Category: Information Systems

Week 5

  

Question 1:

After reviewing Chapters 8 and 9 of the course text and other resources, Discuss Key Concepts in IT Budgeting

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 2:

Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format. 

Discussion Questions 

1. List the advantages of a single customer service center for RR Communications.

2. Devise an implementation strategy that would guarantee the support of the divisional presidents for the shared customer service center. 

3. Is it possible to achieve an enterprise vision with a decentralized IT function?

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 3:

What steps would you include in order to maintain the chain of custody?

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

Question 4:

This assignment will be associated with Legal & Technical Issues in the cloud based computing environment.  How does being in a cloud based environment change data forensics techniques in your opinion?  Does legal concerns also change from being in the cloud than being on a local device in your opinion?  If legal aspects change, how does it change associating with the investigation.  I am not expecting you to know step by step on how to proceed with an incident like this or even attempt describe the steps…  This is more of a research type of an assignment in order to be more prepared for a cloud based incident.  Please, include at least three references including the following one that can be found at ()   Please, provide two more additional references.  Even your textbook may serve as a reference if you choose to use it.  Remember, like all other assignments…must be in APA formatting.  

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

Birk, D., & Wegener, C. (2011, May). Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 1-10). IEEE.

Cyber Security – Multi Essay

**** Need it by 02/06/2020 7 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

Subject: Cyber Security

Question1: 300 word essay with 2 latest journal article references in APA. Intext citations must

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. 

Why do think all of these skills are necessary? Please explain.

Question2: 3-4 paragraph essay with 2 latest journal article references in APA. Intext citations must

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. 

Explain the crime that was solved and the methods used to determine how the crime was committed. 

Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Question3: 300 word essay with 2 latest journal article references in APA. Intext citations must

If you could, what would you do to help create a national security culture, in which everyone is more knowledgeable and proactive about threats to information security?

Question 4: Creating Company E-mail/WIFI/Internet Use Policies (5 and more page excluding reference page in APA with 4 latest journal article references)

Cybersecurity Planning and Management

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Wk 5 – Multiple Question

**** Need it by 02/06/2020 7 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

SUBJECT: Information Technology in a Global Economy

Question1: In at least 2-3 paragraphs (2 references & Intext citations)

What are some of the shortcomings/pitfalls associated with the value-sensitive design (VSD) methodology used for assessing the needs of end users and incorporating impacts on stakeholders? 

And how you can prevent and/or address those identified shortcomings/pitfalls to allow for effective use of VSD approach?

Question2: 2 page essay

Chapter 9 (refer attached textbook) discussed the importance of stakeholder engagement in policy making. The author presented several benefits and an analysis of five cases in which stakeholder engagement added value to the policy making process. 

If you were leading a project to develop a comprehensive policy for managing pedestrian traffic flow in a popular downtown metropolitan district, what measures would you take to engage stakeholders in that project? 

Your answer should outline your suggestions and clearly explain why each one would add value.

Submit a 2-page (double-spaced) paper addressing the above. 

Ensure that you include at least two (one from course material, i.e., assigned readings/lecture and one from external sources) APA-compliant references and corresponding in-text citations. 

SUBJECT: Cloud Computing

Question 3: In 300 400 words, and using the Jamsa textbook (attached textbook) as your ONLY source: APA format

List and Define FOUR (4) advantages AND Two (2) disadvantages of cloud-based data storage and then, IN YOUR  OWN words, describe how three of the four advantages could benefit a small start-up business.

SUBJECT:: InfoTech Importance in Strategic Plan

Question4: 400 word essay addressing each point mentioned the question (2 references & Intext citations)

Discuss an organizations need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? 

Lastly, explain how these security measures will safeguard the organization.

Question5: four to six pages in length (1200-1800 words), not including the required cover page and reference page.

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

1. Computer and email acceptable use policy

2. Internet acceptable use policy

3. Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. 

Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Course Text book: Pearlson, K., Saunders, C., Galletta, D. (2020). Managing and Using Information Systems: A Strategic Approach, 7th Edition. Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 978-1119560562

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

SUBJECT: Information Security & Risk Management

Question 6:

Write a 4 page paper that performs a Risk Assessment and Risk Mitigation plan for ProMed Insurance (refer attached PPT)  Also create a BIA and BCP for the company.

Be sure to look at the accompanying PPT slides that show the flow of the company and a general idea of the network

Use APA formatting. You do not need to include an abstract at this time, however, a cover page and references are required.

