Discussion Post MAC, DAC, and RBAC

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

case study (Organisational and leadership)

 

Read the mini-case, Building Shared Services at RR Communications (pp. 156-159).

Submit a Word document with answers to questions two and five on page 159. Your answer to each question should be about two pages long.

Your submission must meet the following criteria: 

  • Use APA level one headings to separate your answers to each question.
  • Comply with the APA and writing standards for this course. Use    Dr. Straw’s APA and writing checklist  for guidance.
  • Have two scholarly sources, not including our textbook.

SafeAssign is designed to detect plagiarism, which is stealing the sentences of others and claiming them to be your sentences. You must not plagiarize. You must write your own sentences and paragraphs. Therefore, you must follow these SafeAssign instructions. Failure to follow these SafeAssign instructions will result in a grade of zero with no opportunity for resubmission and no opportunity for regarding. If your SafeAssign score is above 25% after the paper submission deadline and you do not include the comment in item v below, your paper will receive a zero.

  1. Submit your paper to Blackboard.
  2. Look at your SafeAssign score. Your SafeAssign score will be available between 10 minutes and 24 hours after submitting your assignment. You are responsible for managing your time to ensure you have enough time to evaluate your SafeAssign score, make changes to your paper, and resubmit your work by the due date. Plan accordingly.
    1. If your SafeAssign score is 25% or below then you are done. You do not need to do anything else.
    2. Do the following if your SafeAssign score is over 25%. You must do step v even if the primary reason for your high SafeAssign score is not 
      1. Review your SafeAssign Originality Report to understand your score.
      2. You can ignore headings, textbook questions, legitimate quotations with APA citations, and references that are flagged by SafeAssign.
      3. Any other sentences that are flagged by SafeAssign must be rewritten by you in your own words. Do not steal the sentences of others.
      4. Rewrite content, other than the items listed in ii above, and resubmit your paper to Blackboard. You are not required to get your SafeAssign score down to or below 25%. You are required to correct all content, not including items listed in ii above, flagged by SafeAssign. 
      5. In the assignment comments section for your last submission write these words: “I have corrected all content (excluding headings, textbook questions, legitimate quotations with APA citations, and reference) that were flagged by SafeAssign in my previous submission.” 

research paper

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Putting learning to practice

 

Please identify a computer system  you have recently had experience with (at home, work,etc.); prepare an  attached  PowerPoint presentation (minimum 8 slides) describing a  potential computer security problem related to that system. The target  audience is a manager who you are trying to convince to investigate the  potential security issues.

Suggestions:

  • Begin with a description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics – please note these as such in your presentation notes.
  • Draw from the assigned readings (and your independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Discussion

 What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. 

10 pages

  Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shutdown all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused ecommerce site” and a new business strategy for its retail stores 12 . In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Create a PowerPoint presentation containing the IT strategic plan that will address Circuit City ecommerce initiatives. The following information should be covered in the documentation. 

´1. History of Circuit City

´2. What were the issues and challenges that caused the collapse of Circuit City in 2009?

´3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

´4. Discuss the major competitors in global e-commerce.

´5. How would IT deliver value to the business?

´6. Proposed the IT infrastructure required to support global e-commerce

´7. Proposed the IT budget for the e-commerce initiative

´8. Discuss the IT based risks associated with global e-commerce

´9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business

´10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.

Methodology used on your topic

 Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   The role of intrusion/spyware analysis in risk management in the current world topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine. 

Countermeasures used in a Crisis Response

 

Media loves to tell the horror stories of disasters after security breaches. IS professionals must pro-actively plan countermeasures and continually study and learn from past events. Select a past news story of a failure caused by one of these events to provide an analysis of the failed system using some of the countermeasures you have learned in this unit. Recommend strategies to minimize the loss of IS services/data in those events as if you had been on the IT team during this event. Keep in mind that the focus of this assignment is the response to a crisis – after the event (not preventing the event).

Please submit a three page report with APA cited references to support your work.

Countermeasures to consider for your responses:

  • Fix known exploitable software flaws
  • Develop and enforce operational procedures and access controls (data and system)
  • Provide encryption capability
  • Improve physical security
  • Disconnect unreliable networks