Week 6 discussion

 

The proliferation of the Internet of Things (interconnected devices, primarily using wifi as the means of communication) means that most individuals will be using a wifi network or be exposed to wifi networks on a daily basis. Reflect on the following:
1. What risks and safeguards are associated with wireless communication? 
2. Are you comfortable (or would you use) a wireless “hot spot” to do computer work?
3. What safeguards might you use in accessing an unprotected (public) wireless communications? 
4. Are you more at risk using a wireless connection via laptop or a connection via a smart phone?

For the curious, take a look at What is “war driving” or “war flying.” How prevalent are these two terms today?

casestudy

n a 2-3 page APA formatted paper, describe your workplace. 

  • Describe in detail the industry this company belongs to, and who represents its customer base. 
  • Who is your customer in this organization, internal or external, and how do you serve your customers’ needs as an Intern/Employee? 
  • Describe how your IT skills have helped you in your current job in terms of IT management and/or project management, leading a team, and enhancing your career in the field of IT management.

Your paper should be formatted in the 7th edition APA style and include references as required.

Assignment

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be?

Format: APA with citations

Word count: 500 words

disaster recovery plan in cybersecurity

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business. 

Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).

Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.

offer advice and suggestions on thing we should do or should not do in disaster recovery plan 

3 pages 

Assignment

 

  1. Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic OperationsOperations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
    Screen shot 1: Arithmetic Operations

    • assign a value of 144 to x
    • assign a value of 6 to y
    • add x and y
    • subtract y from x
    • multiply x times y
    • divide x by y
    • find the square root of x
    • Screen shot 2: Operations on vectors
    • create a vector (afc) and assign values 2,6,3
    • create a vector (nfc) and assign values 6,4,2
    • add afc and nfc
    • Screen shot 3:  Recycle Rule for adding and subtracting vectors
    • assign values 2,1,8,3 to vector x
    • assign values 9,4 to vector y
    • add x to y
    • notice the warning message – use the Recycle Rule for adding vectors; then 
    • add x to y and show results
    • subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
    • subtract y from x and show results
    • Screen shot 4: Create an S3 Class Object
    • create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
    • name the class as “graduate student” 
    • Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).

Information Security

In 175 words or more discuss why information is an asset to a company. Explain why an effective information governance strategy is essential in safeguarding information assets. What is the importance of digital signatures in today’s corporate environment?

Find a criminal case that involved Digital Forensics.

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Use References. Include quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

It should be Plagiarism free.

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.