cloud computing 5

 

Continuing on the same path as last week, you will revisit the AWS training to start and complete AWS Cloud Practitioner Essentials (Second Edition): AWS Integrated Services module.

It will take approximately 100 minutes.  Once complete, return to Week 5 discussion and (a.) tell us what you learned that you found interesting about the content.  (b.) Discuss how these services work together and finally, (c.) go to another student’s post and ask a question related to their post.  You must also answer a question(s)  pose to you by myself or another student.   Enjoy!

OE W 6 D

 Identify and describe one real or potential security/ethical/social/moral issue that is raised by Information System/Information Technology in your environment (work or home) THAT YOU CAN SAFELY SHARE and address specific ways to address it.
Include or provide a link to an illustrative video (such as from YouTube) to receive full credit.  You don’t have to create a video (unless you really want to!). 

 Include at least one reference in your answer to the question. Your reference(s) should be APA compliant. 

300 words needed

URL for the video is important

Assignment

 

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Apply: Ethical Challenges

 

Assignment Content

  1. Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data, information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and users’ intellectual property (e.g., photos, artwork, videos, etc.).

    Continue your work with your team on the features of the application by identifying ethical challenges and specifying the type of data the feature uses, a risk mitigation strategy for the risk you provided in Week 2, and a global ethical perspective of the choices you made in implementing a risk mitigation strategy.

    Develop a 1-page table using the Ethical Challenges Worksheet template provided. Turn in 1 table for the team.

    Note: This assignment will help you develop your individual assignments in subsequent weeks.

Assignment Paper

 Pick an industry/company to focus on for this assignment.  Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan

Document Format

  1. Title Page: Title/Name/School/Class/Professor/Date
  2. TOC-Generated by MS Word modified to APA 7 (see video)
  3. Introduction (not a Heading) – brief background of company and any issues the company has had in the past such as data breaches.
  4. Heading 1-Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
  5. H1-Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
  6. H1-Crisis Management Plan:
  7. Heading 2-Purpose
  8. H2-Committee for crisis management planning
  9. H2-Crisis types
  10. H2-Structure of the Crisis Management Team
  11. H2-Responsibility and control
  12. H2-Implementation Plan
  13. H2-Crisis Management Protocols
  14. H2-Crisis Management Plan Priorities
  15. H1-Conclusion
  16. Reference page (Generated by MS Word)
  17. Divide the work on the plan amongst your group members.

PLEASE USE THE ATTACHED TEMPLATE

RM-RESEARCH-8

RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

5 pages excluding references and cover page. Follow APA 7 format and citations.

TOPIC: 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately five to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Articlee writing

Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.

War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013)

2. The minimum word count shall be not less than 1000 words.

in APA format

research

Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: