Enjoy the best grades that will raise your GPA.

Category: Technology (Page 1 of 16)

NOTE: Women and men are to respond to separate sets of questions listed below in

NOTE: Women and men are to respond to separate sets of questions listed below in a minimum of 500 words. Non-binary identifying students may choose either one.
Questions to answer for the women in the class:
Cultural Meme: the Cinderella Story — Please read the attachment
1. How was this very ancient story transmitted to you?
2. Why do you think so many cultures have preserved it and taken so much effort to pass it on to succeeding generations right up to yours and your girl children’s?
3. Why might you want to caution your daughters about the implications of the story?
4. Would you want your twelve-year-old daughters to watch the contemporary Cinderella story “Pretty Woman” starring Julia Roberts as a hooker who gets lucky?

NOTE: Women and men are to respond to separate sets of questions listed below in

NOTE: Women and men are to respond to separate sets of questions listed below in a minimum of 500 words. Non-binary identifying students may choose either one.
Questions to answer for the women in the class:
Cultural Meme: the Cinderella Story — Please read the attachment
1. How was this very ancient story transmitted to you?
2. Why do you think so many cultures have preserved it and taken so much effort to pass it on to succeeding generations right up to yours and your girl children’s?
3. Why might you want to caution your daughters about the implications of the story?
4. Would you want your twelve-year-old daughters to watch the contemporary Cinderella story “Pretty Woman” starring Julia Roberts as a hooker who gets lucky?

NOTE: Women and men are to respond to separate sets of questions listed below in

NOTE: Women and men are to respond to separate sets of questions listed below in a minimum of 500 words. Non-binary identifying students may choose either one.
Questions to answer for the women in the class:
Cultural Meme: the Cinderella Story — Please read the attachment
1. How was this very ancient story transmitted to you?
2. Why do you think so many cultures have preserved it and taken so much effort to pass it on to succeeding generations right up to yours and your girl children’s?
3. Why might you want to caution your daughters about the implications of the story?
4. Would you want your twelve-year-old daughters to watch the contemporary Cinderella story “Pretty Woman” starring Julia Roberts as a hooker who gets lucky?

Write an introduction and outline for your signature assignment paper Signature

Write an introduction and outline for your signature assignment paper
Signature Assignment
The Equifax Data Breach
Purpose of Assignment
Program Student
Learning Outcomes:
Analyze issues occurring within the field of information
security, both organizational and personnel security, in the context of
business communications, operations, management, and compliance.
Course
Outcomes

Describe threats to information
Security

Identify methods, tools and techniques
for combating information threats

Identify types of attacks and problems
that occur when systems are not properly protected

Explain integral parts of overall good
information security practices

Identify and discuss issues related to
access controls

Develop Information Security policies
based on industry guidelines and best practice models.

Define risk management and explain why
it is an important component of an information security strategy and practice

Develop prototype contingency plans and
discuss the development steps involved

Identify and evaluate security issues
related to personnel decisions, and the qualifications of security personnel
The signature assignment paper will examine
information security management issues related to The Equifax Data Breach
report of the U.S House of Representatives Committee on Oversight and
Government Reform.
INSTRUCTORS: The Equifax Report from the U.S. House
of Representatives Committee on Oversight and Government Reform from December
2018 provides a case that substantially covers all the material and outcomes
taught in this course. There are several other cases involving information
security that could be substituted at your discretion.

