Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 4

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not?

Chapter 5

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

Sarbanes-Oxley and

PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Policy and legal_8

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.

 

sing the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

OVERVIEW

This week’s class covers Cyber Stalking, Fraud and Abuse

This week’s topics:

  • Review prior assignment
  • Investment and auction scams
  • Identity Theft
  • Cyber Stalking
  • Web browser security settings
  • Review the weekly reading and viewi assignments
  • Review this week’s lab discussionREQUIRED READINGSRead Chapter 3 of the Easttom text, Cyber Stalking, Fraud and Abuse.Primary topics:

You can take the state example as Delware

week 7

Discuss the role of demographics in relationship to integrated marketing communications ( 350 words and in APA format)

b) 1 reply of 250 words 

Discussion

 policies for IT infrastructure.  Examine each of the domains.  Choose a domain and write one standard or procedure for that domain.  For example,  you may choose LAN domain and write the Wi-FI Access point Security Standard.  You may choose any standard or procedure. minimum word count of 300 word 

coursework to their practical work experience

 1. Briefly explain any steps you are taking, or plan to take, to gain hands-on experience in your program of study(Ph.D. in information technology).  100 words  use own words

2. State two goals you hope to achieve through applying your coursework(  Data Science & Big Data Analy, information security leadership & communication) this term to your workplace experience. 100 words (use own words)

IT Strategy

 

Week 2 Paper – IT Strategy                          

100 Points Possible                                                    

Individual Effort Only!

APA 7 format is required – Your paper must be supported with appropriate APA-formatted citations that match full references at the end of the paper. Include headings in your paper for each question–DO NOT just restate the question as your heading–use unique headings identifying the content topic. Each section should be at least 2-3 paragraphs in length.

Referring to chapters 2 and 3 of the Langer (2018) text(see attachment) specifically regarding IT organization and strategy, review and compare the two sources below and then address the following questions in your paper:

Overby, S. (2017, October 27). Anatomy of an IT strategic plan in the era of digital disruption. Retrieved from https://www.cio.com/article/2437285/anatomy-of-an-it-strategic-plan.html

Lindros, K. (2017, July 31). What is IT governance? A formal way to align IT & business strategy. Retrieved from https://www.cio.com/article/2438931/governanceit-governance-definition-and-solutions.html

  1. Identify and discuss 2 key issues identified in the articles regarding IT strategy in today’s business world
  2. Discuss the need for alignment between business and IT strategy
  3. Discuss the challenges in aligning business and IT strategy
  4. Provide a concluding statement addressing your views on the value of IT strategic management and business alignment