Security Proposal

 

The Dayton Soft Products executive staff has requested materials and your recommendations on the following security issues:

  • Is a security audit really needed? What are your recommendations for conducting such an audit?
  • What are the roles and responsibilities for the organization’s staff regarding security?
  • Is there any concern about Dayton Soft Products’ overall communications?

Compile a 3- to 4-page proposal that addresses solutions for the issues presented and which includes:

  • Reasons for why a security audit is necessary with your recommendations for conducting such an audit:
  1. Potential costs (personnel, finances, etc.)
  2. Proposed audit timeline
  3. Two recommended methodologies
  • A RACI chart that identifies:
  1. the roles and responsibilities for the organization’s staff regarding security
  2. expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff
  3. Note: This chart may be embedded in your proposal as a table or spreadsheet file, or attached as a separate document.
  • Answers to concerns about Dayton Soft Products’ overall communications
  1. Three recommendations for securing the web communications—especially addressing internal needs and the growing global needs

Research Assignment

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet).

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

Upload your completed assignment here by clicking the BLUE assignment link above.

6 Discussion- Risk and Control Self-Assessment (RCSA)

 You have been asked by the CIO of the company to justify a need for RCSA policies. What approaches would you use to plan for threats and events that could potentially cause disruptions? Discuss your four reasons why organizations need risk and control self-assessment (RCSA) policies. Explain your answers 

assignment

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it.

Information systems infrastructure Research Paper

 Summary:

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper. 

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • See rubric for more detailed grading criteria 

Some good questions to ask yourself before turning in your research paper: 

  • Is the paper of optimal length? 
  • Is the paper well organized? 
  • Is the paper clear and concise? 
  • Is the title appropriate? 
  • Does the abstract summarize well? 
  • Are individual ideas assimilated well? 
  • Are wording, punctuation, etc. correct? 
  • Is the paper well motivated? 
  • Is interesting problem/issue addressed? 
  • Is knowledge of the area demonstrated? 
  • Have all key reference been cited? 
  • Are conclusions valid and appropriate?

A4

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 3 pages in length. Go through the word document for further details.

IOT security

Some security practitioners suggest that key IoT security steps include: 

1. Make people aware that there is a threat to security; 

2. Design a technical solution to reduce security vulnerabilities; 

3. Align the legal and regulatory frameworks; and

4. Develop a workforce with the skills to handle IoT security. 

Write 700 words in word document about following

1) Address each of the FOUR IoT security steps listed above in terms of IoT devices. 

2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Enterprise Risk Management

 

Chapters 26 through 29 presented four mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Starting with chapter 29, assume that you have been asked to advise the Akawini management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that organization should implement as well to monitor risks outlined in that chapter.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, assume that you have been asked to advise the Akawini (chapter 29) management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that organization should implement as well to monitor risks outlined in that chapter.