Answered You can hire a professional tutor to get the answer.
Scenario: A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel.
Scenario: A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel.
She does not have experience with IT related
problem solving, so she is contracting you, as an IT consultant, to help. For Milestone Three, you will submit a document that suggests web technologies
for the company’s new website and that summarizes recommendations for information security practices for the distribution company and provides an example
of information security assurance failure. Take a moment to read the Final Project Guidelines and Rubric to see how the following information applies to the final
project, and then proceed to do the following for Milestone Three:
Web Technologies: Swagger Distribution is in the process of designing a new website using HTML5 (HyperText Markup Language).
For this area of the assignment:
Write two to three sentences describing why a new Swagger website is important.
Using the 15 Core Web Functionalities resource, create a bulleted list of 10 key functioning components of a website. Next to each function, add a
sentence or two about why this function is important. Ensure that you use the terminology discussed during the web technologies module. (Note:
CONTENT such as an “About Us” page, “Contact” page, or information on a page is not considered a functioning component.)
Briefly describe a current real-world website that is using at least two of the components you suggested above.
Provide a screenshot of this website, pointing out with circles or arrows the two components you are describing. (You can provide two websites if you
cannot find one that has both.)
Information Security: There is no current information security standard at Swagger Distribution. You know that one needs to be implemented.
For this area of the assignment:
Describe the importance of information security for an organization, supporting with evidence. How could a lack of security affect not only consumers,
but a company as well?
Summarize two key information security practices you recommend the company implement.
Provide supporting examples/research/justification using a real-world example (e.g., when a real company was hacked and what the outcomes were).
Be sure to use appropriate IT terminology for security assurance.
Guidelines for Submission: Written components of the project must follow these formatting guidelines when applicable: double spacing, 12-point Times NewRoman font, and one-inch margins. The paper should be 1 to 2 pages in length, not including cover page and resources, and written in paragraph form.