Discussion Question – Need 3 answers for this single question – Each answer 200 words (So total 600 words)

  1. Discuss what performance management is and how it influences effective teams.
  2. Define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

Access Control – Security breaches can have serious consequences for an organization

  

Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector, or the Critical Infrastructure. Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:
 

 •    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and         Assignment name.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines.  Be sure to include at least three reference sources.
•    In-text citations – Please include the author name and year of publication 

Written Assignment 4

  

Describe the role of forms and their value in creating a VBA application. Create a simple form and include a screenshot in your journal, as well as a description of what it does. 

· Prepare a quality, substantive journal post that addresses the objectives of the 

assignment and the expectations set forth in the grading rubric. 

· 300 words minimum is required. 

· Use APA format – Refer to APA Style and the Online Writing Center resources 

in Academic Resources for guidance on paper and citation formatting. 

· Use at least two sources of credible evidence

Week 2- Apply: Malware Attacks

Assignment Content

  1. Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams; all of which make it easy to follow troubleshooting instructions.

    Throughout the next four weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

    Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

    Include the following information:

    • Details of the malware
    • The exploited vulnerability and its attack vector
    • Two risks of this malware
    • Step-by-step instructions on how to resolve the malware attack
    • Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

      Cite at least two resources within the assignment in APA format.

      Submit your assignment.

CC2

 

Consider, in 500 words or more, how cloud computing business processes as services can improve efficiency. This discussion is about the cloud computing business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Research Paper on Forensics

After reading the articles of digital forensics techniques, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

I attached one paper, and you need to download some more papers in order to answer these questions. 

Research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.