research

 

Assume you are an IT security specialist for a large U.S. online  retail organization that does business internationally. Your CIO has  asked you to thoroughly review the new General Data Protection  Regulation (GDPR) recently implemented in the European Union. He wants  to understand exactly what the organization must do to comply with this  regulation when doing business with EU customers.

Provide a detailed discussion about the rules for businesses and the rights of the EU citizens.

Include a discussion of the following:

  • What does the GDPR govern?
  • What rights do the EU citizens have with regard to their data?
  • What is considered personal data under this regulation?
  • What is considered data processing under this regulation?
  • Describe the role of the data protection authorities (DPAs).

Discuss, in detail, how the GDPR will change business and security  operations for your organization. Provide the CIO with a recommended  checklist for GDPR compliance and discuss processes and policies that  may need to be changed in order to comply with GDPR.

In your conclusion, address what you think will be the financial  impact to the organization, both in terms of compliance and any lack of  compliance. 

Assignment Requirements

  1. The paper should be 3–4 pages.
  2. Use the rubric guide
  3. Use Times New Roman 12 pt font.
  4. Use APA formatting for paper, citations, and references.
  5. Be sure to cite your sources and provide the appropriate references

Computer Science IT505 assignment 4

BUSINESS CASE:  The Hospital information system has been in use to improve  Hospital Network’s efforts to become more competitive.

Main Parameters of the Hospital system :

There are three buildings in three different cities

Hospital Building in City 1: 150 Patients Room, and 25 offices (Main Building has the all Databases)

Hospital Building in City 2: 95 Patients Room, and 15 offices

Hospital Building in City 3: 80 Patients room, and 30 offices

All buildings have their own IT  Datacenter. 

IT system Hardware: Personal PCs, Server, Cables, Memory, Printer, X-ray, Big  screen monitors, card readers, Scanners

IT system Software: MS Office, Financial /Accounting,

IT system Databases: Database for Patients, Database for Doctors, Database for Building, Database for Employees

IT system Network:  Internet and Dedicated data communication lines between all four Buildings.  

Dedicated data communication lines between all  Buildings are private fiber-optic communication lines

Supplier Companies: Blood Test Lab, Bank, Medical Equipment Supplier, Medication Supplier.

Homework

Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats? (250 to 300 words)

Security in Your Lives

While we may not have had much time together discussing security, this probably reminded you of events in your life. Think about a time when you witnessed or were part of a “breach” in security. This might be a specific attack against just you, as part of a larger breach, such as your identity being stolen during a newsworthy event, or an arbitrary event from the news you choose to analyze. Discuss the event, and then discuss which of the CIA (confidentiality, integrity, and availability) principles were violated and specifically how they were violated.  

For the response to suggest an improvement or fix that might have prevented this principle violation.  

Parameters 

  • Initial responses 
    • Posts should be 250 to 300 words in length
    • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
    • All sources should be used in the content of the post using APA format
  • Peer responses 
    • Responses should be 100 to 150 words or more
    • Responses must be substantive and continue learning (avoid a simple “good,” “bad,” or “I agree”)
    • Attempt to find a source to support your follow-up responses 
    • For the response to suggest an improvement or fix that might have prevented this principle violation.  

500 words

Article review

Please find below URL

https://www.theregister.com/2022/08/22/aws_cloud_phishing/

Cryptography – Milestone

In the second milestone writing assignment, 

you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  

 You must use a minimum of three scholarly articles to complete the assignment.  

The assignment must be properly APA formatted with a separate title and reference page. 

2 pages

Discussion

 What is the weakest link in the security of an IT infrastructure?  What are some of the strategies for reducing the risks?
 

An initial post must be between 250-300 words and is due by Thursday 11:59 pm EST. A reply to 2 students between 150-200 words is due by Sunday at 11:59 pm EST.

2-3 paragraphs (Internet Research)

 In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs