Information Governance discussion 4

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.  Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out

 As a computer investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that received a bomb threat in an anonymous email. The detective already has information from a subpoena sent to the last known ISP where the anonymous email originated, and the message was sent from a residence in the school’s neighborhood. The detective tells you the school principal also stated that the school’s Web server has been defaced by an unknown computer attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence the ISP identified. Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out.  

Cybersecurity

 Note: check plagarisim 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

Discussion

 

What is the history of the network models? What are four layers of the TCP/IP Model and how are they used? How does the networking protocol work?

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. 

DM W 7 A

 There are questions in the attached word document for which I need answers. 

Assignment 1

  1. Please review the papers in this folder.
    1. Discuss, “Legal Protection for Bitcoin users in E-commerce and Application of Blockchain in Industry and Businesses”
    2. While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public. Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.
      Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
      · Ask an interesting, thoughtful question pertaining to the topic
      · Answer a question (in detail) posted by another student or the instructor
      · Provide extensive additional information on the topic
      · Explain, define, or analyze the topic in detail
      · Share an applicable personal experience
      · Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
      · Make an argument concerning the topic.
      At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
      Reference:Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live
      Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live
      RUBRICS
    3. Total grade points: 25/25
    4. Create a new thread. As indicated above, please discuss blockchain technology. 10/10
    5. AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 10/10
    6. Conclusions & References: States a conclusion that is a logical extrapolation from the analysis of evidence/data presented. 5/5pt
    7. Conclusion = 2.5; References = 2.5

 

Annotated Bibliography – Inferential Statistics

  

Using APA format, find at least 3 peer-reviewed sources (from industry articles, journals, academic and professional textbooks, and case studies) which will support your selected and pre-approved Research Paper Topic. Include them as references in APA format, write a summary of each article considered. At the end of your summary indicate the usefulness of the article in support of your Project Paper.

An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief (usually about 150 words) descriptive and evaluative paragraph, the annotation. The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited 

Steps to Creating an Annotated Bibliography 

1. Find sources related to your topic  

2. Critically read and evaluate sources. 

3. Create the proper APA citation. 

4. Below the citation write your annotation. 

References for the format of the Annotated Bibliography. 

https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

Discussion

  

Review the rubric that will be used to evaluate this paper. All work must be completed individually.