ET WK4

Some of the different cybercrime such as Computer:

550 words

Crime, Internet, Telecommunication, Piracy,  Identity theft, Cyberspace, Denial of service attack, Spam, Zombie computer.  Select  one area of Cybercrime and discuss how to develop a security policy and various security and privacy regulations. Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

mad discussion

 

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 3 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Strategic IT Plan

  

Strategic IT Planning: Your 3-Step Process

Introduction

Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.

• Take your time and keep it manageable

• Link your plan to your company’s strategy

• Justify your initiative and get buy-in and support

• Don’t re-invent, rebuild

• Go slow, manage change

• Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

• Switch from fighting fires to preventing fires

• Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3.  How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

Penetration Testing

 

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words

Need Response 2 to below discussion

Please read the below discussion posts and provide the response in 75 to 100 words

Post#1:

 

A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a minimum level of service is maintained. The SLA should include not only an outline of the services to be provided and their expected service levels, but also metrics by which the services are measured, the duties and responsibilities of every party, the remedies or penalties for breach, and a protocol for adding and removing metrics. Now we have discussed 5 features of cloud SLA. “Based  on  policy  guidance,  autonomic  system  keep  the  system stable  in  unpredictable  conditions  and  adapt  quickly  in  new environmental  conditions  like  software,  hardware  failures” (Singh, Chana, & Buyya, 2017).

Uptime: Some cloud providers will offer lower uptime than what they can actually achieve just to give themselves some breathing space in the event of a data incident. This may be adequate for some businesses that can handle a brief loss in productivity, but for healthcare providers and government agencies that need immediate access to data, it is still considered inadequate (Zhao, et.al., 2016).

 Data Protection: Data protection processes, such as backup and disaster recovery, should be addressed in any SLA. The agreement should detail what each party is responsible for, acceptable performance parameters, which applications and services are covered, monitoring procedures and a schedule for remediation of outages whether by power outage, natural disaster, human error, or malware.

Exporting Data: Some cloud providers make it easy to migrate your data into their cloud, but charge large sums of money to return it to you—or they return it to you in an unusable format (we call this the Hotel California effect). So, you want to be sure you’re able to exit the contract if you need to and that there are no fees associated with doing so (or that they are minimal). You should also negotiate the export of your data in a predefined format (CSV, XLS, XML etc.). If you don’t have a skilled IT team that can make the export easy, you might also make it a condition that the provider assists you in the export. Finally, because some contracts require a notice of non-renewal within a certain period, make sure you understand the time period and if it seems unreasonable, try to talk it down or eliminate it altogether. “One of the main green cloud computing strategies used for the reduction of energy consumption consists in maximizing the utilization of a number of physical machines (PMs) and turning off or suspending unused servers” (Malekloo,, et. al.,2018).

Scalability: Many SLAs are designed to meet the needs of the customer at the time of signing, but we all know organizations can change dramatically in size over time. Make sure the SLA details intervals for reviewing a contract so that if your organization grows larger, your cloud capacity can grow with it and if your organization happens to grow smaller, you’ll want the option to reduce capacity; no sense it paying for unused capacity.

Data Location: Although cloud computing is all about the ease of accessing your data anytime, anywhere, it’s ultimately housed somewhere. Some providers may scatter your data across multiple locations, or house it overseas. Knowing where data physically resides is key when it comes to matters of compliance. “A Service Level Agreement (SLA) can be used to address these concerns, increasing trust in the purchased services through the clear description of the guarantees offered by the provider to the subscribers” (De Carvalho, et. al., 2017).

Post#2:

 

The agreement entered between the cloud service provider companies and the client or the user of the clouding service is cloud service level agreement (SLA). This is a type of a commitment that is signed between the service provider companies and the users of the clouding services. The agreement defines the different aspects of the services and responsibilities that are agreed on mutually between the service user and the service provider. It can between two or more parties. The agreement happened between the parties has many components which are defined from starting of the service till the termination of the agreement. Service level agreements helps in proper monitoring of the services in cloud computing. These define the quality of the service the company must provide to the customers till the end of the service agreement.

SLA is responsible for setting the security system required for management of the clouding space and free from intruders and vulnerabilities and also explains well about the backup plan the company has already set to prevent the data loss of any of the customers for the failure of the performances. There are many challenges associated with the clouding services which both provider and user face. SLA defines the terms and conditions which are agreed upon by both the parties for provisioning and consuming of the clouding service. SLA clearly defines and sets the expectations for both the parties. For the purpose of the development of an effective SLA, there are certain criteria which are needed to be established between both the provider and the user of the service. “Although there are many energy-aware resource management solutions for Cloud data centers, existing approaches focus on minimizing energy consumption while ignoring the SLA violation at the time of virtual machine (VM) deployment” (Zhou, 2018).

1) Cloud hardware and software: the cloud service provider must use all the essential hardware and the software devices required for providing the services effectively to the customers potentially. The agreement must include the hardware devices that the company would be using to provide the services. When the company knows the equipments and the software specifications of the hardware devices then it becomes easy for the providers to build the cloud construction environment and teach staff about it. “Resource overbooking is one way to reduce the usage of active hosts and networks by placing more requests to the same amount of resources” (Son, 2017).

2) Customer Responsibility: the clouding responsibility is not solely hold by the provider companies but it is shared between the user and the provider both. The provider companies should well explain about the roles and responsibilities of the users before entering into an agreement.

3) Disaster recovery and backup: the service provider companies should be well equipped with a disaster recovery plan so that there is not any kind of data loss of any customer. The system must be updated with automatic backup technology and must be mentioned about its use and blueprint into the agreement. This will make the user satisfied about the data saved in the clouding space provided by the service provider companies.

4) Data Ownership: the service level agreement must clearly specify the ownership status of the data to make everything clear and transparent between the user and the service provider and avoid any kind of future conflicts.

5) Availability: the service level agreement must clearly specify the provider’s promised availabilities. The network and the service must be same throughout the agreement and must not break in between the agreement. The promises made should be accomplished upto 99.99% successfully. “As SLAs are critical for cloud deployments and wider adoption of cloud services, the management of SLAs in cloud and IoT has thus become an important and essential aspect” (Mubeen, 2017).

Week 10 Discussion – Cyber Law

Discussion on Social media:

Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.

Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 450 words. Please add references in APA format.

Discussion

A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure

Assignment 2 research Infotech Global

 

Question: You have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s a strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

No Plagisram 

Agile software development security plan- 600 words

Length:  Minimum of 600 words .Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.   

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

Discussion Activity

  

 Review and summarize your ideas about the usefulness for the IT manager of a) a glossary that defines terms; b) the course readings; and c) working on a team including nominating potential teammates from the class roster.