Discussion

 1. Discussion

Multilayer User Access Control

Learning Objectives and Outcomes

  • Identify what implementation method(s) can be used to incorporate multilayer access control
  • Describe and how each method benefits multilayered access control.

Assignment RequirementsRead the worksheet named “Multilayer User Access Control”(ws_multilayeraccesscontrol) and address the following:Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control. 

Discussion question, 350 words and 2 references.

Communication and Team Decision Making

Part 1: Sharpening the Team Mind: Communication and Collective Intelligence

A.    What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster?

B.      Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss  measures that might have prevented problems from arising within each team’s communication system.

Part 2: Team Decision-Making: Pitfalls and Solutions

A.    What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink? 

B.    Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals?

data science and bigdata analytics

data science and bigdata analytics  Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Research Paper on COSO framework

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

 The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program. 

CORE COMPETENCIES

  Write a 4-5 page paper (deliverable length does not include the title and reference pages) 

  • What are the core competencies of two competing companies and how are they similar / different?
  • What steps could each company take to improve and strengthen their core competencies to increase its current market share?

Wk 4 – Apply: Controls, Protocols, and Threats

Assignment Content

  1. Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.

    Create an 8- to 10-slide multimedia-rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:

    • What do they protect against?
    • What is their purpose?
    • Write a 2- to 3-page analysis of your findings answering the following questions:
    • How are controls or protocols implemented to defend against attacks and to limit risk?
    • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
    • What controls and protocols would you find in a security policy?
    • WARNING – There are two assignment in one for this week, the presentation and written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.  

      Presentation checklist:

    1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    2. Consistent fonts and font sizes throughout the presentation 
    3. Use colors and background. No black and white presentations.  
    4. Include at least one references that are properly cited 
    5. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 
    6. Include speaker notes for every slide except title and reference pages. 
    7. Did the use slides to convey ideas and handouts to communicate details?  
    8. Did the slides follow the golden rule of one idea per slide?.  
    9. Did the slide titles convey the key message of each slide? 
    10. Did the visual diagrams to convey the concepts in a simple, clear, and memorable way? 
    11. Can the charts be understood in less than 5 seconds? 
    12. Did the pictures add clarity to the message the slides  
    13. Did the presentation build curiosity in the audience by revealing information in stages?  
    14. Did the presentation repeat the agenda slide as a guidepost to review your points periodically? 
    15. Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?  
    16. Are the slides clearly readable from the last row in the room?  
    17. Consistent fonts and font sizes throughout the presentation?

      In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet. 

      Assignment checklist:

    18. The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count) 
    19. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    20. Include at least one references that are properly cited 
    21. Any images must have a caption and referenced in the paper. 
    22. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 
Preview the document

Project Phase 3

 

Unit 3 Project Phase 3 Downloadable InstructionsPreview the document

Congratulations, you have set up a new network in a rural area that  will be serving a small neighborhood. Your network currently consist of 6  houses but is expected to grow to include all of the 500 houses in your  area. The only other network alternative to your system is satellite  networking which is very slow and prone to outages. You will be  providing both cable TV and internet access through your network so make  sure you are providing enough speed in your network for your customers.

You will be using the following packet tracer file:s

Cable_HomeNetwork.pkt

DSL_HomeNetwork.pkt

Tier1Network_OL.pkt

Download the project instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_Project_Phase_3.  Submit the  document with the screenshots using the upload instruction. 

physcial security

 

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.