InfoTech in a Global Economy 1

 Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

 

  • Explain, define, or analyze the topic in detail

Corporate IT Security Audit Compliance

 

Discuss the advantages and disadvantages of Standards and Frameworks with an organization. 

Discuss this statement: “Both auditors and organizations benefit greatly from using well-known standards and frameworks”. What is your opinion and is it true? How does it benefit the organization?

security architecture risk assessment

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (Length: Minimum of 600 words)

1. What does an assessor need to understand before she or he can perform an assessment?

2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

fn wk 8

Please read “R3: Putting the ‘Fin’ Back into Fintech” case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1.How does Fintech compare to regular banking?2. Discuss R3 and its distributed ledger technology mission.3. What are some of the applications of cords and strategies of growing and expanding?4. What are some of the emerging markets that Fintech has impacted?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all s

ources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

OE Project

Determine whether there should be Information Technology / Information Security replacement/outsourcing (Use the dimensions of organizational transformation)

Information System (IS) Definition, importance and conclusion ( for Netflix )

Organization here is Netflix

Disuccsion

 describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.

ApA format 250words

Intro to CyberSecurity homework

 

1. (a)  In an environment in which several users share access to a single  database, can one user ever block another’s access for an unlimited  period of time? (This situation is called indefinite postponement.) (b)  Describe a scenario in which two users could cause the indefinite  postponement of each other. (c) Describe a scenario in which a single  user could cause the indefinite postponement of all users.

2. Using  the two-step commit presented in the beginning of this chapter,  describe how to avoid assigning one seat to two people, as in the  airline example. That is, list precisely which steps the database  manager should follow in assigning passengers to seats.

3. Suppose  a database manager were to allow nesting of one transaction inside  another. That is, after having updated part of one record, the DBMS  would allow you to select another record, update it, and then perform  further updates on the first record. What effect would nesting have on  the integrity of a database? Suggest a mechanism by which nesting could  be allowed.

4. Can a database contain two identical records without a negative effect on the integrity of the database? Why or why not?

5. Some  operating systems perform buffered I/O. In this scheme, an output  request is accepted from a user and the user is informed of the normal  I/O completion. However, the actual physical write operation is  performed later, at a time convenient to the operating system. Discuss  the effect of buffered I/O on integrity in a DBMS.

6. A  database transaction implements the command “set STATUS to ‘CURRENT’ in  all records where BALANCE-OWED = 0.” (a) Describe how that transaction  would be performed with the two-step commit described in this chapter.  (b) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS)  and (CUSTOMER-ID,BALANCE-OWED). How would the transaction be performed?  (c) Suppose the relations from which that command was formed are  (CUSTOMER-ID,STATUS), (CREDIT-ID,CUSTOMER-ID), (CREDIT-ID,  BALANCE-OWED). How would the transaction be performed?

7. Show  that if longitudinal parity is used as an error detection code, values  in a database can still be modified without detection. (Longitudinal  parity is computed for the nth  bit of each byte; that is, one parity bit is computed and retained for  all bits in the 0th position, another parity bit for all bits in the 1st  position, etc.)

8. Suppose query Q1 obtains the median ml of a set S1 of values, and query Q2 obtains the median m2 of a subset S2 of S1. If m1 < m2, what can be inferred about S1, S2, and the elements of S1 not in S2?

9. One  approach suggested to ensure privacy is the small result rejection, in  which the system rejects (returns no result from) any query, the result  of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records.

10. Cite a situation in which the sensitivity of an aggregate is greater than that of its constituent values. Cite a situation in which the sensitivity of an aggregate is less than that of its constituent values. 

Disaster Recovery for Cyber Security

Individual Assignment.

Both Deliverables: Post in Discussion Board.

(1) Prepare a list of four (4) Back-up and Disaster Recovery vendors.

Vendors: https://solutionsreview.com/backup-disaster-recovery/backup-and-disaster-recovery-solutions-directory/

Provide a brief description of their services.

Create a grid of them and compare and contrast them. 

(2) Disaster Recovery – AWS Outage 

Disaster Recovery Preparedness

At 9:45 AM (PST) on February 28, 2017, Amazon reported a severe degradation with Amazon Web Services (AWS). Many companies and organizations rely on AWS for their infrastructure. As a result, the incident created a highly-deprecated experience for customers. 

Many companies engineering teams worked through this outage and restored services using an alternate site. 

Companies are continuously enhancing/improving their back-up and disaster recovery readiness. Organizations learned from this incident to mitigate the risks associated with large scale outages from their service providers.

Using Internet resources, research and answer the following questions using MS Word/PDF:  

1. When did the AWS outage start and how long did it last?

2. What was the root-cause of the outage?

3. About how many sites were effected and what are some names of the larger companies?

4. When was the last time AWS was down prior to this incident and what was the root-cause?

5. Has AWS been down since this incident? If so, when, for how long, and what was the root-cause of the outage?

6. What can AWS do to prevent an outage again?

7. Briefly describe the AWS Shared Responsibility Model

8. What can a customer of AWS do to continue uninterrupted computer operations?

9. See this link on Barracuda Security for AWS: https://www.barracuda.com/programs/aws

If you were a customer of AWS, would you consider implementing Barracuda Security for AWS? What security features and why?

10. Prepare a high-level diagram of the AWS infrastructure and pinpoint in the diagram where the root-cause of the security vulnerability occurred.

Grading – 15 Points broken down as follows:

– 5 Points – The details in Deliverable 1

– 10 Points –  The details in Deliverable 2