Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

Business Intellegence

 Discussion: Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses. 

Question for discussion: 

1. Explain why it is useful to describe group work in terms of the time/place framework. 

2. Describe the kinds of support that groupware can provide to decision-makers. 

3. Explain why most groupware is deployed today over the Web. 

4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective 

Exercise:
1. Compare Simon’s four-phase decision-making model to the steps in using GDS 

professional righting

Select 10 Articles that support your Topic.

Write a review of all the articles and submit.

APA 7TH Edition   12 Font Times New Roman 

The basis precepts for formatting the pages and paragraphs are:
Margins: 1-inch margins
Spacing: double spaced
Font-Size: Times New Roman – 12-point font
Running head (text and page #) noted on header

References (include in text citations) 7the Edition

The specific use of the APA style is to write with clarity, precision, and inclusions. The APA style provides a uniformed platform for research papers to be better structured and organized. In this class, “The term “plagiarism” includes, but is not limited to, the use, by paraphrase or direct quotation, of the published or unpublished work of another person without full and clear acknowledgment.” The specific need is the APA standard writing style helps you to reduce bias languages and show you how to cite references correctly so that you can avoid charges of plagiarism.

Mechanics: Includes complete sentences, proper formatting of margins, spacing, indentation, etc.; typeface and use of emphasis are appropriate to task. Includes thorough documentation or citation as necessary; supports all claims within either text or appendix; properly identifies outside material. Possible Point Deductions 1- 10 pts.

MIPS

 Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number 

Errors Failures and Risks

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

 

Required Readings

From A Gift of Fire by Sara Baase and Timothy M. Henry:

Chapter 8 – Errors, Failures, and Risk

Cloud Computing

1. Write a 2-3 page paper where you compare and contrast the differences between Identity as a Service, Infrastructure as a Service and Identity Access Management. The submission needs to include a minimal of 3 scholarly resources in APA format.

2. Define and describe Platform as a Service. In the description be sure to list the benefits and potential disadvantages. Locate an article that supports the benefits of PaaS in an organization and/or the failures of PaaS implementation. Be sure to cite in APA format. 

No plagiarism

Discussion help

After reading Chapter 8 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role.  You can use outside research, or your personal work experiences as your basis for discusson.

Note – attached text book

CSIA

Before you begin read: https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf

Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance.  Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program.

For this discussion paper, you will need to research the Department of Energy’s Cybersecurity Maturity Model and then compare it to the NIST Cybersecurity Framework and other frameworks listed in the course readings. After you have done so, write a position paper in which you recommend a cybersecurity framework or maturity model as the basis for assessing the cybersecurity program for Padgett-Beale Financial Services. Assessments will be performed on an annual basis beginning one year after the company launches its new operations.

Your 5-7 paragraph position paper must answer the following questions (at a minimum). (You will need to write clearly and concisely to fit all required information into this restricted length.)

  • What approach should the organization take in developing the Cybersecurity Management program? (What standards or frameworks should be used?)
  • What laws and regulations must be addressed by the Cybersecurity Management Program in a financial services firm?
  • What are the best practices that should be put into place to assess the maturity of PBI-FS’s cybersecurity management program?

Post your position paper as a reply to this topic. Remember to cite your sources and place your reference list at the end of your posting.