Category: Information Systems

Emerging threats

Now that we have had an introduction to security protocols that will help reduce the risk of a security incident we are going to study security incidents.  Each student will select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism.  There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc.  As you evaluate the incident you evaluate several components throughout the remainder of the course.  

1. select our incident

2. create a 1-page introduction of the security incident

3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted. 

Whats the Worst That Could Happen?

 

Whats the Worst That Could Happen? 

This is a question you should (and will be) asking yourself as you take on a security officer role.  Quite honestly, this statement could become your undoing if you do not think it through or try to avoid answering such a question; however, the extreme voice of doom is not one you will be visiting very often.  You should be evaluating the possible circumstances and ask yourself the above question as it pertains to something that could happen, such as a fire or user error. 

For this exercise, you should think about a local company (one which you work or have worked) or a fake marketing firm in Kansas City Missouri.  Ask yourself this question as you think through what they have and what could be lost.  Think of a minimum of 7 threats to this network (one for each of the 7 IT Infrastructure Domains [pg.7]) and describe Whats the Worst That Could Happen? if these threats came true.  For the threats, you should think of 5 within the realm of possibility and 2 on the fringe of possibilities.

Organize this response as an APA formatted paper.  For each threat, you should write at least one paragraph responding to the question to each threat.

 

Course Outcomes Assessed:

1. Identify and define risk and risk management techniques.

2. Identify and evaluate threats, vulnerabilities, countermeasures, and mitigation recommendations.

Research Block Chain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

Be approximately 2-3 pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

  • Tarzey, B. (2019). Inside Blockchain and Its Various Applications. Computer Weekly, 16-20. Retrieved from
  • Carson, B., Romanelli, G., Walsh, P., & Zhumaev, A. (2018). Blockchain beyond the hype: What is the strategic business value? McKinsey Quarterly, (4), 118127. Retrieved from

BI

Read the end-of-chapter application case “Coors Improves Beer Flavors with Neural Networks” at the end of Chapter 6 in our textbook, and respond to the following questions.

  1. Why is beer flavor important to Coors’ profitability?
  2. What is the objective of the neural network used at Coors?
  3. Why were the results of Coors’ neural network initially poor, and what was done to improve the results?
  4. What benefits might Coors derive if this project is successful?
  5. What modifications would you make to improve the results of beer flavor prediction?

Data Mining

In this assignment you will write a 5 page paper discussing the “Foundations of Data Mining”.  The paper will compare “Data Mining” to “Traditional Business Reporting”.
The paper must be APA compliant to include at least 5 academic resources.  The page count does not include title page or Reference page.

Journal Reflection Assignment

 

Locate an article or example of a real use case based on this week’s lesson. If you can’t find an article or use case example make one up. Write a summary of the use case and describe how it is similar or different from the use case described in this week’s lesson.

Be sure to include the following requirements in the paper.

  • Description of real use case
  • Comparison of real use case and textbook use case. 

Your writeup should include:

  • Title Page
  • Content
  • References (if applicable)

Discussion 2

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

What are the challenges of Key Crptosystems?

 

Answer has to be 2 pages at the most including references. 

 Follow APA6 guidelines. It should include an introduction, a body with fully developed content, and a conclusion 

  Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. 

ist

Application Tool (10 points)

Many of you will be involved in decisions related to the selection of hardware/software for a

fictitious organization (describe organization & industry). As executives, we need to look

beyond the CNet & PC Magazines reviews and seek to examine these things in terms of

value for the organization and cost benefits. For this assignment you will choose to

compare one set the following products, hands-on (you are not to just read about them,

you must try them out). Choose one:

1. Microsoft Office & Google Docs

2. Apple iPhone & Android Phones

3. Microsoft Outlook & Google Calendar System

4. Blockchain & Ethereum

5. Select Two Different APPs (for comparable application such as Zoom and

Skype) to Compare

You will compare based on functionality for a business setting, initial cost maintenance costs, and other tangible & intangible criteria you have established. Proof of hands on interaction might include photos, screen shots, a scanned business card etc. Submit the completed work in Word 2003-2007, 2010, 2013, 2017 or pdf format through the integrated Assignment.

Strategic IT Planning: Your 3-Step Process

Strategic IT Planning: Your 3-Step Process

Introduction

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Dont bite off too much or try to be too ambitious.

Take your time and keep it manageable

Link your plan to your companys strategy

Justify your initiative and get buy-in and support

Dont re-invent, rebuild

Go slow, manage change

Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team wont be effective and you wont be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

Switch from fighting fires to preventing fires

Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3.  How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

 

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

 

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.