Subject PROJECT MANAGEMENT FOR TECHNOLOGY Read the requirements for Part 1 Above. Submit the saved project file (MPP file). Answer already post through google please try not to be a Plagiarism. And also I will submit Assignment Requirements (Part 2) soon I am a customer for long time and I have more homework coming soon I need fair price for both part 1, 2 and research paper together. Thank you. Assignment Requirements (Part 1): please submit the saved project file (MPP file). Project background Burton Golf Course is a two-year-old signature golf course based in Salisbury. Being unique, the number of memberships is increasing and putting strain on the existing information system. The current system is used only by Accounts Department to process Accounts Payables and Receivables. With the steep increase in the memberships, Bookings and Maintenance the Human Resource department is getting overwhelmed with the paper work. Therefore, there is a need to add these functions to a new system. You are the Project Leader for Soft Systems Ltd., which has been contracted by Burton Golf Course to undertake this project. You need to advise how to develop the new system in a tightly constrained time period. Specifically, you have been advised that the project can start no earlier than Mon, 7th January 2018 and must be completed by Thu, 22nd May 2018. You report to Mr. Sherman, the Project Manager for Soft Systems Ltd, who liaises with Burton Golf Course. You will report your progress and plans of the project to Mr. Sherman. Setting the Project Start Date Click on Project on the menu bar, and then go to Project Information. Set the project start date to Mon, 7th January 2018. Do NOT enter finish date. Click OK. Setting the Project Calendar You will now create a calendar for this project by accounting for the extra non-working times reflected by statutory holidays. Go to Tools on the menu, then to Change Working Time. Click the New button at the bottom. The "Create New Base Calendar" box appears. Enter ‘Palmers Calendar’ in the Name text box. Choose the Create New Base Calendar button and click OK. We will only change holidays, (non-working days) on this calendar. Choose the holiday days for Martin Luther King Day, President's Day, and Easter Friday for this project. Check the calendar and ensure you have made no errors when entering the non-working days. Click OK. Choose Timescale from the Format menu and select the Nonworking Time tab. Click on the Calendar pull down menu and select Palmers Calendar. Click OK. Within the Project Information box from the Project menu select Palmers Calendar from the Calendar pull down menu. Click OK. This assigns the Palmers Calendar as the base calendar for this project. Set the Gantt chart bar display Click on the following in sequence to set the Gantt chart bar display: 1. Format menu 2. GanttChartWizard 3. Next > 4. Select Critical Path then Next > 5. Select Resources and dates then Next > 6. Select yes, please to show link line between dependent tasks then next > 7. Format It 8. Exit Wizard Enter tasks in the schedule The first step in creating your schedule is to enter task headings and tasks. With the Gantt chart on the screen, begin by typing a list of tasks or events that need to be done in order to move the project forward, preferably in the approximate order they will happen. Tasks entered are assigned the default duration of one day (1d). It is easy to delete and insert tasks and to relate tasks so that each task will be scheduled appropriately. 1. In the first field in the Task Name column type PALMERS GOLF COURSE PROJECT 2. Press Enter. 3. In field #2 enter, Initial Study 4. Continue entering these task headings, one in each Task Name field: Feasibility Study Requirements Analysis Requirements Specification System Design Coding & Testing System Testing Select the Feasibility Study task. Then either use the Insert key on the keyboard or choose New Task from the Insert menu. This enters a blank line above the current task. Repeat until there are three cells between "Initial Study" and "Feasibility Study". In the three blank cells enter: Study Existing System Carry Out Interview(s) Prepare Documentation Continue by inserting the relevant number of blank lines below each task heading and then enter in the following: Under "Feasibility Study" enter: Identify Problems Understand and Analyze Problems Estimate Project Cost Assess Project Risk Propose Solution Task Scheduling Under "Requirements Analysis" enter: Investigate Current Environment Investigate and Define Requirements Under "Requirements Specification" enter: Prepare Specifications Prepare Use Case Diagram Prepare Data Dictionary Prototyping Under "System Design" enter: Design New System Design Test Plan Under "Coding & Testing" enter: Coding Unit Testing Integration Testing Update Data Dictionary Under "System Testing" enter: Hardware & System Testing Acceptance Testing Prepare Documentation Set Milestones You are to add milestones, which are the dates project deliverables are due. To enter the first milestone: 1. Insert a blank task line above Task 13 Requirements Analysis. 2. Type "Deliverable to Project Manager". Repeat this process one more time at the end of the project, after “Prepare Documentation”. Set Durations The durations shown in the Gantt chart on the next page are to be entered in the Duration column. 1. Select the Duration field for the first task. 2. Type a number for the duration length followed by the duration unit abbreviation. 3. Press the enter button or the tick mark. 4. Repeat steps 1 through 3 to enter durations for all the tasks in your project. Assignment Requirements (Part 2): please submit solution as an excel file! You will now complete a Gantt chart for this project. Using the milestones you designed in Part 1 - complete a gnatt chart. The Gantt chart bears a name of Henry Gantt, American mechanical engineer and management consultant who invented this chart as early as in 1910s. A Gantt diagram in Excel represents projects or tasks in the form of cascading horizontal bar charts. A Gantt chart illustrates the breakdown structure of the project by showing the start and finish dates as well as various relationships between project activities, and in this way helps you track the tasks against their scheduled time or predefined milestones. Use this webpage to assist you with creating a Gnatt chart in Excel: https://www.ablebits.com/office-addins-blog/2014/05/23/make-gantt-chart-excel/ Please submit this portion of the assignment as an excel file Subject SYSTEMINTEGRITY FOR CYBERSECURITY Research Paper Assignment: Your Assignment is to choose a real world IT security breach, and perform a case study. Within this study, analyze the method the attackers used to gain access, and the actions the attackers took once the network was penetrated. You should also identify the correct security procedures that should have been in place to prevent this breach. The choice of incident is completely up to you, but please keep in mind that it should reflect an actual breach and require research on your part. Please keep in mind that in many situations, details of the attack may not have been revealed due to our culture of corporate secrecy and/or pending litigation, so please choose a case wisely. Requirements: Within this case study, please include the attacking methods, the security failures, and a review of the corporate response. Additionally, please indicate a suggested correction to both the security that would have prevented this breach, and indicate any improvements that the company could have made with its corporate response. The paper should be 7-10 pages in length, double spaced, standard font with default margins. Please include a title page, works cited page, and name the paper “LastnameFirstInitial_ETSC681_Paper2”. All citations should be made using APA 6th edition guidelines, and please include a minimum of 5 valid citations, although you should remember that any statement of fact that is not common knowledge or “assumed” should be backed up with a citation. APA 6th edition guidelines Choosing Research Sources As this is a cybersecurity course, it is not a requirement that all sources be academic journals or peer- reviewed, as this industry advances far faster than academia. While it isn’t a requirement for peer-reviewed work, the quality of the source matters. Here are some simple guidelines, but it is up to each person to evaluate the quality of a source and verify if the data is relevant and accurate. • Wikipedia is NOT a citable source, but it has excellent data. (HINT: Wikipedia isn’t citable, but Wikipedia itself cites its sources, and often those sources are valid). • Security researcher blogs often are an excellent source, known respected security researches such as Brian Krebs (krebsonsecurity.com) often post incredibly useful information. This doesn’t mean all blogs are valid, so I highly recommend confirming any data you obtain from a blog by attempting to find an additional source. • Security patches and postings by corporations such as Microsoft, Apple, Norton, Mcafee, SANS, etc., are all considered valid and can be used as citations. Citing Sources For this class, all sources must be cited using APA 6th edition format. There are numerous websites that can assist you with this, and some will create the proper works cited format. Feel free to use online resources as much as necessary to assist you. Here are some that may help: • http://www.citationmachine.net/ • http://www.bibme.org/ • https://www.refme.com