Analyze Current Security Products and Services

 

Complete a three to four-page report with APA cited references to support your work.

Searching for Vendor Information (without getting a ton of sales calls)

It is often helpful to research a Vendor and their products before contacting the company, (when you contact the company, you often are inundated by sales calls). Your assignment this week is to gather information on a provider of security/privacy products and write a short recommendation document. Include in your report:

  • types of services this vendor provides
  • facts about this company that would lead to their reliability as a provider
  • how they compare to other similar vendors (you will need to look at a few companies to gather this information).

“Methodology Mind-Set and Management Processes” and “Violence and Practical Reflection”

 Question 1

“Methodology Mind-Set and Management Processes”  Please respond to the following:

  • According to Kerzner, “The importance of a good methodology cannot be understated.” In your own words, examine the significance of this statement as it relates to integrative information technology solutions within an organization. Provide one (1) example of an integrative information technology solution to justify your response.
  • As a Chief Information Officer (CIO) for a large organization, compare and contrast three (3) of the five (5) main management processes described in Chapter 5 of Kerzner’s text. Suggest one (1) strategy to apply the business value of each selected management process to your current or future organization.

Question 2

 Hagan (2020) identified several different school shootings as well as incidents of school violence. Why do you think the United States is plagued with more school shootings than all other developed countries combined? What policies do you think would help lessen the number of school shootings? Be specific and provide examples.  

Case Study – Filecoin

Please read the Filecoin case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc. 

Youtube link to get started: https://www.youtube.com/watch?v=EClPAFPeXIQ&feature=emb_logo

1. How did Filecoin conduct its ICO?

2. How is Filecoin’s ICO similar to and different from:    a) an equity IPO?    b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?

3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?

4. Why should investors be attracted to Filecoin?

5. Why should be wary of Filecoin?

6. Why are regulators encouraging or opposing ICOs?

7. What have some regulators done in response to ICOs?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page.

Application and Identity Design Considerations

 1 page

  • This week we covered the Application and Identity Design Considerations.  Identify and define at least two types of Application Design Considerations and explain in detail how they are carried out.  Identify and define Device and User Identity concepts.  Identify the associated benefits and weaknesses with the application of each approach.  Feel free to research the internet and other resources to support your comments and cite references in APA format.

Contrasting local and public test blockchains

Minimum 500 words. 

In chapter 4, the author discusses different options for testing blockchain applications. For our course, we have chosen to use Ganache, a local test blockchain. Explore some of the advantages and disadvantages of using local and public blockchains to test apps and contrast the two options.  

  • Create a new thread (by the FIRST DUE DATE)
    • Contract the advantages and disadvantages of using local and public blockchains to test applications.
    • Explain how each advantage and disadvantage impacts blockchain application development, and why each is important to a successful blockchain implementation.

I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

  • Think of three questions you’d like to ask other students and add these to the end of your thread.
    • The questions must be taken from material you read in Chapter 1 or 2, and each question should start a discussion topic.
    • You’re not trying to test each other, but you are trying to start a discussion.
  • Finally, go to three other students’ threads and post comments, answering at least one of their questions.
    • For EACH comment you post, use the 3CQ approach (described above.)
    • When someone asks you a question, answer it!

ALL threads and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

  • Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

  • I agree with you about …
  • I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

  • I can connect with you about …
  • I once read a story about …
  • I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

Discussion on data encryption

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

college website

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document with 300 words

4s week 14 assignment IA

in 350 words,

Which vendor certification would you think is the most relevant in the field of IT security?  Why? 

Include references, no copypaste.

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What is the basis for the protection of freedom of expression in the United States, and what types of expression are not protected under the law?
  • What are some key federal laws that affect online freedom of expression, and how do they impact organizations?
  • What important freedom of expression issues relate to the use of information technology?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords