Discussion 6 – Info Tech Import Plan

What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?

Please make your initial post of 500 to 600 words.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Emerging Threats and DIscussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

security

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Essay Questions

The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. 

Question #1

Immunomedics was alerted that there was some negative buzz about the company in a chat room. The poster used a pseudonym, and therefore the company was unable to identify the poster for lawsuit purposes. The only information the company could ascertain was the poster’s ISP. So the company decided to subpoena the ISP for identity information of the poster in order to file suit against the poster. How should the courts handle these cases, where the company’s complaints may, or may not rise to the level of an actionable legal claim?

Chicago Lawyers Committee for Civil Rights Under Law, Inc. v. Craigslist, 519 F.3d 666 (7th Cir. 2008).

Question #2.

Users of the popular Internet website Craigslist are able to post advertisements for housing that permit statements regarding the preference, limitation, or discrimination of others based on race, religion, sex, or family status. The Fair Housing Act (FHA), however, prohibits making, printing, or publishing a notice, statement, or advertisement for sale or rental of dwellings indicating preference, limitation, or discrimination based on protected classes. As such, the Chicago Lawyers Committee for Civil Rights Under Law, Inc. brought suit against Craigslist alleging a violation of the FHA. In defense, Craigslist claimed that it was immune from liability based on Section 230(c)(1) of the CDA, which protects interactive computer services from liability for unlawful third-party content. Should Craigslist be subject to liability for FHA violations? Why or why not? Cite to appropriate legal principles when explaining your answer.