COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

BSWA5

 

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. No plagiarism. 

Attach your WORD doc and then hit SUBMT.

IT Security Policy Framework Approaches

  An Information Technology (IT) security policy framework supports business objectives and legal obligations.  It also promotes an organizations core vales and defines how it identifies, manages and disposes of risk.  A core objective of a security framework is to establish a strong control mindset, which creates an organization’s risk culture. 

An Information Technology (IT) security policy framework supports business objectives and legal obligations.  It also promotes an organizations core vales and defines how it identifies, manages and disposes of risk.

1. See page 225 – “Private Sector Case Study” – How are security frameworks applied in this Case Study?

2. See page 226 – “Public Sector Case Study” – How are security frameworks applied in this Case Study?

3. See page 228 – “Critical Infrastructure Case Study – How are security frameworks applied in this Case Study?

Cyber law assignment

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.”  

Please write an essay of not less than 500 words, summarizing the court’s decision

COMPUTER SECURITY_week7

Use the Web to search for examples of hacks that made the news.

Write a brief description of the attack indicating what type of hack was involved. 

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

essay

 

Imagine that you have been hired by the startup e-Commerce company Sports R US to provide a convenient self-service solution for customers accessing sports products. The Web application would need to be available on mobile devices (e.g., smartphones, tablets, laptops, notebooks). The application also needs to work on multiple Web browsers (i.e.., Chrome, Internet Explorer, Firefox, Safari and others to support self-service tasks. Sports- R-US has asked you to provide a Human-Computer Interaction (HCI) guide for design and implementation of this service.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

This assignment must address the following topics:

  • Information Gathering
  • Design Strategy
  • Prototyping
  • Implementation

Write a six to eight (6-8) page paper in which you:

1. Describe the following:

  1. Purpose and goals of a mobile self-service.
  2. Target segment (audience).
  3. Audience needs and wants.
  4. Resources necessary to achieve the desired outcome.
  5. Design of the Website for mobile devices
  6. Interfaces applicable to mobile devices.

2. Design each of the following using Microsoft Visio or any open source wire framing or mockup tool. Note: The graphically depicted solution is not included in the required page length.

  1. The Sports R US home page for a mobile device.
  2. The self-service Web page to review products and checkout using mobile devices.

3. Recommend one (1) prototype that could be created.
4. Determine the type of evaluation method to use in a Web design for the best user experience.
5. Provide key details of how the mobile self-service will be implemented on various mobile devices.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
7. Format your assignment according to the following formatting requirements:

  1. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
  2. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  3. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
  4. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the differences in developing user interfaces for different application environments.
  • Compare and contrast the different types of interactive environments.
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Answer these questions without plagarism

1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? (Hint: Look at the bandwidth and CPU utilization.)

page1image44572064page1image44572448

2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.

3. ExplainhowyoucoulduseoneormoreoftheWindowslog(Application, Security, Setup, System, and Forwarded Events logs) files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file?

4. Shouldyoufilterlogfilesduringaninvestigationintoasecurityincident?Why or why not?

5. Shouldremotedesktopservicesbeenabledonemployeeworkstationsforuse by IT Help Desk personnel? Why or why not?

6. HowdoesMicrosoftBaselineSecurityAnalyzer(MBSA)differfromWindows Update? Why are Shares a source of system vulnerabilities?

Achieving Operational Excellence: Using Internet Tools to Increase Efficiency and Productivity

  

Software skills: Web browser software and presentation software

Business skills: Employee productivity analysis 

In this project, you’ll suggest applications of Internet technology to help  employees at real-world company work more efficiently. 

Dirt Bikes’s management is concerned about how much money is being spent communicating with people inside and outside the company and on obtaining information about developments in the motorcycle industry and the global economy. You have been asked to investigate how Internet tools and technology could be used to help Dirt Bikes employees communicate and obtain information more efficiently. Dirt Bikes provides Internet access to all its employees who use desktop computers. 

· How could the various Internet tools help employees at Dirt Bikes? Create a matrix showing what types of employees and business functions would benefit from using each type of tool and why.

· How could Dirt Bikes benefit from intranets for its sales and marketing, human resources, and manufacturing and production departments? Select one of these departments and describe the kind of information that could be provided by an intranet for that department. How could this intranet increase efficiency and productivity for that department?

Use electronic presentation software to summarize your findings for management. 

virtualization

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.