home work assignment

Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.

minimum 300 – 400 words

Assignment should follow all APA rules and include a min. of (1) citation/reference.

no plagiarism

Assignment 07/08

 

Week 2 Paper – IT Strategy                          
                                                    

Individual Effort Only!

APA format is required – Your paper must be supported with appropriate APA-formatted citations that match full references at the end of the paper. Include headings in your paper for each question–DO NOT just restate the question as your heading–use unique headings identifying the content topic. Each section should be at least 2-3 paragraphs in length.

Referring to chapters 2 and 3 of the Langer (2018) text specifically regarding IT organization and strategy, review and compare the two sources below and then address the following questions in your paper:

Overby, S. (2017, October 27). Anatomy of an IT strategic plan in the era of digital disruption. Retrieved from https://www.cio.com/article/2437285/anatomy-of-an-it-strategic-plan.html

Lindros, K. (2017, July 31). What is IT governance? A formal way to align IT & business strategy. Retrieved from https://www.cio.com/article/2438931/governanceit-governance-definition-and-solutions.html

  1. Identify and discuss 2 key issues identified in the articles regarding IT strategy in today’s business world
  2. Discuss the need for alignment between business and IT strategy
  3. Discuss the challenges in aligning business and IT strategy
  4. Provide a concluding statement addressing your views on the value of IT strategic management and business alignment

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words

What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

Enterprise Risk Management

Chapter 18 presented special risk management issues with Blue Wood Chocolates, and chapter 19 presented various financial risks at Kilgore Custom Milling. If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process? 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?

700 Words

Security Proposal

 

The Dayton Soft Products executive staff has requested materials and your recommendations on the following security issues:

  • Is a security audit really needed? What are your recommendations for conducting such an audit?
  • What are the roles and responsibilities for the organization’s staff regarding security?
  • Is there any concern about Dayton Soft Products’ overall communications?

Compile a 3- to 4-page proposal that addresses solutions for the issues presented and which includes:

  • Reasons for why a security audit is necessary with your recommendations for conducting such an audit:
  1. Potential costs (personnel, finances, etc.)
  2. Proposed audit timeline
  3. Two recommended methodologies
  • A RACI chart that identifies:
  1. the roles and responsibilities for the organization’s staff regarding security
  2. expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff
  3. Note: This chart may be embedded in your proposal as a table or spreadsheet file, or attached as a separate document.
  • Answers to concerns about Dayton Soft Products’ overall communications
  1. Three recommendations for securing the web communications—especially addressing internal needs and the growing global needs

Research Assignment

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

Upload your completed assignment here by clicking the BLUE assignment link above.

6 Discussion- Risk and Control Self-Assessment (RCSA)

 You have been asked by the CIO of the company to justify a need for RCSA policies. What approaches would you use to plan for threats and events that could potentially cause disruptions? Discuss your four reasons why organizations need risk and control self-assessment (RCSA) policies. Explain your answers 

assignment

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it.