Information Security Laws

 

Locate 2 laws that impact information security in an organization. One law needs to be a US law and the other a foreign law from any country. Three 2-3 pages where you compare and contrast the two laws. Be sure to include at least 2 scholarly sources and write in APA format. 

Note: Do NOT use GDPR and CCPA

case study 6

Read The Case of Plant Relocation and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-case-of-plant-relocation/

Kindly answer to the question at the end.

Pros and cons of each country and ethical challenges.

Security Design and Architecture Assignment

 

  • How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

 This assignment should be in APA format and have to include at least two references. 

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.
    4000 words 

movie review

 

Have you heard of The American Film Institute (AFI)?  According to their website they are:

” America’s promise to preserve the heritage of the motion picture, to honor the artists and their work and to educate the next generation of storytellers.”

In 1998 AFI gathered a wide variety of individuals from across their community to help compile a list of the top 100 films of all time.  This list was adjusted in 2007, but we’re going to stick with the original list seen below.  The full list can be seen here: Link (Links to an external site.)Links to an external site.

Watch: THE GODFATHER (Links to an external site.)Links to an external site.

1972

Using at least three or more of the dimensions of the film we have covered up to this point:  narrative, mise-en-scene, cinematography, editing, and sound, write an essay exploring THE GODFATHER movie.  Your essay can be organized in a number of ways, but students are often most successful when they pick a scene for each element and discuss how the cinematic element best plays out in said scene.  Be sure to use terms we’ve learned over the past 4 weeks and provide specific examples from the film to support your points.  The paper should be 4 pages long, double-spaced, typed in Times New Roman and 12 point font.  Include a Works Cited section at the end of the essay listing the film and any references you may have used to write your paper

ETCM-Research-4

Evaluate it in 3 pages (900 words) exclude Title page and references from 3 pages:

Due Date: In 4 days. Friday End of Day USA time. 

For this assignment, review the article (Attached below):

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (900 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Datatronics Case Study on pages 246-250

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. 

Mainframe and Client/Server Environments

 

Respond to the following in a minimum of 175 words: 

Consider the following scenario: 

Your manufacturing company has operated with a mainframe IBM computer for more than 20 years. Recent technological advances have brought opportunities to replace that mainframe-based computing environment with a client/server environment. You have been tasked with responding to senior management about the security issues involved with replacing the existing mainframe computer environment with a client/server platform.

The salespeople you deal with from each vendor believe the current mainframe environment costs about $500K a year to maintain from a security standpoint, while a client/server environment would cost about $325K a year. But cost is not the only consideration. No PII or SPII data is contained in this manufacturing platform. It is strictly a final product for sale application. 

Outline and review a typical mainframe enterprise security footprint. Do the same for a possible client/server environment. This could include the use of the cloud for distributed computing, but that would also include unique security concerns. 

Discuss the following: 

  • Based on your outline, which of these environments is more secure and why? 
  • Does your outline show commonalities that could permit both the mainframe and the client/server environment to coexist from an enterprise security perspective? If so, what are they?