Discussion : Describe the current trends in information systems as well as how technology changes impact society and culture

Discussion: This week the focus turns to the future as we talk about trends in information systems.  Describe the current trends in information systems as well as how technology changes impact society and culture.

Note: The first post should be made in 12-15 hours.

Your response should be 250-300 words.  Respond to two postings provided by your classmates by saturday .

Bank Enterprise Information Security Policy (EISP)

  

The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)

Here are some technical parameters of the Bank of Bowie.

· Headquarters is located in Bowie, MD

· Headquarters building has corporate offices and a branch on the lower level

· Two branch offices are located in Bowie and Laurel

· Each of the three branches employees the following staff

o Branch Manager

o Branch Security Officer

o Six Tellers

o Two Loan Officers

· Corporate Headquarters employs the following staff

o Officers and Directors

§ Chairman/CEO/President/Director

§ Vice-President/Secretary/Director

§ Financial Officer/Treasurer

§ Assistant Treasurer 

§ Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes

§ Chief Compliance Officer

o Employees

§ Head Loan Officer 

§ Senior Loan Administrator

§ Two Loan Processors

§ Escrow Processor

§ Eight Customer Service Representatives

§ Internal Auditor

§ Compliance Officer

§ Two Human Resources Personnel

§ Five Information Technology Personnel

· Bank Offerings

o Savings and Checking Accounts

o Loans

o Deposit Products such as IRAs

o Online Banking

Information Technology Landscape

· Primary corporate databases are maintained at the Headquarters and a backup location

· Data is replicated routinely from the branches to the Headquarters

· Headquarters and branch personnel use desktops for their day-to-day activities

· Software consists of a number of standard applications, e.g., Office, and customized banking applications

· The Bank of Bowie website provides static information about the bank

· Electronic banking activities are outsourced to other providers

· Data is archived by a third-party provider

· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures

Vision/Mission

Bank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]

Regulation

We will simplify the government regulations for this activity. You must account for federal requirements for the following.

· All financial transactions must have integrity.

· All financial transactions must be audited and audit data must be retained for a period of six years.

· Social Security Numbers must be kept confidential.

· Customers must have access to their accounts at least every 48 hours.

· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. 

Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. 

Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. 

Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. 

Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.

 .

Information Systems Business and Beyond

  • Chapter 4 – Review the section on Linear Development in Learning Approaches.  Discuss how learning changes over time impact organizational culture.  What is the impact of this cultural change on the success of IT projects?
  • Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections.  Note the various roles in the organization and note the similarities and differences within each role.  Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.

700words discussion: If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective.

700words discussion: If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

1.Googel-scholor references

2.In-Text citation

3. APA format

4. Conclusion at the end of discussion

Access control Assignment 14

Discuss the importance of the testing phase of the Software Development Life Cycle.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

OLDM W 7 D

 1.Discuss what performance management is and how it influences effective teams. 

 2.Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.

3.Note at least two organizational capabilities and compare and contrast each. 

Assignment on Reflective Assessment (Subject- Analyzing N Visualizing Data)

Write a short paper discussing the application of this course to your work environment. Address the questions listed below in your paper:

  

· Introduction

· How will you apply the skills acquired from this course to your job?

· How will this course assist you in your professional or/and academic           development?

· If the skills acquired in this course will not directly apply to your job environment, in what other ways are you hoping to apply them to your personal or academic portfolio?

· Conclusion

Your research paper should be at least 1 page (Minimum 400 words), double-spaced, have at least 2 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). 

Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

APA citation format is required.

Project and Discussion

Q1.) Operation security Individual project

Department of Defense (DoD) Ready 

Purpose

This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.

Learning Objectives and Outcomes

You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.

Required Source Information and Tools

Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.

The following tools and resources will be needed to complete this project:

  • Course textbook
  • Internet access
  • DoD instructions or directives
    http://www.dtic.mil/whs/directives/
  • Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf  and  http://www.rmf.org/images/stories/rmf_documents/850001_2014.pdf
  • Department of Defense Information Security Program
    http://www.fas.org/irp/doddir/dod/5200-1r/ 
  • Department of Defense Internet Services and Internet-Based Capabilities
    http://www.dtic.mil/whs/directives/corres/pdf/855001p.pdf
  • Department of Defense Proposes New Information Security Requirements for Contractors:
    http://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-of-defense-proposes-new-information-security-requirements-for-contractors/
  • School/public library (optional)

Deliverables

Scenario

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

Your firm’s computing environment includes the following:

  • 12 servers running Microsoft Server 2012 R2, providing the following:
    • Active Directory (AD)
    • Domain Name System (DNS)
    • Dynamic Host Configuration Protocol (DHCP)
    • Enterprise Resource Planning (ERP) application (Oracle)
    • A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
    • Microsoft Exchange Server for e-mail
    • Symantec e-mail filter
    • Websense for Internet use
  • Two Linux servers running Apache Server to host your Web site
  • 390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You should:

  • Create policies that are DoD compliant for the organization’s IT infrastructure.
  • Develop a list of compliance laws required for DoD contracts.
  • List controls placed on domains in the IT infrastructure.
  • List required standards for all devices, categorized by IT domain.
  • Develop a deployment plan for implementation of these polices, standards, and controls.
  • List all applicable DoD frameworks in the final delivery document.
  • Write a professional report that includes all of the above content-related items.

Submission Requirements

  • Format: Microsoft Word
  • Citation Style: APA
  • Length: 5 pages

Q2.) Cryptography Discussion 

Write 500 words that respond to the following questions:  

  • Read the (Yahoo Data Leak Article from csoonline.com) online article at https://www.csoonline.com/article/3123496/security/yahoo-s-compromised-records-likely-hidden-within-encrypted-traffic-vendor-says.html 
  • Write a 400-600 words summary about what did you understand from it.

Please note:

  • Be in APA format including your references.
  • Be 500 words long (not including title and references).
  • Do not re-state the questions.
  • Include two sources (i.e. two references).

Q3.) Operation Security Discussion  

Assignment Requirements

Participate in a discussion on the importance of separation of duties for personnel. Discuss examples of roles you would separate and why. For example, an administrator has full administrative server login access, and a network technician has limited administrative access but can view system login details. Payroll has access to employee financial records, but only payroll managers can approve raises.

Computer Science

Find and review a scholarly article related to Graph-Based Clustering and summarize it. 

Make sure to follow all APA guidelines and watch the similarity score. 

No Plagiarism

No content spinning.

Minimum 2 pages

All references must be included in APA format