Required Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
 

Investment Firm cybercrime risk assesment

 

  • As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Risk Assessment.  The overall cybercrime risk assessment can be outlined with a minimum of two to three sentence descriptions of what the outline will cover under each section.
  • Ensure that you provide information for three specific risks for each section. For example, three High, three Medium, and three Low.
  • You will want to take into consideration that HU Financial Firm is a legal firm. 
  • Items to think about would be the possibility of a natural disaster occurring or a cybercrime attack. 
  • You will want to rank the possibility of an incident happening from high to low as identified in the sample template in this section, which has been provided for you.
  • Additional information can be reviewed under the course reference links and research on the internet.

Week 14

1)  Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? 

2)  explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month? 

3)  Which vendor certification would you think is the most relevant in the field of IT security?  Why? 

Virtualization

 Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. 

Qualitative vs Quantitative

 

Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear and use examples to reinforce your ideas. Focus on the following questions:

• Describe the differences in the content and structure of a qualitative literature review as compared to a quantitative literature review. (Remember that the literature review is the second chapter of a dissertation.  Limit your response to differences in the literature review only, and not the entire paper.) 

IT Proposal-Final Project 8-10 pages. MUST BE A+ WORK.

 

IT Proposal

For this assignment, you will analyze the roles of information systems in business and create an IT Proposal. You will take on the role of an IT manager and apply the methods for developing information systems to address business needs by including aspects from the major elements examined during the course that comprise information systems.

As an IT manager, you will have an impact on the technology decisions made by your organization and will often be asked to put together business proposals to provide solutions for the organization, as well as for existing or prospective customers. For this assignment, you will create a proposal for the following scenario. 

Scenario

ABC Corp is a software company with a staff of fewer than 50 employees and a very large client base. The company is currently using an in-house proprietary customer relationship management (CRM) system that is reaching its maximum capacity. Additionally, ABC uses a web portal for their sales team to enter contracts, and a product enhancement database to capture defects and enhancements requested by customers. The systems contain redundant customer data that needs to be centralized. The systems have many silos that have resulted in an inefficient work-flow process for users, missed sales opportunities, and poor customer experiences because of the inability to access all customer data in one place. The company is in search of a scalable solution that streamlines operations and improves customer relations. 

Include the following information in your IT Proposal.

  • Analyze the current information system in place at ABC Corp and its role in the current challenges identified.  
    • Describe the challenge(s) presented in the scenario and the impact of the challenge(s) to the organization. Include any potential data security issues that could occur as a result of the current information system.
  • Create an information system for implementation at ABC Corp that will solve the identified challenges.
    • Explain how the proposed information system solution will solve the problems.  Support your statements using the textbook and/or other credible sources.
    • Evaluate your proposed system and explain why the proposed solution is the best approach including issues of scalability, streamlining of operations, and cost effectiveness. Support your statements using the textbook and/or other credible sources.
    • Explain how the proposed information system solution will ensure data quality and security. Support your statements using the textbook and/or other credible sources.
  • Distinguish among the hardware components, operating systems, programming languages, programs, and applications your proposed solution will contain. 
    • Create a high-level diagram of the major elements that are required for implementing the solution.
  • Evaluate the systems development life cycle (SDLC) process as it relates to your proposed solution, and describe how you would implement it in the development.
    • Determine the approach you will use for implementing your proposed solution, by revising the SDLC diagram you created in Week Four.  Include the revised diagram in your proposal.

The IT Proposal

  • Must be eight to ten double-spaced pages (2,400 to 3,000 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must use at least four credible industry sources, in addition to the course text. 
  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style.

    **THIS MUST BE A+ WORK. Diagram mentioned must be high level***WHAT IS BEING ASKED MUST BE IN PAPER IN A CLEAR CONCISE MANNER

IT-project management wk2 discussion

 

Detail two methods you would use to collect and analyze network traffic.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other (at least two) students.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

Cybersecurity Program

 

USING ALL PREVIOUS ASSIGMENTS (INCLUDED), students will present a comprehensive  Cybersecurity Program that reports on the final state of their enterprise.

Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion. .

APA style is not required, but solid academic writing is expected.

This  assignment uses a rubric. Please review the rubric prior to beginning  the assignment to become familiar with the expectations for successful  completion.

You are not required to submit to turnitin.

This assignment serves to benchmark competencies: 

4.1:  Develop cybersecurity program aligned with business needs, regulations,  and compliance standards to enhance an organization’s security posture.

4.2:  Determine appropriate business strategies to ensure business  sustainability, availability, and reliability and articulate these needs  to relevant stakeholders.

4.4: Interpret risk  assessments, gap analysis, and current cybersecurity trends to formulate  a cybersecurity governance strategy that establishes mitigation plans  for future challenges to achieve security objectives.

Cybersecurity Planning

1.)In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.

2.)For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. 

At the end of your report, please include a LINK to the policy you have reviewed.

4p

Deliverables 

§  1st  –  Scope of Work (discussion post) – step 1  Need ASAP

·  Crucial concerns worksheet step 2-4

·  Policy Alignment Report –  step 5-7

·  MDM Policy Framework – step 8-10  (2-3 pages)

·  *MDM Policy Presentation*   Instructions separate sheet.