Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Operation Security

 

The economy is driven by data ~ Data sustains an organization’s business processes and enables it to deliver products and services. Stop the flow of data, and for many companies, business comes quickly to a halt.  Those who understand its value and have the ability to manage related risks will have a competitive advantage. If the loss of data lasts long enough, the viability of an organization to survive may come into question. 

  • What is the significant difference between quality assurance & quality control? Explain
  • Why is there a relationship between QA/QC and risk management? Explain
  • Why are policies needed to govern data both in transit and at rest (not being used – accessed)? Explain

Discussion

 

Security assessment vs Security audit, explain briefly the differences and similarity.

 

This assignment should include at least two references.

Computer Science

Technology and Enterprise Resource Planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. 

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count) and please use APA format.

4s week 12 assignment EH

In 300 words

Wireshark is one of the most widely-used network protocol analyzers. It lets you see what’s happening on your network at a microscopic level and is the preferred standard across many commercial and non-profit enterprises, government agencies, and educational institutions. GlassWire is a free network monitor & security tool with a built-in firewall. Review the features of these two products and explain how you could benefit from using either of these network management tools.

https://www.glasswire.com/

https://www.wireshark.org/

Include references.

No copy-paste, use your own words.

ERM Approaches and Models

  

Chapter 4 presented the approach Statoil, Inc (Test book page 59) used to implement ERM. Chapter 7 (page 107) presented the approach United Grain Growers used to implement ERM. Compare the two use cases and discuss similarities and differences. Do you agree with the approaches to implement an ERM and why? If you could change anything about the reasons to implement ERM in these case studies what would that be and why? Would you implement the same ERM approaches in your current organization (or future organization)?

Note: The paper should be a minimum of 2 to 3 pages not including title or reference page and in APA format. 

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability.

Write a five-seven (5 – 7) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. 
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Privacy Impact Assessments (PIA)

  

Panel Presentation: Privacy Impact Assessments (PIA)

Coordinators of an upcoming conference, attended by federal government IT managers and staff, invited you to participate in a panel presentation about privacy. For this activity, prepare a 5 to 7 paragraph briefing statement which answers the following four questions. Use information from the weekly readings as your research material. Go to Content >> Course Resources >> Expanded Explanation for Discussion Question Responses to learn more about the format requirements for a “briefing statement.”

Definitions:

Privacy has many definitions. When examining data protection and privacy laws and practices, it can be helpful to focus on four categories or classes of privacy.

Information privacy is concerned with establishing rules that govern the collection and handling of personal information. Examples include financial information, medical information, government records and records of a person’s activities on the Internet.

Bodily privacy focuses on a person’s physical being and any invasion thereof. Such an invasion can take the form of genetic testing, drug testing or body cavity searches. It also encompasses issues such as birth control, abortion, and adoption.

Territorial privacy is concerned with placing limits on the ability to intrude into another individual’s environment. “Environment” can include the home, workplace, or public space. Invasion into an individual’s territorial privacy typically takes the form of monitoring such as video surveillance, ID checks, and use of similar technology and procedures.

Communications privacy encompasses protection of the means of correspondence, including postal mail, telephone conversations, email, and other forms of communicative behavior and apparatus.

Privacy Impact Assessment (PIA): A PIA is both a process and a document. It is a process that focuses upon identifying and assessing risks related to privacy of data handled by a specific IT system or database. It is a process that communicates the results of the PIA process to stakeholders. Released PIAs are either fully available to the public, while redaction removes sensitive/non-public information in other PIAs.

When responding to this discussion, prepare a 5 to 7 paragraph briefing statement which answers the following four questions:

1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. “the average person” definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof).

2. What are some important best practices for protecting privacy for information collected, stored, used, and transferred by the US federal government? Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization’s IT systems and databases.

3. Explain why federal government agencies and departments required to complete PIA’s. Should every federal IT system have a PIA? Why or why not?

4. Name and briefly describe 3 benefits to citizens which result from the use of PIA’s. (Considering citizen’s needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

To ensure you include all required elements, be sure to use the Discussion Rubric when creating your initial response, critiques, and replies.

 https://www.opm.gov/information-management/privacy-policy/privacy-references/piaguide.pdf 

 https://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_guidance_may2007.pdf 

 

https://www.gao.gov/new.items/d08536.pdf 

 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf 

 https://www.law.cornell.edu/wex/Privacy 

 https://www.law.cornell.edu/wex/personal_Information 

cos-fors-week-2

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation.