Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
You Can order for custom written paper 24/7! by completig a form in 3 steps. Get those desired coursework assessment grades!
Posted: September 10th, 2021
Question description
QUESTION 1. Debate: For IT security acquisitions (products or services), which is the most important of the three project management constraints:CostQualityScheduleChoose the constraint (“factor”) that you believe should be prioritized when managing an IT acquisition project. Write a 3 to 5 paragraph briefing statement in which you identify and then defend your selection. Your statement should address the following items:1. Provide definitions for each of the constraints2. Identify your chosen constraint and provide a more detailed description of how this constraint impacts project management (what happens to the other two factors). For example, if you decide that cost is the most important factor, explain the tradeoffs you might need to make with respect to quality and schedule. Or, if you decide that quality is most important (e.g. correct implementation of security controls), explain how that might affect cost and schedule.3. Provide a closing summary of the importance of project management for IT acquisitions (with respect to the overall IT security program).Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.Timeliness of Initial PostingOn TimeLateVery LateNo SubmissionTimeliness of Briefing Statement or Paper12 pointsPosted briefing statement or paper before 11:59 PM ET on Friday.10 pointsPosted briefing statement or paper before 11:59 PM ET on Saturday.5 pointsPosted briefing statement or paper before 11:59 PM ET on Sunday.0 pointsDid not post a briefing statement or paper before 11:59 PM ET on Sunday.Briefing Statement or PaperExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or No Work SubmittedIntroduction to Briefing Statement or Paper10 pointsProvided an excellent introduction to the deliverable which clearly, concisely, and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.8.5 pointsProvided an outstanding introduction to the deliverable which clearly and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.7 pointsProvided an acceptable introduction to the deliverable which addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.6 pointsProvided an introduction to the deliverable but the section lacked some required details. Information from authoritative sources was mentioned.4 pointsAttempted to provide an introduction to the deliverable but this section lacked detail and/or was not well supported by information drawn from authoritative sources (too many quotations or improper paraphrasing).0 pointsIntroduction was missing or no work submitted.Analysis15 pointsProvided an excellent analysis of the issues for the required briefing topic. Addressed at least three separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.13.5 pointsProvided an outstanding analysis of the issues for the required briefing topic. Addressed at least two separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.12 pointsProvided an acceptable analysis of the issues for the required briefing topic. Addressed at least one specific issue and provided an appropriate example. Appropriately used and cited information from authoritative sources.11 pointsAddressed the required briefing topic but the analysis lacked details or was somewhat disorganized. Appropriately used and cited information from authoritative sources.8 pointsMentioned the required briefing topic but the analysis was very disorganized or off topic. OR, the analysis did not appropriately use information from authoritative sources (too many quotations or improper paraphrasing).0 pointsAnalysis was missing or no work was submitted.Summary10 pointsIncluded an excellent summary section for the briefing statement or paper which was on topic, well organized, and covered at least 3 key points. The summary contained at least one full paragraph.8.5 pointsIncluded an outstanding summary paragraph for the briefing statement or paper which was on topic and covered at least 3 key points.7 pointsIncluded a summary paragraph for the briefing statement or paper which was on topic and provided an appropriate closing.6 pointsIncluded a summary paragraph but, this section lacked content or was disorganized.4 pointsIncluded a few summary sentences for the briefing statement or paper.0 pointsDid not include a summary for the briefing statement or paper.Use of Authoritative Sources5 pointsIncluded and properly cited three or more authoritative sources (no errors).4 pointsIncluded and properly cited three or more authoritative sources (minor errors allowable).3 pointsIncluded and cited two or more authoritative sources (minor errors allowable). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.2 pointsIncluded and cited at least one authoritative source (errors allowable in citations or reference entries). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.1 pointMentioned at least one authoritative source but, the citations and/or reference list entries lacked required information (not sufficient to retrieve the correct resource).0 pointsReferences and citations were missing. Or, no work submitted.Professionalism10 pointsNo formatting, grammar, spelling, or punctuation errors. Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.8.5 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. Work needs some polishing to improve professional appearance.7 pointsErrors in formatting, spelling, grammar, or punctuation which need attention / editing to improve professional appearance of the work.6 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Substantial polishing / editing is required.4 pointsSubmitted work is difficult to read and/or understand. OR, work has significant errors in formatting, spelling, grammar, punctuation, or word usage which detract from the overall professional appearance of the work.0 pointsNo submission.Timeliness of PostingsOn TimeLateVery LateFirst Critique for Another Student2 pointsPosted a critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.1 pointPosted a critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.0 pointsDid not post a critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.Second Critique for Another Student2 pointsPosted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.1 pointPosted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.0 pointsDid not post a second critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.Follow-Up Reply or Discussion Participation2 pointsPosted a follow-up reply or discussion posting before 11:59 pm ET on Sunday.0 pointsPosted a follow-up reply or discussion posting after 11:59 pm ET on Sunday.0 pointsDid not post a follow-up reply in the week’s topic.Second Follow-Up Reply or Discussion Posting2 pointsPosted a second follow-up reply or discussion posting before 11:59 pm ET on Sunday.0 pointsPosted a second follow-up reply or discussion posting after 11:59 pm ET on Sunday.0 pointsDid not post a second follow-up reply in the week’s topic.Quality of Discussion PostingsExcellentAcceptableNeeds ImprovementLow-Quality or No Work SubmittedCritique #1 for Another Student’s Briefing Statement or Paper10 pointsPosted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.8.5 pointsPosted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.7 pointsPosted a critique of another student’s briefing statement or paper. Critique provided at least one suggestion for improvement.0 pointsPosting was missing or did not add contain a critique of the briefing statement or paper.Critique #2 for Another Student’s Briefing Statement or Paper10 pointsPosted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.8.5 pointsPosted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.7 pointsPosted a critique of a second student’s briefing statement or paper. Critique provided at least one suggestion for improvement.0 pointsPosting was missing or did not add contain a critique of the briefing statement or paper.Follow-up Reply or Comment #15 pointsPosted a follow-up reply or comment which added value to the discussion.4 pointsPosted an acceptable follow-up reply or comment which added some value to the discussion.3 pointsPosted a follow-up reply or comment but added little value to the discussion.0 pointsPosting was missing or did not add value to the discussion.Follow-up Reply or Comment #25 pointsPosted a follow-up reply or comment which added value to the discussion.4 pointsPosted an acceptable follow-up reply or comment which added some value to the discussion.3 pointsPosted a follow-up reply or comment but added little value to the discussion.0 pointsPosting was missing or did not add value to the discussion.Overall ScoreExcellent100 or moreOutstanding85 or moreAcceptable75 or moreNeeds Improvement65 or moreNeeds Significant Improvement1 or moreNo Work Submitted0 or more(2) Case Study #2: Integrating Disaster Recovery / IT Service Continuity with Information
Technology Governance Frameworks
Case Scenario:
You have been assigned to a large, cross-functional team
which is investigating adopting a new governance framework for your company’s
Information Technology governance program. Your first assignment as a member of
this team is to research and write a 2 to 3 page white paper which discusses one
of the Chief Information Security Officer (CISO) functional areas. The purpose
of this white paper is to “fill in the gaps” for team members from other areas
of the company who are not familiar with the functions and responsibilities of
the Office of the Chief Information Security Officer.
Your assigned CISO
functional area is: Disaster
Recovery / IT Service Continuity (IT
Service Continuity is a subset of Business
Continuity). Your white paper must address the planning, implementation, and
execution aspects of this CISO functional area. Your audience will be familiar
with the general requirements for business continuity planning (BCP), business
impact analysis (BIA), and continuity/recovery strategies for business
operations (e.g. restore in place, alternate worksite, etc.). Your readers will
NOT have in-depth knowledge of the requirements / implementation strategies which
are specific to restoring IT services which support the critical functions of
the business (as identified in a BIA).
Note: in
your Critical Analyses and Discussion
for this case study you will address specific aspects of a governance framework,
e.g. COBIT®, ITIL®, or ISO/IEC 27002, which apply to planning and
implementation of disaster recovery / IT Service Continuity.
Research:
1.
Read / Review the Week 3 readings:
2. Find
three or more additional sources which provide information about best practices
for IT Service Continuity / Disaster Recovery planning, implementation, and
execution. (Hint: begin by exploring https://essays.homeworkacetutors.com/write-my-essay/ready.gov/business ) For
the purposes of this assignment, implementation
means the advance work necessary to implement recovery plans by acquiring or
contracting for products, services, infrastructures, and facilities. Execution
means activating the DR/BCP plans and overseeing the recovery operations.
Write:
Using standard terminology
(see case study #1), write a two to three page summary of your research. At a
minimum, your summary must include the following:
1. An
introduction or overview of disaster recovery / IT Service Continuity which provides
definitions and addresses the reasons why
cybersecurity should be specifically addressed in the company’s DR/BCP strategies and plans. This introduction
should be suitable for an executive audience.
2. A
separate section which addresses disaster recovery / IT Service Continuity planning
functions performed by staff members in the Office of the CISO.
3.
A separate section which addresses best
practices for implementing disaster recovery / IT Service Continuity.
Submit For ~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading & Discussion
1. Submit
your case study in MS Word format (.docx or .doc file) using the Case Study #2
Assignment in your assignment folder. (Attach the file.)
2. Post
your case study for discussion with your classmates. First, create a new topic
in the Case Study #2 Discussion Forum. Then, paste the contents of your Case
Study #2 document directly into that message. (Do not attach the file.)
3. Last
posting or no posting for discussion will be penalized heavily so it is in your
best interests to post your case study before the assigned due date.
Formatting Instructions
1. Use
standard APA formatting for the MS Word document that you submit to your
assignment folder. Formatting requirements and examples are found under Course Resources
> APA Resources.
Additional Information
1. You
are expected to write grammatically correct English in every assignment that
you submit for ~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading. Do not turn in any work without (a) using spell check,
(b) using grammar check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly structured sentences
and paragraphs. These items are graded under Professionalism and constitute 20%
of the assignment grade.
2. You
are expected to credit your sources using in-text citations and reference list
entries. Both your citations and your reference list entries must comply with
APA 6th edition Style requirements. Failure to credit your sources will result
in penalties as provided for under the university’s Academic Integrity policy.CriteriaExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableIntroduction or Overview for the Case Study20 pointsProvided an excellent overview of disaster recovery / IT service continuity. The overview appropriately used information from 3 or more authoritative sources.18 pointsProvided an outstanding overview of disaster recovery / IT service continuity. The overview appropriately used information from 2 or more authoritative sources.16 pointsProvided an overview of disaster recovery / IT service continuity. The overview appropriately used information from 2 or more authoritative sources.14 pointsProvided an overview but the section lacked important details about disaster recovery and/or IT service continuity. Information from authoritative sources was cited and used in the overview.10 pointsAttempted to provide an introduction to the case study but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 0 pointsThe introduction and/or overview sections of the paper were off topic. Identified and Explained the Reasons Why Cybersecurity Should be Addressed in DR/BCP Strategies & Plans20 pointsProvided an excellent discussion which included 5 or more reasons why cybersecurity should be specifically addressed in the company’s DR/BCP strategies and plans. Appropriately used information from 3 or more authoritative sources.18 pointsProvided an outstanding discussion of 4 or more reasons why cybersecurity should be specifically addressed in the company’s DR/BCP strategies and plans. Appropriately used information from authoritative sources.16 pointsProvided a discussion of 3 or more reasons why cybersecurity should be addressed in the company’s DR/BCP strategies and plans. Appropriately used information from authoritative sources.14 pointsProvided a discussion which included at least 2 reasons why cybersecurity should be addressed in the company’s DR/BCP strategies and plans. Appropriately used information from authoritative sources.10 pointsProvided a discussion of cybersecurity in the context of DR/BCP decision making. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.0 pointsThis section was missing, off topic, or failed to provide information aboutcybersecurity considerations for DR/BCP decisions. CISO Roles & Responsibilities for DR/BCP Planning10 pointsProvided an excellent discussion of the CISO & CISO staff roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP planning. Appropriately used information from 3 or more authoritative sources.8.5 pointsProvided an outstanding discussion of CISO & CISO staff roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP planning. Appropriately used information from 3 or more authoritative sources.7 pointsProvided a discussion of CISO & CISO staffroles, responsibilities, and best practices for integrating cybersecurity into DR/BCP planning. Appropriately used information from authoritative sources.6 pointsDiscussion provided some information aboutCISO & CISO staff best practices, roles, and responsibilities for DR/BCP planning. Mentioned information obtained from authoritative sources.4 pointsDiscussion provided some information aboutCISO & CISO staff best practices, roles, and responsibilities for DR/BCP planning but the lacked detail and/or was not supported by information from authoritative sources.0 pointsDid not address roles & responsibilities of theCISO & CISO staff for DR/BCP planning.CISO Roles & Responsibilities for DR/BCP Implementation10 pointsProvided an excellent discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP implementation(i.e. acquistion & contracting). Appropriately used information from 3 or more authoritative sources.8.5 pointsProvided an outstanding discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP implementation(i.e. acquistion & contracting). Appropriately used information from 3 or more authoritative sources.7 pointsProvided a discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP implementation(i.e. acquistion & contracting). Appropriately used information from authoritative sources.6 pointsDiscussion provided some information about CISO best practices, roles, and responsibilities for DR/BCP implementation. Mentioned information obtained from authoritative sources.4 pointsDiscussion provided some information about CISO best practices, roles, and responsibilities for DR/BCP implementation but the lacked detail and/or was not supported by information from authoritative sources.0 pointsDid not address roles & responsibilities of the CISO for DR/BCP implementation.CISO Roles & Responsibilities for DR/BCP Execution10 pointsProvided an excellent discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP execution (i.e. activating and overseeing recovery operations). Appropriately used information from 3 or more authoritative sources.8.5 pointsProvided an outstanding discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP execution (i.e. activating and overseeing recovery operations). Appropriately used information from 3 or more authoritative sources.7 pointsProvided a discussion of CISO roles, responsibilities, and best practices for integrating cybersecurity into DR/BCP execution (i.e. activating and overseeing recovery operations). Appropriately used information from authoritative sources.6 pointsDiscussion provided some information about CISO best practices, roles, and responsibilities for DR/BCP execution. Mentioned information obtained from authoritative sources.4 pointsDiscussion provided some information about CISO best practices, roles, and responsibilities for DR/BCP execution but the lacked detail and/or was not supported by information from authoritative sources.0 pointsDid not address roles & responsibilities of the CISO for DR/BCP execution.Addressed security issues using standard cybersecurity terminology5 pointsDemonstrated excellence in the integration of standard cybersecurity terminology into the case study.4 pointsProvided an outstanding integration of standard cybersecurity terminology into the case study.3 pointsIntegrated standard cybersecurity terminology into the into the case study2 pointsUsed standard cybersecurity terminology but this usage was not well integrated with the discussion.1 pointMisused standard cybersecurity terminology.0 pointsDid not integrate standard cybersecurity terminology into the discussion.APA Formatting for Citations and Reference List5 pointsWork contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.4 pointsWork contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.3 pointsWork contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.2 pointsWork has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.1 pointWork attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).0 pointsReference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.Professionalism Part I: Organization & Appearance5 pointsSubmitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.4 pointsSubmitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).3 pointsOrganization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.2 pointsSubmitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.1 pointSubmitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.0 pointsNo work submitted.Professionalism Part II: Execution15 pointsNo formatting, grammar, spelling, or punctuation errors.14 pointsWork contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.13 pointsErrors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.11 pointsSubmitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.0 pointsNo work submitted.Overall ScoreExcellent90 or moreOutstanding80 or moreAcceptable70 or moreNeeds Improvement56 or moreNeeds Significant Improvement36 or moreMissing or Unacceptable0 or more
We typically deliver assignments in 3-5 days, but we often beat deadlines! Most papers arrive early, and for urgent needs, we can deliver in 1-3 hours. Larger projects like research papers or dissertations may take up to 30 days. Let us know your timeline, and we’ll make it work!
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: