FN week 6

Prepare a 4 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

Question 2

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Emerging Threats _ Discussion

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

dd

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Discussion

  • Describe the components and basic requirements for creating a security policy framework.

Key Concepts

  • Key building blocks of security policy framework
  • Types of documents for a security policy framework
  • ISS and information assurance considerations
  • Process to create a security policy framework

Keywords

Use the following keywords to search for additional materials to support your work:

  • Information Assurance
  • Information Systems Security (ISS)
  • IT Security Policy Framework
  • Security Policy

Term Paper

    

Term Paper 

Is the U.S. Government surveillance of citizens ethical?

https://www.wired.com/2007/07/fbi-spyware/

The 35 points available on the term paper will be awarded as follows: 

This paper must follow the same structure as the example provided. (attached document). 

3= Paper is 8+ pages, including the title page (-1 per page short)

1= Your abstract outlines what you will write

1= Your introduction states what you will show (the abstract, reworded) 2= Your introduction outlines the structure of your paper 

3= You identify the ethical actor. I will not go looking for this. I will look exclusively and only in a section entitled “ethical actor” or something similar. If you do not have such a separate section your grade for this part will be 0. This grade is all or nothing – if I find some content that identifies an ethical actor, you get all of these points. 

3= You specify the action being tested for ethics. I will not impute this from your paper. I will read the section entitled “ethical action” or something similar, and as- sign this grade only on words found in that section. If you do not have such a sepa- rate section your grade for this part will be 0. This grade is all or nothing – if I find some content that identifies an ethical action, you get all of these points. 

4= You select your ethical test (the golden rule, the strokes of brilliance of Donald Trump or George W. Bush, etc. are not ethical tests, and you will lose these points if you suggest that they are. Kantian/Utilitarianism/ACM/Cowboy Code/The Class’ are ethical tests. You will not lose points if you select these). Laws, sets of laws, constitutions, and such are also not ethical standards. Nor are tests you find on the internet that call themselves ethical standards, but that do not meet our requirements of specific and objective rules that are enforced disproportionately to produce a good for a group that leads to the good of society. I will not impute your choice. I will read the section entitled “ethical standard” or something similar, and assign this grade only on words found in that section. If you do not have such a separate section your grade for this part will be 0. This grade is all or nothing – if I find some content that identifies an ethical standard, you get all of these points. 

5= You give the specific provisions of the test that you are applying. Hint: If you 

can’t give specifics of the ethical system you are applying, it may not be an ethical system. Also: It is perfectly possible to lose these points, AND the points above, if you select an ethical system that isn’t an ethical system. When in doubt, ACM. I will not impute your provisions. I will read the section entitled “specific provisions of the ethical standard” or something similar, and assign this grade only on words found in that section. If you do not have such a separate section your grade for this part will be 0. This grade is all or nothing – if I find some content that identifies a specific provisions of an ethical standard, you get all of these points. 

6= Connect the action you specified with the provisions of the test you specified. You will have words from the action, above, and the specifics of the test, above, in this section. If you don’t have words from both of the above, and some connection between them, you will not get these points. Merely having them in the same 8 page paper will not be enough. I will not impute your analysis. I will read the sections entitled “analysis – ethical” and “analysis – unethical” or something similar, and assign this grade only on words found in that section/those sections. If you do not have such separate sections your grade for this part will be 0. This grade is all or nothing – if I find some content that connects actions to an ethical standard, you get all of these points. 

5= Argue that the ethical test is satisfied, ie, pro ethical AND argue that the ethical test is failed, ie, con ethical. I will not impute your analysis. I will read the sections entitled “analysis – ethical” and “analysis – unethical” or something similar, and assign this grade only on words found in that section. If you do not have such separate sections your grade for this part will be 0. This grade is all or nothing – if I find both content that argues for a satisfied ethical test, and content that argues for an ethical test that is not satisfied, you get all of these points. 

2= Conclusion: Restate your abstract yet again. 

I will apply an additional penalty of 25 points if the subject does not require a computer (euthanasia, for example). This penalty cannot reduce your grade below 0. If I approved a subject, and you are using that subject, you cannot be penalized in this fashion. 

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

 Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.  

JA2

Students are required to answer the following questions.

  1. What are some of the drawbacks to greed?
  2. How can you combat greed is your own personal / business life?
  3. Is there a way to help others deal with greed?
  4. Ego, greed, or misguided thinking, which is the toughest to combat in your life? In the workplace?
  5. Can you think of other issues that might lead to unethical behavior?
  6. Does culture really care about greed, ego, or misguided thinking? Does it care about ethical behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

RisK Mgt Project part – 2-3 Page

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

 

Task   2: Risk Assessment Plan

 

Task   3: Risk Mitigation Plan 

 

Project   Part 2

Task   1: Business Impact Analysis (BIA) Plan

 

Task   2: Business Continuity Plan (BCP)

 

Task   3: Disaster Recovery Plan (DRP)

 

Task   4: Computer Incident Response Team (CIRT) Plan

 

Final   Project

Risk   Management Plan Final Submission

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

  

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?

Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation? 

Apply: Signature Assignment: SDLC Presentation

 

Refer to Ch. 3, “Pine Valley Furniture Company Background,” in Part One, “Foundations for Systems Development,” of Modern Systems Analysis and Design. In this course, there are weekly assignments incorporating Pine Valley Furniture, and you might use components from the previous week’s assignment to complete future Pine Valley Furniture assignments. 

Imagine this scenario: You work for Pine Valley Furniture. The board of directors is considering launching a WebStore and does not know what is involved in developing a new system. You have been asked to present to the board of directors to help them know what to expect.

Create a 12- to 16-slide presentation directed to the board of directors in which you:

  • Explain the importance of using systems analysis and design methodologies when building an information system.
  • Justify the systems development life cycle (SDLC) implementation, and explain why that’s the best option, rather than the quick and easy process.
  • Summarize the criteria for selecting commercial off-the-shelf software (COTS) presented in Modern Systems Analysis and Design, Ch. 2.
  • Identify additional criteria that are, or might be, used to select COTS.
  • Consider if the choice was between alternate custom software developers rather than pre-written packages.
  • Select appropriate criteria for comparing multiple application custom development bids.
  • Briefly define each of these criteria.
  • Briefly summarize the project management process.
  • Explain which of the 4 project management process phases you think is most challenging.
  • Explain how to mitigate the risks for that stage.

Include speaker notes and media, such as graphics or tables.

Cite any references and graphics used to support your assignment.

Format your citations according to APA guidelines.