Information Governance discussion 6

Chapter 15 – According to Crocker and Smallwood, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continues to assert that, the impetus behind cloud computing lies in the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Q1: Even with this great news about the benefits of cloud computing applications, the authors have warned the business user community regarding the dangers associated with cloud computing applications.  Please identify and name these grave dangers/risks that pose as concerns, and briefly support your discussion.

Chapter 16 – Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets.  Crocker (2015), edited by Smallwood research indicated that previous to SharePoint solutions were somewhat cumbersome, managed large quantities of documents, and required extensive implementation efforts for each business application.  Given all its stated capabilities, SharePoint may be used effectively to help business organizations to govern their information.  However, in order to achieve those benefits, the implementing organizations must take a structured approach to the deployment of its SharePoint environment.  

Q2: Our case study authors have indicated that, for SharePoint deployments, “an ounce of prevention truly is worth a pound of cure.”  Why is that?  From our chapter reading, identify and briefly state why the authors were inclined to believe so?

Digital forensics and how it could be used in a risk management program?

  

Articles:

 

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019  IEEE 12th International Conference on Global Security, Safety and  Sustainability (ICGS3), Global Security, Safety and Sustainability  (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S.  (2016). Metrics Based Risk Assessment and Management of Digital  Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

The readings this week expand on investigation and of digital  forensic analysis and investigations. Organizations, especially those in  the public, health and educational areas are bound by legal and  statutory requirements to protect data and private information,  therefore digital forensics analysis will be very beneficial when  security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Inferential Stat- Pract Connect

 Description:  Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in an utility company.

Requirements:  

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations.
  • If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
  • You should NOT provide an overview of the assignments assigned in the course.
  • The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Discussion

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

Data Gathering

Storage and Integration

Data Analysis

Knowledge Discovery and Information Interpretation

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

If you are using colours in your presentation, how do you choose effective colours that provide good differentiation between the visualizations within a presentation? 

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

20200902

1. Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safeassign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

2. Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words.

3. Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords 

o such as common names, real words, numbers only

o require special characters and a mix of caps, lower case and numbers in passwords

2.  Reauthenticate before changing passwords 

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

4. Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 200-300 words. 

Use your own words and do not copy the work of another student.

Attach your WORD document here.

5. You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

6. Do a bit  if research into File Inclusion Vulnerability.

· What is it?

· Why is is dangerous?

· What is the difference of low and remote inclusion?

· What methods can me employed to prevent a security breach?

· What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

7. You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

· Who is likely to attack your site?

· When are attacks likely to occur?

· What sort of attacks might take place?

· How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.

8. Do a bit of research on penetration testing techniques. Investigate and document the following

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration tesing

Please write between 200 and 300 words

9. Do some research on Threat Response software. Find one particular software package to investigate.

· What does the software do?

· What are it’s major features?

· What kind of training is required?

· How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words and submit in a WORD document here.

10. Research the Dark Web.

Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

Write between 200 and 300 words.  

Use your own words.

Public Key Infrastructure (PKI)

“Report Template,” write a 250-word essay describing:

  1. The basic elements of a cryptographic system to include privacy/confidentiality, authentication, integrity, non-repudiation, and key exchange.
  2. Two techniques used to preserve message confidentiality: Symmetric and Asymmetric Encryption Algorithms. Specifically address the differences between the two.
  3. How cryptography can be used for data security or infiltration, focusing on strengths and weaknesses, modes, as well as issues that must be addressed in an implementation.

R5

Submit a 5 page paper (APA style) describing the issue of Blockchain transaction speed: how can speed be increased and how will loyalty programs becomes more innovative?

This  is an essay assignment. 

Business Intelligence

Prescriptive Analytics, Big Data, and Robotics

Search the internet and find scholarly content on at least two of the topics above.
        * Find at least 5 related reference

Create a WORD document of at least 500-750 words (2-3 pages) on how these technologies work and how they can be used to support a business.

  • Do not include a cover page
  • Enter your name and lab assignment # in the heading of your paper
  • Include the references at the end of your paper (using APA format)
  • Include Citations for each reference (using APA format) in the text wherever they apply