Please respond to the initial discussion questions below and provide different r

Please respond to the initial discussion questions
below and provide different responses for the two students (Komo and Terry) posts
below. The format should look like the request below. Again, please provide
three different responses. PLEASE MAKE SURE THERE ARE 3 DIFFERENT RESPONSES. The
INITIAL and the 2 STUDENTS. PLEASE DO NOT JUST RESPOND TO THE 2 STUDENT
RESPONSES
Week 5 Discussion
Please research the process of setting up a Security Program within a medium sized organization. Provide a list with short description of the most important 20 things to accomplish during this process.
Komo’s post:
The following link (not referenced here) details InfoSec considerations specifically for a healthcare organization as an example (but could be applied to most mid-sized orgs):
https://www.phe.gov/Preparedness/planning/405d/Documents/tech-vol2-508.pdf (Links to an external site.)
Depending on the overall number of employees of the medium-sized organization, the Security Program can still be set up much along the same lines as a larger counterpart but with a few adjustments for staffing and departmental responsibilities. The first thing would be to ensure an adequately staffed team is in place to implement and advise on the remaining aspects. Many organizations may still approach this from a standpoint of Organization, Documentation, and Controls (Snodgrass, 2019). Provided below is a list of the most important 20 things to accomplish in establishing a medium-sized org Information Security Program:
“1. Start with security in mind
Form/hire a dedicated InfoSec team
Allocate necessary resources (budget) to the program
Organizational chart with roles & responsibilities identified (including InfoSec)
Control access to data sensibly; maintain accurate account and access lists
Require secure passwords and authentication, including 2FA or MFA
Store sensitive personal information securely and protect it during transmission (i.e. data encryption.) Don’t collect or use personal info you don’t need. Only retain information so long as there is a legitimate business need to do so.
Segment your network and carefully monitor who’s trying to get in and out.
Secure remote access to your network (VPN, 2FA or MFA, etc.)
Apply sound security practices when developing and/or deploying new products/services.
Make sure your service providers implement reasonable security measures.
Put procedures in place to keep your security current and address vulnerabilities that may arise
Secure paper, physical media, and devices
Workforce training and education
Document and train network security & acceptable use policies
Maintain asset lists, device configurations lists and network diagrams
Institute maintenance/support agreements
Implement and document an incident response plan
Implement and document a disaster recovery plan
Institute a business continuity plan” (Snodgrass, 2019) (Start, 2015).
Snodgrass, G. (2019). Back to Basics: Infosec for Small and Medium-Sized Businesses. The State of Security. TripWire.Com Retrieved from https://www.tripwire.com/state-of-security/security-data-protection/basics-infosec-small-medium-businesses/ (Links to an external site.).
Start with Security: A Guide for Business. Federal Trade Commission. (2015). Retrieved from https://www.ftc.gov/business-guidance/resources/start-security-guide-business (Links to an external site.).
Terry’s post:
Firewall : Used to block unwanted traffic
Training employees : Provide workforce with the tools to prevent breaches and eliminate potential security threats
Learn from the past: Document and investigate areas of opportunities to protect your data
Restrict Access: Limit access to the network to only authorized users and accounts.
MFA: Use Multi Factor Authentication as a form of verifying authorized access
Monitor Systems: User IDS and IPS to monitor traffic for suspected activity
Encrypt Data: Store all data should be encrypted to add an extra layer of protection in case data is compromised.
Backup Data: Offsite/Cloud base store
Implement Cybersecurity Policies: Have in place clearly defined practices for employees to follow to ensure the protection of important data
Document Inventory of data: Know what and how much data is being stored and protected at all time
Test for vulnerabilities in network: Hire outside contractors to check your network for weakness.
Keep everything updated: Hardware and the Software that accompany it always need to be checked for and updated as soon as possible
Create a mobile device action plan: Require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment.
Secure Wi-Fi networks: If employees are working wireless, ensure the network is encrypted secured and hidden
Use static IPs: Assign static IP’s to only authorized devices to allow access to the network preventing any unauthorized device from connecting to the network.
VPNs for remote access: Only allow remote access to network via VPN
Update best practices and policies: Always continue to expand and evolve your cybersecurity program and training.
Inhouse IT Security: Have a team on hand to oversee the protection of your network.
Automatic lockout: Set devices to automatically disable if not used in 20 days or more.
Password requirements:Place a set of password complexity requirements and changes to help protect the network from password hacks

Please respond to the initial discussion questions below and provide different r

Please respond to the initial discussion questions
below and provide different responses for the two students (John and Heather) posts
below. The format should look like the request below. Again, please provide
three different responses. PLEASE MAKE SURE THERE ARE 3 DIFFERENT RESPONSES. The
INITIAL and the 2 STUDENTS. PLEASE DO NOT JUST RESPOND TO THE 2 STUDENT
RESPONSES
Week 6 Discussion
Who is responsible for Risk Management in an organization? Which community of interest usually takes the lead in information asset risk management? Which community of interest usually provides the resources used when undertaking information asset risk management?
John’s post:
Risk management is an aspect of an organization that needs to be adopted and understood by all. Different parts of a business can be exposed to risks. Such as project teams and IT security teams. Risk management is the management of potential risks along with its mitigation. Risks need to be understood and assessed to see their likelihood of it occurring and then move from there. In terms of information being vulnerable, a security lead such as a CISO or Information security manager needs to be aware of risks. Furthermore, an environment needs to be assessed and their level of impact needs to be understood in order for appropriate action to occur.
Heather’s post:
Management is responsible for identifying and controlling the risks an organization encounters; while at the same time, everyone is responsible in different ways. Together the InfoSec, IT, and General management and users communities of interest assume responsibility for managing risks in an organization. When it comes to taking the lead in information asset RM, senior and executive management work with the CISO in a unified governance to develop and enable the an effective risk management implementation. The governance group will often start allocating the needed resources to support the RM program development and implementation once the policy has been developed or concurrently while it is in development. This is normally a multi-phase effort, starting with enough resources to support the framework design then providing supplemental support through implementation and execution.

See Attachments for instructions and Excel spreadsheet Case Assignment Your proj

See Attachments for instructions and Excel spreadsheet
Case Assignment
Your project to build a simple shopping site seems to be going pretty well, but not exactly as planned. You got caught a bit short on resources, but think you have a new developer coming in to help soon. But you are pleased with your existing staff’s productivity so far. You decided to delay the build on the home page because it had lots of slack time, and few dependencies. The team member assigned to the image update got some of the basics done and some images set up, but then ran into a snag that will take a while to resolve. You had her go ahead and start on the browsing page. You also managed to get a resource to work on setting up the test environment and test plan so you can be a jump ahead of things for the UAT.
See Earned Value Excercise FA2020.xlsx Download Earned Value Excercise FA2020.xlsx.
It is now Friday Feb 28, indicated by the vertical red line in the Gantt shown above. You just had a meeting with your team to get a status report on each of the tasks in the WBS. The cost data and percent complete data is in the attached spreadsheet. You are preparing a status report for your client so you can go over it on Monday morning, March 1. Complete the spreadsheet and prepare a FEW slides that show the client where the project stands in terms of cost and schedule. Be sure to let her know what you currently estimate the final cost and finish date to be.
Submit the spreadsheet with the formulas and the pptx file.
Depth of Thought will be evaluated on your conclusions and how well you communicate to the client about current status and future expectations.
Technical Tools will be evaluated on how you calculate EV, SV, CV, and the relevant future projections that you need to present to the client. (ETC, EAC, etc.)

!!! You must be able to prove a Free plagiarized report 1. Your paper must foll

!!! You must be able to prove a Free plagiarized report
1. Your paper must follow APA format guidelines throughout.
(A sample APA template for you to use is attached to the bottom of this page. It contains Latin placeholder text. Replace the text with your content).
a. Double-spaced
b. 1-inch Margins
c. 12-point size professional font (e.g. Times New Roman)
d. Header
e. Automatic Page numbers
f. Title page
g. Reference page
2. Length: Minimum of 1,000
(Title page, Reference page, and direct quotes do not count toward the total word count).
NOTE 4: Going over 1,500 words is fine, but if you are under 900 words you will be penalized (10%).
3. Title Page
Your title page must be APA formatted and include the following:
a. Project Name
b. Your Name
c. Course Name and Section Number
d. Semester
e. Instructor’s Name
f. Title of Research Paper Topic
4. References Page
Your References page must be APA formatted.
5. Sources: Include the source(s) from Section 2 and at least one source in Section 3.
Clarification: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar. Examples of scholarly sources include textbooks, articles, academic journals, and conference proceedings. Scholarly resources are written by experts in their fields, grounded in research, and often refereed (reviewed and edited by researchers in the field). Examples of professional sources include trade journals or magazines. Professional sources are written for a specific audience that works in a certain field. They are not research-based. You can also use our course content (e.g. Read & Watch resources) as a source as well. UMGC has a top-notch, extensive online library. You can find many scholarly and professional sources there.
NOTE 5: You can also use social media (e.g. Twitter posts, blogs, YouTube) sources as well as this is a paper about the use of digital and social media.
6. Setup & Organization
Your paper must include the following pages and Level 1 Headings:
a. Cover Page
b. Topic Introduction (Section 1)
c. Topic Discussion (Section 2)
d. Additional Research (Section 3)
e. Reference Page

« Older posts

© 2022 assignmetshive

Theme by Anders NorenUp ↑