Information Governance Research paper 1

Your final project paper is broken down into 3 parts, worth a total of 600 points towards your final grade. This milestone is worth 100 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (2-3 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 3-5 sources from the UC Library.

Review the instructions in the Portfolio Project document first (attached here). Each milestone is a separate writing assignment, leading up to the final submission in week 7.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offense) or failing the course (2nd offense).

EH week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided? 300-350 words.

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

R5

Please go through the attachment for assignment details.

Business contingency and disaster recovery

Create a disaster recovery plan for either the organization they work for or one they wish to work for in the future. The plan will follow the template/example provided. Should request prior authorization of the company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

**You may modify some of the sections per the company they have selected but all students will need to complete a DR plan for the Portfolio requirement.  

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

2 QUESTIONS, EACH QUESTION WITH 3 ANSWERS, EACH ANSWER 200 WORDS WITH 1 APA REFERENCE FOR EACH ANSWER

Question 1:

 There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented? 

Question 2:

 Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses 

Research paper and discussion

Part 1: Research paper (4-6 pages)

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2: Discussion (500 words) and 2 responses

 expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3: Practical connection assignment (500 words)

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.  
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Part 4 : Discussion (500 words) and 2 responses

discuss the characteristics of the three predominate anomaly detection methodologies.: Model-Based vs Model-free, Label vs Score, and Global vs. Local Perspective.  

Discussion

 

There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Week 5

 

The CIO of your organization has asked you to create a 4- to 6-page risk management and mitigation plan for security vulnerabilities.

Select five vulnerabilities and align associated risks to a risk management framework, such as NIST SP 800-37. Include the following:

  • Consider the potential vulnerabilities or threats facing the organization. 
  • Describe of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation. 
  • Explain each risk’s impact on the organization. 
  • Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Give a defined reason why a vulnerability or threat would not be mitigated, such as the use of a different risk control strategy, if appropriate.