Cloud Computing-1

Q1   Define and discuss the uses of IDaaS in at least two paragraphs.  Also, find three IDaaS providers and compare and contrast their  services.

You must include at least one scholarly peer-reviewed article as an APA cited reference.

Q2   Discuss the use of cloud collaboration tools in today’s  geographically diverse environment in at least two paragraphs.  Cite at  least one scholarly peer reviewed article.

Also, compare and contrast two popular video collaboration tools.

qualitative v quantitative risk assessment.

 

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Security Data

Describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? 

Discussion Question

Data governance involves the supervision, monitoring, and control of an organization’s data assets. Its main concerns are data quality, appropriateness, and cost effectiveness of the controls. It is difficult because organizations typically have a lot of old data, which is of unknown quality.

  • Imagine that you must collect and assess the quality and appropriateness of data held by a large, multinational organization. What steps you would take? Include how you would address network, security, and ethical considerations when deciding what data to collect from the company.
  • Explain the kinds of support you’ll need and how you will obtain resources and cooperation. This is not a job you can do on your own!

paper 08/07

IT governance and security culture
                                               

APA format is required – USE THE APA TEMPLATE.

Building on your case project, for week 6 you will research best practices in IT governance and methods for building an IT security culture within the organization. Follow the video links provided and research ITIL and COBIT systems, and determine which may best work for your organization. If your organization already utilizes one of these systems, describe how it has been deployed and what the impacts have been on the organization overall. In addition, following the required reading for this week, evaluate the importance of establishing an IT security culture within your organization and describe your basic plan for getting started. If your organization already employs best practices in security culture, describe what they do and how it works.

Your paper should be 2-3 pages (not including the cover page or final references page), including in-text headings for the topics addressed, and in-text citations matching the references given at the end of the paper.

BSW

In 250 words Common Weakness Enumeration >

CWE-20: Improper Input Validation Score  33.47.  Write a brief overview of their scoring system 

700 word discussion:Please identify, name, and provide a personal brief narrative for each of these 11 main categories from the document attached

  

700 word discussion: Chapter Seven (7): According to the Comparative Analysis of Tools and Technologies for Policy-Making theory, there are 11 possible main categories of Information Communications Technology (ICT) tools and technologies that can be used for policy-making purposes.

Please identify, name, and provide a personal brief narrative for each of these 11 main categories as outlined. 

Identify and name the 11 main categories of ICT tools and technologies

provide a clear narrative for each category above.

Discussion

 

Create a discussion thread to answer the following question:

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device? 

User Domain Policies

 

A tenet of telecommunications says the more people who acess a network, the more valuable the network becomes.  This is called Metcalfe’s Law.  Chapter nine examines different types of users on networks as it reviews an individuals need for access & how those needs can lead to risks.

1. How can the use of security policies reduce risk?

2.  How can a SAP reduce risk?  

3. Why are end-users considered the “weakest” link in regards to implementing security policies and controls?