Category: Information Systems

Week 5 CIS 515

 

Many legacy systems require normalization. Identify at least two factors that should be considered in order to produce an optimal normalized set of tables when performing normalization. Include in your discussion a detailed example on how each factor would eliminate data redundancy.

Optimal database design recognizes proper organization of table structures and relationships. Suggest at least two methods that can be used to improve the design of a database system

Module 5 Discussion

 Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?

I need 250 words of discussion and 250 words reply for attached document
 

Week 5

Prompt B: Technology Takes Sides

In a world of social networking, Instagrams, Twitter, Pinterest, instant messaging, and Facebook, technology can help spread the word. These networks can organize and mobilize individuals from around the globe, sometimes for political or humanitarian purposes. World perspectives on local events can help shape response, action, and policy. Have you used technology or social media to learn about or share information about an event?

In this Discussion you will analyze the role of technology in global events, using this weeks Learning Resources and Week 4 Notes and Readings.

To prepare for the Discussion:

Consider the following:

  • Do you follow people on Twitter?
  • Do you tweet, use Pinterest, Facebook, or instant message your friends? How often?
  • Revisit the Tweeting Towards Freedom article in thisweeks Notes and Readings.
  • Consider if there a downside to have so much access? Identify an example of how new communication technologies have had an impact on the world stage and the impact it made.
  • Consider how the immediacy of communication can impact the spread of information about world events-both good and bad.Post a response (at least 200300 words) to the following prompt:

Not long ago, we had to wait for the evening news or morning newspaper to find out what happened in the world. In todays technological world we have instantaneous access to global events. Some believe that the nature of instantaneous access to global events has strong political impact.

Select a current event happening in the world or your community. Describe the event, why you picked it, and explain how technology played a role in the way the news of this event spread. Discuss the benefits and downside of having so much access to local and world news.

Research Paper: Develop A Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment For 500 Words

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Telecomm Network Security) have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Case Study

Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format. 

Discussion Questions 1-3 are below

1. List the advantages of a single customer service center for RR Communications.

2. Devise an implementation strategy that would guarantee the support of the divisional presidents for the shared customer service center.

3. Is it possible to achieve an enterprise vision with a decentralized IT function?

Pages 156-159 are attached to this question.

700 to 900 word count.

Required Annotated Bibliography For Min 600 Words With Below Required Format

  

Search the web (Google Scholar) and find 6 peer-reviewed articles published since 2015 that relate to the topic of security architecture and design and construct an annotated bibliography. If you have never written an annotated bibliography, please use the link below for guidance. 

  /////////////////////////////////////////////////////////////////////////

Make sure to follow APA style. Please make sure your submission is a minimum of 600 words in length and meets the minimum APA formatting guidelines:

   12-pt, Times New Roman font

   Double-spaced

   1 margins on all sides

   Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.

   Paraphrasing of content Demonstrate that you understand the article by summarizing it in your own words. Direct quotes should be used minimally.

Short Essay

The FDA has proposed rules that would classify cigarettes as a medical device and thereby severely restrict the types of advertising that could be used. What forms and types of feedback would the tobacco companies have during the rule-making process by the FDA?

Assignment 6 (DR)

 Using a Web browser, search for incident response template. Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not? 

Response 5-2 (DR)

 Incident Reporting and Incident Management

Business operations get disrupted when an unintentional event occurs in the workplace.  some of the unintentional events can be system crash, server problems that stop end-users from accessing the data, hardware or software problem, cyber-attacks, employee mistakes, and other disasters. These not only disrupts the operations but also affects productivity, profit, revenue, and reputation of the business in the market. To reduce all these issues and losses organizations are creating an incident response plan. This plan will help an organization to detect incidences and resolve them before they harm business operations and data.  This plan is created by the IT team or incident response team. This team communicated with every stakeholder of an organization like employees, customers, vendors, suppliers to know the risks and issues they face during business operations. Today technology have facilitates employees and customers to communicate directly about their issues and make them resolve effectively. The incident response team will communicate with customers who use the services of an organization through email or voice calls. They ask their experience and try to resolve their issues.

Role of the end-user in incident reporting and management:

End users are employees who work with data of organizations and customers who use the services of an organization. They play an important role in creating an incident response plan and preventing incidences from harming the business operations. They can directly share their issues or incidences they face with the incident management team who are responsible to resolve their issues. This team will continuously monitor systems and network for any issues and resolve them quickly with the help of the incident response plan. The end users can report the incidences they face by raising a ticket.

Reference

What is Incident Management: ITSM: Try Freshservice. (n.d.). Retrieved from