Questions

 

Describe effective risk assessment approaches and frameworks related to physical security.  Address responsible parties, regulatory compliance, security in layers (defense in depth), and expected key controls.  Assume a large organization with multiple sites responsible for sensitive / confidential data.  50 of 70 possible points. 

Discuss regulatory requirements related to physical security, such as HIPAA and PCI.  What approaches from a testing and security maturity standpoint are beneficial to overall risk management and why. 20 of 70 points.  

Web server

 

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

InfoTech Import in Strat Plan (ITS-831)

Research Paper: COSO framework

Word count: 2 to 3 pages

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar with.

Your paper should meet the following requirements:

Be approximately 2-3 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the course’s readings and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Chapter 12, “Business Intelligence, Knowledge Management, and Analytics” Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

2. Chapter 12, “Business Intelligence, Knowledge Management, and Analytics” Dong-Hui Jin, & Hyun-Jung Kim. (2018). Integrated Understanding of Big Data, Big Data Analysis, and Business Intelligence: A Case Study of Logistics. Sustainability, (10), 3778. Retrieved from https://doi.org/10.3390/su10103778

plagiarism check required, APA format, within 8hrs

reasearch assignment

 According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a summary explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. 

Computer Forensics

From the given scenario, we need to find 5 hidden evidences from the given image.dd file. you have to use Autopsy software to extract the .dd file

Discussion

This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity. 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

Please see the attached document for reference.

security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

Be approximately 4 pages, not including the references and title page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

group pro

Explore at least 3 strategies that firms can use in their attempt to capitalize on the potential of blockchain technology. Look at methods, such as industry consortiums, innovation labs, etc. research the question and prepare a 6 page paper that provides a research supported answer to the question. The paper should include an introduction, literature review, and conclusion. The introduction should include some background information, the purpose and research question, and a preview of the paper. The literature review should be organized in a way that appropriately presents the existing literature pertaining to the question under exploration. The conclusion should answer the question that was assigned. This paper should be in APA style and follow the writing requirements for this course. You may use the assigned course readings in this paper, but are required to use an additional 5 sources.