Disaster Recovery Plan

 

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

discussion 2 wk5

 Respond to the following in a minimum of 175 words: 

 

A plan of action and milestones (POA&M) is a living, historical document that identifies tasks that need to be created to remediate security vulnerabilities. The goal of a POA&M should be to reduce the risk of the vulnerability identified.

Describe some of the common challenges with developing and maintaining a POA&M from the standpoint of a CISO versus a CIO.

Discussion post

 

1. Discuss what performance management is and how it influences effective teams.
2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.
3. Note at least two organizational capabilities and compare and contrast each.

Please be sure to answer all the questions above in the initial post.  — no more than 200 words, be clear and concise!

At least one scholarly (peer-reviewed) resource should be used 

Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

DForsnisc-we-6

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

350 words

Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

BE D6

  

Discussion:

Discuss the risks of avoiding confrontation of a problem employee. 

Should be 250-300 words with references.

Should be in APA format

qqq

Please click on the following articles to review the content:

Improve Time-Management Skills

https://www.virtuesforlife.com/8-ways-improve-time-management-skills/ (Links to an external site.)

How to Manage Your Time in College

https://www.wikihow.com/Manage-Your-Time-in-College (Links to an external site.)

Why Time Management is Important – Eight Reasons Why Time Management is Crucial

https://www.appointment-plus.com/blog/why-time-management-is-important (Links to an external site.)

Top Ten College Student/Graduate Job Search Mistakes

https://www.thebalance.com/top-college-student-graduate-job-search-mistakes-2059842 (Links to an external site.)

Please click on the following videos to review content:

The Value of Time

The Value of TIme (Links to an external site.)

How to Find an Internship You Will Value

https://bigfuture.collegeboard.org/get-started/outside-the-classroom/how-to-find-an-internship-youll-value (Links to an external site.)

Best Practices for a Successful Job Search

Best Practices for a Successful Job Search

After reading the assigned articles, please write a one-page essay double-spaced 12 pt. font describing your career path strategy in your major including education, experience, skills, and job requirements. In addition, include steps necessary to advance in your chosen career.

Module 8 – Case Project 14-3

Your manager has asked you to research and recommend a writing guide that examiners in your digital forensics company can use for all official written reports. Conduct research on the Internet to find information about style manuals and technical and legal writing guides. You should also research writing guides from professional associations, such as the IEEE and the American Psychological Association. Write a two- to three-page report recommending a style manual or technical/legal writing guide for your company to use and explain the reasons for your recommendations. You might want to combine guidelines from different sources in coming up with recommendations for digital forensics reports.