Project with 3 to 4 papers

 

Based on your updated outline, prepare a draft of your project paper.  Remember, your paper must address the following points:

  1. Describe the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
  2. Discuss how group and organizational dynamics may affect the success of your information assurance change initiative.
  3. Evaluate the leadership style needed to successfully implement your information assurance change initiative.
  4. Describe your change strategy and the potential resistance factors to be managed.
  5. Describe the change model most appropriate for your information assurance change initiative.

Case Study

 Write a 2-3 page case study on a business and its use of anomaly detection.  Provide some background on the business such as name and industry the business is in.  Also provide the problems or issues the business has experienced that would require the use of anomaly detection.  Provide methods and/or techniques used in the detection of the anomaly.  Finally provide the solutions, if any, the business use to combat future instances of the anomaly.  Please provide references in APA format.

Paper should be at least 500 words.  APA Reference page is not included in the total word count

Discussion Questions: Case Study

Read the mini-case, Innovation at international Foods (pp. 234-238).

Submit a Word document with answers to questions one and two on page 238. Your answer to question one should include strategies for overcoming each of the IT related problems and be about two pages long. Your answer to question two should be about two pages long.

4 pages

Use APA level one headings to separate your answers to each question.

1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.” 

Describe these obstacles in detail.

2. How can Josh win support for his team’s three-point plan to use technology to help 

IFG reach its customers?

Discussion 1

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 1  (Jamsa, 2013).
Chapter 1 topics:

  • Define and discuss cloud computing.
  • Discuss how cloud computing has changed how companies budget for software solutions.
  • Compare and contrast SaaS, PaaS, and IaaS, and provide an example of each.
  • Define scalability and discuss how the cloud impacts it.
  • List three advantages and three disadvantages of cloud computing.
  • Define virtualization and discuss how the cloud impacts it.
  • Describe three cloud-based solutions for individuals and three cloud-based solutions for businesses.
  • Discuss how Web 2.0 has driven the growth of the web.
  • Compare and contrast public, private, community, and hybrid clouds.

cloud computing 5

 

Continuing on the same path as last week, you will revisit the AWS training to start and complete AWS Cloud Practitioner Essentials (Second Edition): AWS Integrated Services module.

It will take approximately 100 minutes.  Once complete, return to Week 5 discussion and (a.) tell us what you learned that you found interesting about the content.  (b.) Discuss how these services work together and finally, (c.) go to another student’s post and ask a question related to their post.  You must also answer a question(s)  pose to you by myself or another student.   Enjoy!

Complexity of Information Systems Research in the Digital World

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.

Discussion post and assignment

 

Week 6 Discussion – Vulnerability Prioritizing

Vulnerability Prioritizing

Hello Class! Please respond to BOTH of the following questions:

Question A

  • If you were given a set of vulnerabilities how would you prioritize remediating them?

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

 

Week 6 Assignment – Mobile Security Issues

While we as security practitioners have been working feverishly over the last 10 years to secure our traditional endpoints, our users have become less invested in their no-fun company laptop, and more enthralled with their smart phone or tablet. With the company laptop, you won the difficult battle of deploying appropriate controls: whole-disk encryption, data leakage prevention, group policy–controlled everything. When you weren’t looking, users started working on their other devices more and more; then, one fateful day, your gadget-happy executive attended a big meeting with an iPad to take notes and a new battle began. It was just a matter of time before people started talking about data breaches with unprotected smart phones and tablets.

This weeks reading mentioned various types of mobile attacks. In your own words state what types of attacks exists and the method of approach you would utilize to address the attack in an enterprise setting.  Please state your answer in a 1-2 page paper in APA format. Include citations and sources in APA style.

Practical Connection assignment

 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has been or will be connected and put into practice within your career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.