Benchmark – Small to Medium-Sized Business

 

IT risk management relies on end-user and administrative compliance with the rules, regulations, and polices set up as a means of protecting information assets within the environment. Comprehension of the consequences and rewards of policy adherence is necessary if security professionals are expected to implement security, and risk management strategies that rely on the strength of policy management and distribution.

In a 750- to 1,250-word paper, evaluate the implications of Internet use (including, but not limited to, basic web presence, online shopping, vendor unique portals, vendor specific portals, “IOT,” social media, and/or VPN use) within a SMB, as well as data protection for intellectual property. Make sure to address third-party vendors, cloud technology, and technology trends.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

3.4: Evaluate the implications of Internet use within Small to Medium-Sized Business (SMB) and data protection for Intellectual Property.

Required to be IEEE format…please follow instructions below as indicated.

Topic: 5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning

Instructions:  It should be of professional quality and be in the format of an IEEE transaction style. Figures must be clear and drawn by you.  Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:

  1. Title page.
  2. Abstract (summary of the paper).
  3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).
  4. (i) Description of existing algorithms/protocols for survey papers; (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.
  5. (i) Comparison among existing algorithms/protocols and discussion on possible improvements/enhancements;      (ii) project results (derivation, proof, justification, or detailed design/simulation) in one or more numbered sections for research-oriented      papers.
  6. Conclusions (evaluation of results, suggestions for improvements, or future work).
  7. References must follow IEEE Transactions format (at least 10 references).Proper citation of references must be embedded in the term paper.
  8. Appendices (if appropriate).
  9. In particular, references used must be clearly cited in your written report at proper locations  

Sample document is attached….

Create a base class to hold

  

1) Create a base class to hold information about sporting teams on campus. It should not be possible to instantiate the class. Include common characteristics such as primary coach and type of sport. Define a minimum of one virtual method.2) Select two types of sporting teams and define subclasses for them. These classes should inherit from a base team class such as that created in Exercise #1. Include unique characteristics about the sport. For example, for a sporting team such as a tennis team, the field location and/or the person to contact to restring rackets may be of interest. Be sure to implement any virtual methods included in the base class.3) Create a class to test your designs of the base team class and individual sporting team subclasses. Your class can be a console or Windows application. Make DLL components out of the sporting classes and add a reference to them in the presentation class.

Literature review for current software update process

write a literature review for the following topic.  

Software updates are essential for the purpose of ensuring data security. However, sys administrators in organizations control hundreds of devices, and security mistakes may result in splash damage. Recent publications have examined the software update habits of end users, while software developers have gotten less attention. This study’s primary purpose is to determine what software update management entails for software developers. The purpose of this study is not to solve an issue; rather, it is to comprehend the process.

Requirements:
1) Total of 35-50 pages 

2) Times roman 12 pt and single space 

3) 40-50 references from last 3 years

IT quiz

1.The first step in the SDLC:

Group of answer choices

analysis

design

testing

define goals and scope of the system

2.Any structure an organisation uses for organising, accessing, retrieving, storing and managing its information

Group of answer choices

Classification scheme

Disposition scheme

Archive scheme

Access control scheme

3- A record must be what it purports to be

Group of answer choices

Availability

Reliability

Confidentiality

Authenticity

4- A classification scheme which is based on an organisation’s business functions & activities:

Group of answer choices

BCS

FACTA

FERPA

DRM

5-Which of the following items are considered benefits of metadata for records management?

Group of answer choices

Efficient retrieval of information

Ensuring the evidential value of records

Allowing smooth migration of records

All of the above

6-Many e-commerce websites use a dropdown list for states or the country to ensure that customers enter the right abbreviations. Such mechanism is called: 

Group of answer choices

Data masks

controlled vocabularies

synonym rings

word trees

7-Concerned with assessing and ensuring that data is accurate and consistent

Group of answer choices

RDF

QA

RMA

XML

8-An application that enables enterprises to manage electronic and paper-based records throughout the life cycles of those records

Group of answer choices

RMA

QA

OCR

DRM

9-Physical objects such as CD-ROMs do not need metadata entries as their digital counterparts.

Group of answer choices

True

False

10-Sources of metadata include:

Group of answer choices

the recorde itself

manual data entry by users

document properties in OA software

All of the above

11-Analyzes the light and dark areas of an image to recognize and identify letters and digits:

Group of answer choices

RMA

QA

DRM

OCR

12-Review of logs, records, and procedures to determine those items are compliant with policies and standards

Group of answer choices

Auditing

Authentication

Least privilege

Sneaking

13-The mechanism that allows the system to keep track of the changes made to a document:

Group of answer choices

version control

audit

security

indexing

14-A records retention schedule is to:

identify retention requirements for records

identify disposition requirements

identify the source of retention requirements (e.g., operational need or statutory requirement)

All of the above

15-Which one of the followings is NOT a major concern when implementing cloud services?

Security concern

Privacy concern

Cost concern

Custody concern

16-ERMS is designed to manage digital records only, not physical records.

True

False

17-“Author” is an example of

Administrative metadata

Metadata about agents

Metadata about management activities

Metadata about policy

18-Which organization provides comprehensive guidance and recourses for electronic records management on their website?

W3C

FTC

NARA

MoReq

19. A recognition technolgy used to identify which physical records correspond to which digital objects

Indexing

Barcode

Retention

DRM

20-Which of the following is not an appropriate metadata element for a university Registrar’s Office?

Student’s Program

Date of graduation

SSN

Type of document

Two page paper

·  Discuss an encounter you have had with one of the six types of annoying co-workers described in the article.

·  Analyze how you handled this particular annoying co-worker by indicating which communication methods were used.

·  Assess how you will handle a similar situation in the future using the advice given by the author of the article.

Week 5: Sections VII & VIII

Need question answer for my my part of a paper. Please review the paper for better understand how to answer these question.

I. Requirements Checklist

A.  Technical Requirements

– Five requirement statements setting out the system performance specifications.

B.  Security Requirements – 

– Five requirement statements covering various aspects of system, data, and transactional security.

outline of the article

 Re-create an outline of the article provided for this week’s assignment.  What guideline/outline would the authors of this article have created before they started to write the article.  Your outline of this article would include the various sections of the paper such as an abstract, keywords, introduction etc. as well as subheadings, and mention any figures/tables which were included in the article but do not actually include them in your outline.  Very briefly summarize what information is in each section/subheading in no more than 2 sentences. 

risk management

 

  1. Compare the ISO/IEC 27001 outline with the NIST documents discussed in this chapter. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST programs compared to the ISO standard.
  2. Search the Internet for the term security best practices. Compare your findings to the recommended practices outlined in the NIST documents.
  3. Search the Internet for the term data classification model. Identify two such models and then compare and contrast the categories those models use for the various levels of classification.
  4. Search the Internet for the term Treadway Commission. What was the Treadway Commission, and what is its major legacy in the field of InfoSec?

 5. Download and review “NIST SP 800-55, Rev. 1: Performance Measurement Guide for Information Security.” Using this document, identify five measures you would be interested in finding the results from based on your home computing systems and/or network.

6. Using the template provided in Table 9-1, develop documentation for one of the performance measurements you selected in Exercise 4.