Discussion Post-IT to the cloud

 

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc. 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

APA references and citations must

Data Visualization – Discussion post

  

As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking.

Select 1 of these perspectives and mention why you selected it.

***Please note this is YOUR perspectives.  This is YOUR opinion, YOUR views.  Do not copy from any research/resource.

******Your responses must be your own work.  You must reword any information used from any source  – using your own wording. You must include all sources used to complete all responses posted.  

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.

Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Discussion

https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/

Read the article in above link,  discuss whether you think the premise of the  article is correct and that people are more aware of privacy concerns.   

Use at least three sources from https://libguides.nec.edu/az.php .   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. 

data breach

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

a. “Big Data, Small World: Kirk Borne at TEDxGeorgeMasonU” found at https://www.youtube.com/watch?v=Zr02fMBfuRA

b. “KM Russia 2015: Big Data and KM” found at https://www.youtube.com/watch?v=UypaQRfgkKE (by Dr. John Girard)

1. Write 4-5 page document 

2. NO Title Page

3. Minimum 3-4 references

Physical Security

 Discuss the Privacy issues related to the use of Biometric devices and comment on a classmates report.
For the remaining Assignments you must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.

Structured External Assignment Proposal

  

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Organizations have problems patching vulnerabilities

Question A

  • What are some of the reasons why organizations have problems patching vulnerabilities

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

500 words 

APA format