IG And PS WK5

**** Need it by 02/206/2020 7 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

Subject: Physical security (300 word essay with APA format, 2 scholarly references & Intext citations)

Question1: Compare and Contrast the Two Different Types of Door Bolts (refer attached DoorBolts PPT)

SUBJECT: Information Governance

Question2: In at least 300 words (2 scholarly references & Intext citations), discuss and share your thoughts, ideas, comments and/or questions concerning Week 5’s lecture.

Refer the attached the PPT (chapter6 ppt) , textbook (Chapter 6)

Quantitative

 

For this assignment, you will need to perform a quantitative analysis on the below scenario.  Please write your response in a brief APA formatted report.

Quantitative Analysis

You are the manager of desktop support for NASA.  You are responsible for purchasing and managing all of the laptops NASA distributes to employees.  There are 700 laptops currently in service.  All of the laptops randomly leave the building and serve a mobile workforce.  Read the following articles your CIO brought to you for consideration:

http://www.pcworld.com/article/251318/48_nasa_laptops_stolen_in_two_years_a_case_for_better_encryption_practices.html

http://www.pcworld.com/article/181124/laptops_that_go_ghost.html

 Compute the SLE, ARO, ALE and safeguard value based on the information in these articles for a report your CIO plans to submit as a solution.  For the safeguard value, find and price an appropriate physical and software solution(s) to safeguard theft and data loss.  Once you pick a product, include a link to the page for pricing and item description.  Present the realized savings in your report and the benefits of the solution you choose for safeguarding the laptops.  Dont forget to include your equations for ARO, ALE, safeguard value and realized savings calculations.  

Critical Essay About: Improving Data Governance

  

I need your help for writing essay (4 pages not including the cover page and references page)  

The topic as below:

Effective information management and data governance are invaluable  to an organization. For this assignment, first explain the concept of  data governance and its importance within an organization. Then,  identify two organizations that have benefited from implementing a  technology that improved their data governance. These organizations may  be ones you have personal experience with or that you have identified  and studied through research. Briefly describe both organizations and  then answer the following questions for each:

  1. What technology did they implement?
  2. Why did they choose that technology?
  3. What business factors were evaluated prior to implementation?
  4. What information deficiencies existed prior to implementation?
  5. What benefits were gained after implementing the technology?
  6. Do the benefits associated with the technology outweigh the costs?

 

Directions:

– Write an essay that includes an introduction paragraph, the essays body, and a conclusion paragraph to address the assignments guide questions. Do not address the questions using a question-and-answer format. 

-APA style should be used

-Font will be: Times roman 12, and double space should be between lines

-At least 3-4 scholarly, peer-reviewed journal articles will be used as references (including the below two).

Required Reference:
 

  • Joshi, A., Bollen, L., Hassink, H., De Haes, S., & Van Grembergen,  W. (2018). . Information  & Management, 55(3),  368380.
  • Kirkpatrick, K. (2018). . Communications of the ACM, 61(9), 1921.
  • Lewis, B. (2017). . Computerworld Hong Kong

PS Disc 5

 Need 500 words with 2 references

Preamble

  • As my collogues from the first school of thought asserted, security lighting is fulfilling its purpose by making private and public facilities less hazardous, less likely to become a target for theft and vandalism, multi-family residential sites and safe dwellings locale for local residence. Altogether, private and public organizations are disposed to vandalism, loss of data, fire, flood and natural disaster, unnoticed.
  • The second school of thought, the one I subscribe to, urge private and public organizations to retain an experienced professional security lighting designer in the process.
  • It is worth indicating that with and without experienced professional security lighting designer, perpetrators still have upper hands to infiltrate the facility.

Scenario

Provide comprehensive chronicles on advantages of retaining experienced professional security lighting designer in physical security lighting operation.

Access Control #2

What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws, and the establishment of regulations and policies for access control? Cite such laws, regulations and policies in your particular state.  200-to-300 words with  properly formatted in-text citation and scholarly reference. 

Discussion5_BI

 

Read the end-of-chapter application case “BBVA Seamlessly Monitors and Improves its Online Reputation” at the end of Chapter 7 in the textbook, and answer the following questions.

  1. How did BBVA use text mining?
  2. What were BBVA’s challenges, and how did BBVA overcome them with text mining and social media analysis?
  3. In what other areas do you think BBVA could use text mining?

Note: Need 400 words. PFA textbook.

Need 600+ Words With No Plagiarism And 2+ References

Discuss an organizations need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Please have atleast 2+ schoarly references A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience