12_Imoprtance of strategic IT planning

 Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: Please Use Scholar articles for APA references

Physical Security

 Complete a Physical Security Assessment (internal and external) of your  place of work or living area.  If you use your work area make sure you  inform the Security Manager to get permission as to what you are doing.  If you live in a gated community inform the security guard of your  activities. Refer to your text on the importance of Lighting and Access  Control and be sure to cover the salient issues discussed in the text.   

Research Paper

 

read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.

• Research other company’s strategy for going global and explain if this will or will not work for your company. 

Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Business Intelligence

When submitting work, be sure to include an APA cover page and include APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion

1.What is an artificial neural network and for what types of problems can it be used?

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?

3. What are the most common ANN architectures? For what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

Excercise:

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet Exercise 

6. Go to neuroshell.com. Look at Gee Whiz’s examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Cloud computing within an enterprise risk management framework

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignement

  

Week-13 Assignment

This week we will focus on a Specific topic “IOT threats to database Security”

Please submit below two questions which relates to above mentioned topic. It is important that you use your own words. Do not use spinbot or other word replacement software.

  1. An annotated reference list of  at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.(Use References attached )
  2. A one page single spaced summary   of what you learned about this topic. it should be written in essay format  with no bullet or numbered lists. It must include quotes from your sources  which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

Research paper on Uber Breach

 

Company to work on is Uber breach and find any past issues/breaches the company has gone through, create Crisis Management Plan

Paper should include these points:

1. Introduction – brief background of company and any issues the company has had in the past such as data breaches

2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)

3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)

4. Crisis Management Plan:

a) Purpose

b) Committee for crisis management planning

c) Crisis types

d) Structure of the Crisis Management Team

e) Responsibility and control

f) Implementation Plan

g) Crisis Management Protocols

h) Crisis Management Plan Priorities

5. Conclusion

Page Count Range should be 20 pages not including: Title page, Table of Contents and References page

All References are to be in APA format. Only consider US articles

Project Outline

 

Primary Task Response

Your first task is  to post your own Key Assignment outline to the discussion area so that  other students are able to review your plan. Attach your document to the  main discussion post, and include any notes that you feel are  appropriate. The purpose of this assignment is to help improve the  quality of the Key Assignment draft that you will complete next week.