Discussion Post MAC, DAC, and RBAC

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Discussion 2

Prior to beginning work on this interactive assignment, review any relevant information in this week’s lecture, review the Class of 2017 yearbook: The premier 100 technology leaders web page (https://www.computerworld.com/article/3154630/class-of-2017-yearbook-the-premier-100-technology-leaders.html) and select two leaders from their list. Compare their leadership strategies and analyze the differences between their two styles. Using examples, analyze the role each leader plays and explain how each leader’s information systems strategy impacts their organizations. Compare these leadership strategies to the IT leadership of an organization where you work or have worked and explain how the leadership in your organization could improve.

Your initial post should be a minimum of 300 words.

Microsoft PowerPoint Discussions

Let’s Pause and Reflect on your journey with the MICROSOFT POWERPOINT graphics presentation application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others.

You made it!!! This is the end of your Microsoft Office journey…Do you remember who you were when you began your journey in the class?
This class was a journey through four of the more popular applications in the Microsoft Office Suite. Please tell us about what you have learned, your trials and successes, and your overall satisfaction with the course and Simnet. Take a moment to share praises for your instructor. How did your instructor help you to be successful this month? How has this class compared with some of the other courses you have taken at Keiser University or elsewhere?

Word Count must be over 100

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Cloud Computing Discussion 4

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.   

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

 

Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

 300 words.

project

Assignment 2

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of importing, exploring and examining your data to develop a robust familiarization with its potential offering:

Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Getting Started with R Tool

Complete this tutorial to assist with the assignment

· Data Importing Using R – http://www.r-tutor.com/r-introduction/data-frame/data-import

· R Data Type – http://www.r-tutor.com/r-introduction/basic-data-types

· R Data Vectors – http://www.r-tutor.com/r-introduction/vector

· R Data Frame – http://www.r-tutor.com/r-introduction/data-frame

· Data Import – http://www.r-tutor.com/r-introduction/data-frame/data-import

· Data Statistic – http://www.r-tutor.com/elementary-statistics

Benchmark – Framework Findings and Recommendations

 

Benchmark – Framework Findings and Recommendations

This assignment serves to benchmark competency 2.1: Establish a risk management framework using industry standards for compliance.

Based on an executive level report, deliver the findings of the Topic 4 “Demonstrating the Gap” assignment.

Include the following in your report (add sections to the template as needed):

  1. An overview of why the report is being written
  2. A paragraph description of the system
  3. A paragraph outlining the framework governing the enterprise
  4. Major gaps that were found
  5. Remediation that is recommended
  6. A high-level diagram that represents the current state of the system
  7. An equal diagram depicting the proper end state

Refer to the “Security Assessment Report (SAR),” within the required readings. This resource provides detailed explanations of each section that should be included within the assessment report. 

APA style is not required, but solid academic writing is expected.

Refer to the “System Security Assessment Report Template” and the “Framework Findings and Recommendations Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

bharg discussion

 

here is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.