Management of Information Security Project

Project Description

Carry out a security self-assessment of an organization of your current or previous employer or your own organization. You must seek permission from the individual responsible for the information security of that organization. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.

Report

Write a report based on the self-assessment of an organization. It should be 5-7 pages long, 12 point character size, double line spacing, and have 1” margins on all sides. It is recommended that you do not use the actual name of the organization in the report; use a title, such as “ABC, Inc.” Your report should include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of an action plan.

Deliverables: A single Word document

Project Guidelines:

For the project, you can do a security assessment on either a single IT system or the entire IT infrastructure of an organization, whichever you think is feasible and manageable.

You can use these guidelines when working on your project:

1) Your project report just needs to be a very general assessment of the IT system in organization. You can keep it brief (about 4 to 8 pages long, not including the cover page), and broadly cover the following areas:

 Management Controls

 Operational Controls

 Technical Controls.

You don’t need to get into specifics on anything that might be considered sensitive or proprietary. Keep it very general (something that can be in the public-domain).

2) For your project, **only** use information that is considered public. Please **do not** use or reference any proprietary or non-public information. As the project guidelines state, do not use the actual name of any organization – instead use “ABC Inc.” And in your project please don’t reference any documents that are not considered to be in the public domain; also don’t use any company names – use something generic such as XYZ Inc.

3) Instead of doing a self-assessment of a real company, you can also do a self-assessment of a fictitious company similar to a real entity. For example, you could imagine that you are performing an assessment of a fictitious entity such as the following:

 A college bookstore that accepts online textbook purchases, or

 A pharmacy store that maintains a database of customer prescriptions

 An auto-insurance agency that maintains customer data

 … etc. … etc.

You can imagine yourself being hired as an Info Security consultant to perform a security audit of the fictitious company’s IT infrastructure. Assume that some rudimentary security measures are currently in place, but there is much room for improvement. In your report describe your assessment of the security measures currently in place and recommend any needed improvements to ensure better IT security in the organization.

Systems Planning

 

Assignment Content

  1. As the launch for Great Day Fitness Tracking’s online site approaches, Karen already has new ideas for other products and services.

    Create a media-rich, 14- to 18-slide Microsoft® PowerPoint® tutorial or an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, for Karen. Use this week’s reading and activities for information systems planning to complete your assignment. Your tutorial should:

    • Include a title page.
    • Explain the concept of information systems planning.
    • Compare at least two development planning methods.
    • Clarify why each planning method is appropriate for new system implementation.
    • Select a methodology for designing the information system.
    • Explain the reason for the selected methodology.
    • Address the option to acquire (instead of build in-house) information systems.
    • Identify and discuss the tools that might be used in the acquisition of a new information system.
    • Submit your assignment.

Chapter Instructional Summary

 

  1. Create a web page and save as “assign3.html” and include the following information head meta tag information:
    -Your complete name
    -Course CRN – 12345
    -Date when you completed the assignment
    -Assignment number, for example: Assignment 3

  2. Research online on the following topics from the textbook and write two paragraphs (4 sentences or more per paragraph or a total of 8 sentences or more) for each topic:
    1. History of JavaScript and what it can do. (pages 77-79)
    2. Where JavaScript code can be inserted in an HTML file or as separate files. (pages 79-81)
    3. JavaScript capabilities. (pages 81-83)
    4. Creating and testing JavaScript. (pages 84-91)

practical connection assignment

  

For your practical connection assignment please (1) research an article concerning Digital Forensics; then (2) lease, summarize the article and answer the following questions: 

1. Do you agree with the author? 

2. What could had been done if anything that could improve on the incident? 

3. What should had been done?

4. Was proper procedure used in your opinion?

5. Could you include anything else concerning the article?

Please, include at least two other references to support your claims or views. The assignment must be in APA formatting.

IT Strategy Case Study 1 Nationwide

Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format (With References and In-Text Citations). See the sample assignment for expected format and length.  

1. List and describe all of the potential benefits (and costs) that Nationstate would realize from the establishment of an enterprisewide architecture as envisioned by Jane Denton?

2. Build a business case for Seamus O’Malley to present to the senior management team at Nationstate in order to get their buy-in. In addition to benefits and costs, the business case must answer the “what’s in it for me” question that the BU 3presidents all have.

database management

IFB105 Database Management

Project – part A

Project overview

The IFB105 project gives you an opportunity to apply concepts and skills you acquired in the unit to a realistic database design scenario and reflect on the data requirements of an organisation.  

The submission is divided into 2 parts due at different times during the semester. These parts will cover:

  1. Design of a database
     
  2. Creation and use of a database  
     

The task for part A

In this part, you will:

  1. Design an ORM conceptual schema for a business domain based on sample reports required for that domain.
     
  2. Map a different ORM schema to a relational database schema.
     

.please there are several task on the file uploaded ..

personal computing

 

Submit a paper with two or three pages of information in APA format. including a cover page, an abstract statement, and references  the paper will be five pages total.

Describe in-depth, one future computing technology, trend or prediction and tell for how it will affect the way we work, live and collaborate. How will businesses and jobs be  affected?

Examples: (You do not have to choose one of these topics.)

Give a general outlook for the technology, then give information that is industry specific. If you write about robotics, give an overview, then tell how robotics will affect health care, for example. How might robotics affect the field you are planning to pursue? Will robots be able to write creative code?

Other examples; Describe how artificial intelligence will affect privacy and personal freedoms.  (This is already happening.) With AI, will computers ever be able to read our thoughts? Will we ever be able to make video recordings through our eyes? So, your topic can be a bit out there, as long as you have supporting resources. Have fun with this.

Research Paper on Acceptance and Rejection on Bitcoin

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused to accept Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing