Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 

portfolio project (information governance)

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.

· Week 6 – Develop a full annotated bibliography (2-3 pages).  25 pts.

· Week 12 – Develop the literature review (2-3 pages). 25 pts.

· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.

Learning Culture Through Fables

 Find a fable from a culture other than your own  (No American fables or fairy tales). Post a link to the fable. Write a short summary of the fable that identifies the values taught by the fable. Write a couple of paragraphs that explain why you believe these values are being taught in this fable and why these values might be important to this culture.  

300-350 words

security architecture

 What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement? 

Upload Assignment: Homework 1

Download and Install the R Programming tool (Cran), Python, and MySQL for Excel software onto your PC. Verify successful installation by attaching ONLY the screenshots to display your completion of each software installation (3 total screenshots).

Also, please summarize in a short paragraph how the installation went for you. What problems, if any, did you have and how were they solved? What things went right for you during the installation?

week 3

Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format.

CYB/100 Week 4 – Intrusion Detection

Assignment Content

  1. After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide justification for adding intrusion detection software (IDS), as well.  

    Research various IDS that would benefit the company.

    Create a 2-page table for the CIO to share with upper management. Include the following:

    • Reasons why IDS would benefit the company and the larger cyber domain
    • Descriptions of the categories and models of intrusion detection and prevention systems
    • A description of the function of antivirus software, firewalls, and IDS
    • Examples of commercial software that could provide the solution
    • Include citations as necessary in APA format.

      Submit your assignment.

Presentation. Computer Science 302

Presentation on ITUnand its purpose

ITU-T (International Telecommunications Union – Telecom Group 

Technical recommendations about telephone, telegraph and data communications interfaces 

Composed of representatives from each country in UN

Based in Geneva, Switzerland (www.itu.int)

Additional Source

https://whatis.techtarget.com/definition/International-Telecommunication-Union-ITU

https://www.itu.int/en/ITU-T/Workshops-and-Seminars/qos/022015/Documents/Bios-Abstracts-Presentations/S1P1-Hiroshi-OTA.pptx