Module 8 Assignment : Cyber Law

 Module 8 Assignment

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it. please use APA format and add references. 

ERM WK3 -S

 Q1. 275 words

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Q2. SEPARATE DOCUMENT —- Research paper – 5 full pages

 Readings: 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

The above article readings  give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

OR_Assignment_3

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

   A minimum of five peer-reviewed journal articles.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

Database SQL essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?  Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)
With atleast 3 references 

Week 2 Project

*ROUGH DRAFT and PROJECT TIPS ARE ATTACHED*  

Graduation Party Location

It is now time to revisit your graduation planning activities by  choosing your location and entertainment for the party. You will do this  by creating tables to compare the attributes and issues of your various  choices.

Click on the link below, Week 2 Project Tips, for some visual aids on how to tackle this week’s project.

Week 2 Project Tips

Create a new Microsoft Word document and save it as W2P_LastName.docx. Note that you might want to change your page orientation to landscape to better fit your data.

  1. Create a table to compare the different locations you chose in Week 1.  You can add a table to your document by using the Table icon in the  Insert ribbon of Microsoft Word. Your table should include the following  columns – you can see an example of this layout in the Week 2 Project Tips:
    • Location: List the three possible locations.
    • Web site: Include the URL hyperlink for each location’s Web site.
    • Positives: Include a bulleted or numbered list* of positive attributes of each.
    • Negatives: Include a bulleted or numbered list of issues for each location.
    • Estimated Cost: Include the cost(s) associated with using the location/facility.
      *You  can create a list using the icons in the Paragraph panel of the Home  ribbon (Bullets, Numbering, or Multilevel). Changing the margin settings  of the cells with bullets can be helpful.
  2. Beneath your table, write a paragraph of at least 50 words to include:
    • Identify which location you chose.
    • Justify why you made the choices you did using the information in the tables to guide your decision.
    • Check the Status bar at the bottom of the window to see the word count.
       
  3. Finally add the finishing touches to the paper.
    • Add page numbers in the Footer (bottom of your page).
    • Add a Header that includes the name of your event and your name.
    • Add some formatting and color to your table.
    • Bold and center the table headings.
    • You can change the color of your text or the color of the background  to color code your table or make it more readable. Be creative and have  fun!

By the due date assigned, submit your completed document to the Submissions Area. In the Comments box, briefly share your experiences with completing this project.

Analyze Current Security Products and Services

Searching for Vendor Information (without getting a ton of sales calls)

It is often helpful to research a Vendor and their products before contacting the company, (when you contact the company, you often are inundated by sales calls). The assignment is to gather information on a provider of security/privacy products and write a short recommendation document. Include in your report:

  • types of services this vendor provides
  • facts about this company that would lead to their reliability as a provider
  • how they compare to other similar vendors (you will need to look at a few companies to gather this information).

One very useful publication is ICD Research Reports. This is found using the library technology databases. (PDF ATTACHED TO QUESTION)

Complete a three to four-page report with APA cited references to support your work.

IT 345 Assignment 1

 Required Assignment 1: Submit one to two-page summary of a journal article on a relevant topic of your choice. You are required to use IGU’s learning resources such as university’s digital library and online resources and confirm your use of these resources with your instructor. See “LRS” section above.

Assignment Week 4
1. Use Library Database in Syllabus to find an article related to Organizational Behavior:
2. Capture five major points of from the article and use APA to acknowledge this is captured or copied by (authors last name, date)
3. Write a short paragraph explaining why you think this article interest you as Introduction
4. Summary: Write your conclusion of what you have learned from the article
5. List the title and author of the article
6. Reference put the article reference in APA format 

Week 4 Discussion

    

For this discussion, you will need to address the question below and be sure to participate fully by responding to your classmates as well. Citations should be used to support your analysis and references should be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!

Productivity software (such as Excel or Google Sheets) is used by almost every business. Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work?

The Question:

•Productivity software (such as Excel or Google Sheets) is used by almost every business.  •Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work? 

Ask yourself:

•Please note this week Excel is studied. •What is productivity software (Excel)? •How is productivity software (Excel) increasing efficiency in your own field of study and future profession?  

Cryptography 9 Discussion

Question:  describe a cryptographic hash function and how it is used as a security application.  

 -You must use at least one scholarly resource. 

 -Every discussion posting must be properly APA formatted. 

-400 words

-References

-No Plagiarism.