Information Governance Final Research paper

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Access Control Discussion

Describe Access Controls that you have utilized in your career or personal life.  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

Response Required Discussion cloud

Please read the below discussion posts and provide response in 75 to 100 words

Post#1

 

Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance  of  IT  auditing  and  especially  cloud  computing auditing  is  an  essential  effort to  ensure  the  proper  functioning processes  of  an  the organization’s  IT  systems,  management, operations, and  related  processes,  to  avoid  fraudulent,  in  order to  have  comprehensive  and  accurate financial view of their business” (Moghadasi, 2018).

The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).

The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).

The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).

Post#2

 

Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.

The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control.  The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.

The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.

The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.

Business Intelligence

Why is the IoT considered a disruptive technology?

Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities

Click for more options

discussion

 

Discuss the relationship between the Waterfall model, work breakdown structure (WBS), RACI chart, scheduling and cost, when a decision has been made to migrate to the Cloud.  Please be sure to explain why.  Do not forget to follow the discussion forum guidelines. Click for more options

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:

  • How will security be implemented in the Linux systems—both workstations and servers?
     
  • End users have expressed some concern about completing their  day-to-day tasks on Linux. How would activities such as web browsing  work? How would they work with their previous Microsoft Office files?
     
  • The current Windows administrators are unsure about administering  Linux systems. How are common tasks, such as process monitoring and  management, handled in Linux? How does logging work? Do we have event  logs like we do in Windows?
     
  • Some folks in IT raised questions about the Linux flavor that was  recommended. They would like to see comparisons between your  recommendation and a couple of other popular options. What makes your  recommendation the best option?
     
  • How does software installation work on Linux? Can we use existing Windows software?
     
  • How can Linux work together with the systems that will continue to  run Windows? How will we share files between the different system types?
     

The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Template

  

Go2Linux, Inc.

 

Provide a brief summary of your recommendation

of a specific version of Linux. Explain how your choice meets the business need of Faster 

Computing, Inc.

The bold text questions below represent the specifics you need to focus on. For 

each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 

assignment you will provide technical details for Information Technology personnel.

Any example Linux commands should be properly displayed (e.g., in lower case) 

and any acronyms explained on first use (e.g., Secure Shell (SSH)).

·

How will you implement security in the Linux systems?

o

Start by outlining how you plan to migrate the existing Windows 

Servers to Linux. Ho

w will users authenticate? What technologies will be used? What 

kind of access controls will be used?

o

Will you recommend simple authentication mechanisms or employ 

multiple factors? For passwords, what policy(ies) will you recommend?

needed>

o

How will you handle data-at-rest and data-in-transit?

needed>

o

How will you enforce software installations and control which 

applications may run on the network?

·

End users have expressed some concern about completing their day-to-day tasks on 

Linux. How would activities such as email/web browsing work? How would they work 

with their previous Microsoft Office files?

o

There are several ways to address the use of existing applications. 

Conduct research to determine the available options.

o

For web browsing, you should provide at least 2 alternatives and 

consider the impact to initial configuration (bookmarks, extensions, plugins)

needed>

o

For Microsoft Office, provide a full discussion on how users will 

continue to open/edit/save office docs in the Linux environment. You should provide at 

least 2 alternatives.

·

The current Windows administrators are unsure about administering Linux systems. How

are common tasks, such as process monitoring and management, handled in Linux? 

How does logging work? Do we have event logs like we do in Windows?

o

Discuss your logging and monitoring approach in this section. You 

should include the location of specific Linux log files.

o

Discuss how admins can manage processes. It may be helpful to 

compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 

stop processes, including the corresponding commands.

·

Some folks in IT raised questions about the Linux flavor that was recommended. They 

would like to see comparisons between your recommendation and a couple of other 

popular options. What makes your recommendation the best option?

o

o

The key differentiator is …

·

How does software installation work on Linux? Can we use existing Windows software?

o

Discuss a Linux package management specific to your distro. How will

you automate updates?

o

Discuss how specific Windows applications can be installed and used,

if at all.

·

How can Linux work together with the systems that will continue to run Windows? How 

will we share files between the different system types?

o

Discuss how file and printer sharing will work. Will the users need to 

do anything “different”? What underlying technology will need to be implemented?

as needed>

Warm regards,

Go2Linux

Linux Deployment Manager

References

to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 

Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm

l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 

Encryption. [Accessed December 1, 2019]. 

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 

Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 

December 6, 2019].

… and so on …

Assignment

 

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples.

Why Is Enterprise Architecture Important for healthcare industry ?

Discussion Post 3 and Assignment

 1) Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another. ( 250 to 300 words)

2) What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.

3)  Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

4)How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status

Practical connection assignment 500 WORD ( due in 4 hours MANDATORY ) NO PLAGIARISIM ).

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the management of the organization can enhance their organizations’ ** (( NETWORK SECURITY.))** If you are not currently working, share how this could be applied to an (( EMPLOYMENT OPPORTUNITY IN YOUR FIELD OF STUDY {{ COMPUTER SCIENCE }} ).
Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

 ENSURE YOUR WORK IS STRUCTURE LIKE THE SAMPLE PAPER