assignment

 

In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as Target, OPM, Equifax, Home Depot, and so many more. 

In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident. 

This week you will work on Milestone 3.  In milestone 3 you are building upon your first two milestones and describe the mitigation strategy, results, etc. on the organization.  For example, if you chose Equifax in milestone 1 you introduced your topic, in milestone 2 you described the controls that surrounded the organization, and now in Milestone, you will evaluate the results of the security incident. All of these milestones tie into each other as you evaluate the circumstances of the incident and the results.  

The minimum is 2 written pages and this does not include the title or reference page.  You must properly APA format your response.

Insider Threat

In 80 words or more review and discuss the following link.

https://www.infosecurity-magazine.com/opinions/accidental-insiders-serious-threat/

CSS225

 Work through the Module 8: Lab Activity (located in this module) and submit the deliverables listed in the document 

css lab activity

Work through the Module 9: Lab Activity (located in this module) and submit the deliverables listed in the document to this assignment submission folder for a grade. This assignment is due by Sunday at 11:59 PM CT.

Discussion 2

For your initial post, consider the following scenario.

After internal security issues nearly ruined the business, an organization is looking to hire a new chief information officer (CIO) to institute a new governance design. In addition, the new CIO will need to decide whether to use an acceleration or containment strategy to address user computing.

For this interactive assignment, you will take on the role of a perspective candidate for the CIO position and propose to the executives of the organization a governance design that you would implement. In a separate document, create a diagram that depicts your governance design and attach it to the initial post. Within the initial post, explain the role of information systems governance in business and why the CIO role has become so important. Explain the strategy you would use as the CIO to support user computing (i.e., acceleration or containment) and provide a rationale for why you selected one over the other. In addition, explain the governance design you created and would implement as the CIO of the organization. Provide at least three implementation examples to support your design selection and user computing rationale

Your initial post should be a minimum of 300 words.

COM303 Week 6 Discussion 17

  

When you think about the thousands of interactions you’ve had over your lifetime, which nonverbal elements have you found the most persuasive on/to you?  Which nonverbal communication traits do you wish you were able to use more successfully in your life?

security architecture and design

 Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course (security architecture and design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not current working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.    

discussion7

1.Examine Alexa’s skill in ordering drinks from Starbucks – they are?

2.Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa.