of compact visual devices. High quality, up to date research with excellent referencing.

 

 

 

 

 

Learning Outcomes

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the unit descriptors.

Late Submissions

 

Students are reminded that:

 

  • If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;
  • If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;
  • If this assessment is being submitted as a referred piece of work (second or third attempt) then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy-annex-1-assessment-regulations.pdf?t=1411116004479

 

Extenuating Circumstances

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not ‘fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact a Student Achievement Officer for advice.

 

A summary of guidance notes for students is given below:

 

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-4/4p-extenuating-circumstances-procedures-for-students.pdf?t=1472716668952

 

 

Academic Misconduct

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work.

 

Procedures relating to student academic misconduct are given below:

 

http://portal.solent.ac.uk/support/official-documents/information-for-students/complaints-conduct/student-academic-misconduct.aspx

 

 

 

Ethics Policy

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.

 

The Ethics Policy is contained within Section 2S of the Academic Handbook:

http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2s-university-ethics-policy.pdf

 

 

Grade marking

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.

 

Policy:           http://portal.solent.ac.uk/documents/academic-services/academic-handbook/section-2/2o-assessment-policy.pdf

 

 

Guidance for online submission through Solent Online Learning (SOL)

 

http://learn.solent.ac.uk/onlinesubmission

 

 

 

Global Business Strategy

Global Business Strategy
Learning Outcomes: 1. Identify and analyse the nature of international markets and the forces and drivers that interface with the development and implementation of international business strategy.

2. Demonstrate a critical understanding of both current and extant theories and concepts of strategy formulation and development in the international environment.

3. Critically evaluate the formulation of business strategies in response to the challenges of internationalisation and how they reflect changes in both the domestic and international business environments.

Assignment Description
Evaluate how the state and host nation contexts shape and impact global business strategy
You should prepare a 3500-word essay. The essay should discuss the theories which seek to explain host national contexts. Your essay should include case study examples to illustrate and support your evaluation. For example, your essay could demonstrate how a European based organisation, with sites in 63 different nations, develops a global business strategy which accommodates the requirements of the individual nation states and environmental contexts, whilst still achieving the business mission.
The 3500-word essay is an opportunity for students to demonstrate their critical thinking skills and a comprehensive understanding of the theories, ideas, and realworld examples discussed during lectures and seminars.
The essay should develop a clearly structured argument and include an introduction and conclusion.
Students must read widely and deeply to ensure their knowledge and understanding is comprehensive. The course reading list is an important starting point in this regard and the resources and articles referenced during each week of the module.
Additional Information Reading Resources (Research should not be limited to these resources solely) • Dicken, Peter (2015), Global shift : Mapping the changing contours of the world economy. 7th Ed. The Guildford Press, New York • Rodrik, Dani (2013) Roepke Lecture in Economic Geography—Who needs the nationstate? Economic Geography, 89 (1): 1–20 • Agnew, John (2013) Commentary on ‘Who needs the nation-state?’ Economic Geography, 89 (1): 21–6. • Mayer, F. W., & Phillips, N. (2017). Outsourcing governance: states and the politics of a ‘global value chain world’. New Political Economy, 22(2), 134-152.
• Smith, A., (2015). The state, institutional frameworks and the dynamics of capital in global production networks. Progress in Human Geography 39 (3), 290–315. • Yeung, Henry Wai-chung (2014) Governing the market in a globalizing era: developmental states, global production networks, and inter-firm dynamics in East Asia. Review of International Political Economy, 21 (1): 70–101.

• Harvard Referencing system must be used