Assignment

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Final Paper

  

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

1. The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction

ii. Literature review

iii. Program and technology recommendations

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 10 to a maximum of 15 pages in length (double-spaced), excluding the title page and references.

Discussion Post

 

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Please be sure to answer all of the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Case scenario

 

Case scenario. An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. 

Remember to use a professional writing style and support your statements with logical evidence. 

Wk 3 – Apply: DDOS

Assignment Content

  1. Imagine you are on a specialized team tasked with exploring network vulnerabilities in your company. The CEO of the company has read about similar companies being subjected to a Distributed Denial of Service (DDOS) and is very concerned. 

    Research the definition of a DDOS attack and how it can be prevented. If it cannot be prevented, describe the steps that may be required to remediate the DDOS attack, along with the potential business impacts caused by a DDOS attack.  

    Prepare a 10- to 12-slide multimedia-rich Microsoft® PowerPoint® boardroom presentation for the CEO. Include the following in your presentation:

    • Title slide
    • Definition of a DDOS attack
    • At least 2 methods (attack vectors) of DDOS attacks to include the threat agents’ (hackers) motivation for conducting a DDOS attack
    • Common prevention tools and/or processes to block a DDOS
    • Common detection tools to detect if a DDOS is occurring or has occurred.
    • Recommended methods for containing or eradicating the DDOS attack
    • Recommend methods for bringing the affected systems back online from a successful DDOS attack
    • Reference slide
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Presentation checklist:

    1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    2. Consistent fonts and font sizes throughout the presentation 
    3. Use colors and background. No black and white presentations.  
    4. Include at least one references that are properly cited 
    5. Follow APA format (fonts, etc). 
    6. Include speaker notes for every slide except title and reference pages. 
    7. Did the use slides to convey ideas and handouts to communicate details?  
    8. Did the slides follow the golden rule of one idea per slide?.  
    9. Did the slide titles convey the key message of each slide? 
    10. Did the visual diagrams to convey the concepts in a simple, clear, and memorable way? 
    11. Can the charts be understood in less than 5 seconds? 
    12. Did the pictures add clarity to the message the slides  
    13. Did the presentation build curiosity in the audience by revealing information in stages?  
    14. Did the presentation repeat the agenda slide as a guidepost to review your points periodically? 
    15. Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?  
    16. Are the slides clearly readable from the last row in the room?  
    17. Consistent fonts and font sizes throughout the presentation?

      In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.

Computer Security Assignment-Security Certifications

 

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open. 
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

Write your answers in WORD

Discussion 5

 

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Emerging Threats and discussion

here are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Impact of Big Data on Businesses

Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Big Data on Businesses.

ANALYSIS: Using 900 words, write a brief analysis, in your own words of how the article relates to the selected chapters. 

An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, 

thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Research Current Legal Rulings

 

Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.

In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action. 

For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.

  • Go to:  the Federal Register. https://www.federalregister.gov/.
  • Use the Search bar to find rulings related to your topic.
  • Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
  • Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization. 
  • Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).

Possible topics for your search:

  • Anti-malware
  • compliance/auditing
  • forensics
  • ID management
  • Intellectual property
  • Managed security service providers (MSSPs)
  • Messaging safeguards
  • Patch management
  • Perimeter defenses
  • Security information management (SIM)
  • Security event management (SEM)
  • Incident response
  • Transaction security
  • Wireless security

Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the following chart format for your summary.