Practical Connection: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

You need to prepare a summary report. The report should include the following:

  • Explanation of the security controls that could have prevented the security breach
  • Rationale for choosing the security controls

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (access_ts_localbreach)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: Follow your school’s preferred style guide
  • Length: 2 pages
  • Citation Style:  APA with at least 2 Refferences

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have raised questions and solicited instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have followed the submission requirements.

Discussion 12

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 12-13  

(Jamsa, 2013).

Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
  • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.

Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
  • List and describe budget considerations one should evaluate before moving an application to the cloud.
  • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
  • Define and describe cloud bursting.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

ITS 831 INFOTECH IMPORT IN STRAT PLAN

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

New ERP system and network

 

The customer is very happy with their new ERP system and network. The performance of the network and user applications exceeded their expectations. The CIO stated he was very happy they went with PostUTech’s custom solution and that the alternative Cloud SaaS service he evaluated just didn’t seem mature enough for their needs. Discuss your thoughts on future Cloud Use for this customer with your team members.

  • Why is “The Cloud” a hot buzzword? What advantages does it offer? 
  • What are some of the challenges faced by Cloud technology and why might it not be the right solution for every business?
  • Give an example of a SaaS cloud provider. Would this be a good option for your customer in the future?  Try to use a different example from your team members.

Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

IT Discussion

Essay on what non-executives need to know regarding technology.  Especially in regard to innovation technology.  Please note some key foundational factors that non-executives need to know and understand regarding technology.  Also, note how non-IT departments interact with IT and how the change in the market will change how business is performed. 

 Your response should be 250-300 words.  

Data visualization

 

Data: Advanced Graphs in RStudio (ggplot2)

Background: We have seen how simple data analysis and simple graphs assist us with telling the story of raw datasets. Now we will learn how the use of advanced graphs play a major “drilling down” deep into the meaning of the data.

Assignment:

Use RStudio to generate advanced graphs (using the ggplot2 package) using the dataset below.

Use the following videos to learn the commands to produce advanced graphs in RStudio:  RStudio – Advanced Graphs – Part1.mp4

 |  RStudio – Advanced Graphs – Part2.mp4  

Graphs to Produce:

ggplot2 – Bar Plot: (Use dataset_student_survey_data.csv)

  • x=Smoke
  • fill=Exer
  • position=dodge
  • facet=Sex
  • x-label=Smoker
  • y-label=Counts
  • title=The Exercise habits of Male and Female students that smoke

ggplot2 – Histogram: (Use dataset_us_car_price_data.csv)

  • x=Price
  • fill=Type
  • facet=Type
  • x-label=Price
  • y-label=Freq
  • title=Car Price Distribution based on Car Type

ggplot2 – Box Plot: (Use dataset_production_of_rice_in_india.csv)

  • x=varieties
  • y=price
  • fill=bimas
  • facet=status
  • x-label=Rice Varieties
  • x-label=Price
  • title=India Rice Prices based on Varieties, Land Status, and Bimas Program

ggplot2 – Scatter Plot: (Use dataset_production_of_rice_in_india.csv)

  • x=price
  • y=wage
  • shape=bimas
  • col=bimas
  • facet=status
  • method=lm
  • se=F
  • x-label=Rice Price
  • y=Wage
  • title=India Rice Prices vs Wage broken down by Land Status and Bimas Program

Please put all screen shots in a MS Word (other word processors are fine to use but save it in MS Word format). Don’t upload the screen shots individually in the assignment folder! 

Submit your assignment on or before the due date.

5 computer discussions due in 24 hours

5 discussions

50 words each

  

Topic 7 Discussion & Attendance Activity: What to Expect in an IT Career

INSTRUCTIONS: 

  • Respond to the      below topic in a minimum of 50 words.  (5 points)
  • Reply to at      least 1 of your classmates. Be constructive and professional in your      responses. (5 points)

Your participation in this online activity will count toward this week attendance.

What to Expect in an IT Career

Working in the technology field, please keep in mind that you work in a support capacity. Do your best to be helpful, resolved the issue the first time, and deliver as promise. One of the most important ways to achieve customer satisfaction is to do your best by being prepared, both technically and personally.

View the below YouTube video.

  Play Video
 

In the role of technical support to users, what do you think is your strongest social skill that would help you succeed in this role? What is likely to be your greatest interpersonal weakness that might present a challenge to you in this role? What is one change you might consider making that will help you to improve on this weakness?

Topic 9 Discussion & Attendance Activity: Microsoft Word 

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft Word – Tips and Tricks

Many of you may have some familiarity with word processing software, and even with Word. People who use word processing software can be casual users who use commands as they find them, or power users who understand the power of the program and who learn more about each command and how it can be used. 

View the below YouTube video that share 25 Word 2016 tips and tricks.

 

Play Video

 
 

Did you discover any new tips using Microsoft Word from the above video?

https://www.youtube.com/watch?v=EYu3yyzdvck&feature=youtu.be

Topic 10 Discussion & Attendance Activity: Microsoft Excel

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft Excel – Tips and Tricks

Excel has more to it that meets the eye. At first glance it looks like a program to make charts, graphs, and other types of charts. One of the best features is its ability to use math formulas. This feature is helpful if you’re making any type of finance spreadsheet. With the right formulas, you can have Excel automatically add, subtract, multiply, divide, find the range, or just the sub total of any data entered in the cell(s). These formulas automatically update, so you can add data to your spreadsheet and know that it’s going to give you the right total(s) without you having to format it every time.

View the below YouTube video that share 25 Word 2016 tips and tricks. 

Play Video

How many of you have already used Excel? What did you use it for? What features did you like? What did you dislike about it?

Topic 11 Discussion & Attendance Activity: Microsoft PowerPoint

NSTRUCTIONS: 

  • Respond to the      below topic in a minimum of 50 words.  (5 points)
  • Reply to at      least 1 of your classmates. Be constructive and professional in your      responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft PowerPoint 

PowerPoint is a great tool that can help communicate ideas effectively. With PowerPoint, you can create notes for the speaker and handouts for the audience, as well as presentations. 

View the below YouTube video on PowerPoint Do’s and Don’ts

  Play Video
 

Discuss the general functions, benefits, business value, and practical uses of Microsoft PowerPoint.

Topic 12 Discussion & Activity: Identity Theft

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Protecting Yourself from Identity Theft 

The fastest growing crime in the United States is identity theft. More than nine million people fall victim each year, with the unauthorized use of an existing credit card accounting for much of the problem. The National Crime Victimization Survey reports that household identity theft losses amount to more than $13 billion each year, and that figure does not account for the aggravation and time required to repair the accounts.

Watch the below YouTube video

Play Video

 
 

Do you know anyone who has been a victim of identity theft? What steps will you take to protect your identity?