Final Project

Overview:

In the meeting with your executives, your CEO announced that you would need to

prepare a PowerPoint presentation of your department achievements for the last quarter

and present it in front of the hospital’s board of trustees who will be visiting your hospital

by the end of the month.

Instructions:

Based on that information, your IT Director asked you to prepare a 12-15-page

PowerPoint presentation which will take a fifteen-minute time slot where you discuss the

following:

• As you have opted for Windows-based computers, what are the significant

differences between a Mac and a Windows-based computer?

• What are the main differences between the leading operating systems: Windows,

Mac OS, and Linux?

• What are the measures that you are taking to keep computers safe and to avoid

health hazards from computer use?

• Is the hospital safe and immune from online annoyances such as spam and

adware? How can you further secure your system from malware?

• The advantages of your recent implementation of VoIP?

• Describe the improvements you have implemented in the hospital’s customer

relationship management (CRM) and how are you managing your relationship

with your vendors.

• Discuss whether the adoption of a medical expert system could be beneficial to

the doctors at your Hospital.

• Describe how social media can be effectively used as part of the hospital’s web

strategies and improve its position in the market?

Requirements:

• This assignment is a PowerPoint presentation consisting of 12-15 slides, using

APA formatting and citations.

• Include four references.

• Record voice narration and include closed captioning or script saved to the notes

in PowerPoint.

o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365

Cybersecurity

Reflect on what you have gained from taking this course.

Write a short statement of 200 words that completes and explains the following sentence.

“One of the most important Cybersecurity learnings I am taking away from this  fundamentals of Cybersecurity course is…

ET WK1 – S

400 words

After reading below two articles and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

 Readings:

 Requirements:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

policy

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Information Sec System

  

At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that 

1. Users are authenticated with password-based method

a. discuss the method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification– 

a. discuss the potential method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

3. Compare both password and biometric based method in terms of advantages and disadvantages.