Cybersecurity Program Maintenance

Create an actionable plan including executive level support and budget allocation to ensure security controls can be rapidly updated and expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

Procedures to track performance

Procedures to monitor and measure performance for areas of improvement

Procedures to identify new threats, vulnerabilities, or any countermeasures

Procedures to obtain feedback on the effectiveness of policies

Procedures and technical tools to monitor the internal and external environment

Procedures for budget allocation

Procedures to catch any oversights

Discussion: Blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

300 words with a minimum of 2 references in APA style

Discussion 4 Info tech import strat plan

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Signature Assignment: Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

Complete the following in your outline: 

  • List the tools used for backup purposes. 
  • Explain the following: 
  • Where employees should work from that day 
  • How employees can get to their data 
  • The communication methods about updates 
  • Outline step-by-step instructions to recover your databases and telecommunications. 
  • Provide a step-by-step guide to recover and provide any additional company assets. 
  • Discuss policies for backup media storage. 
  • Discuss policies for encryption of backup data. 

Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines. 

Week 4 discussion 2

Respond to the following in a minimum of 175 words: 

  • Choose one of the control families described in FIPS 200 and describe how a security policy would be written to address that control family. 
  • Discuss the primary components of the security policy with respect to the security requirements described within the control family.

ITM Capstone

 You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Access control Assignment 8

Discuss the best practices for access control for information systems and how implemented by business.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Organizational Leadership and Decision Making 6

Discussions

1. Review chapter 21 in the course text. In your own words, discuss the future of information delivery.

2. What are some of the information you learned in this class? What topics did you find challenging?

Case Study

1. Read the Project Management at Genex Fuels Case Study on pages 333 to 335 in the textbook. Answer the Discussion Questions at the end of the Case Study.

References must be provided individually at the end of every question.

Case Study- Assignment

Please go through the Attachment for the case study and provide a 2-3 page report, analyze the case between the FBI and Apple. There is a lot of information on this so you will need to review what you have learned so far in this course as well as perform external research. Here are several links as a starting point:

· https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute

· https://en.wikipedia.org/wiki/2015_San_Bernardino_attack 

· https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html

· https://mashable.com/2016/02/19/apple-fbi-san-bernadino-iphone/

· https://www.digitaltrends.com/mobile/apple-encryption-court-order-news/

Your report should address the following sections: 

1. Imaging an i0S device – Provide a refresher on how you would handle the imaging of the device and prevent a potential third party from accessing the device (e.g. via Apple iCloud) in order to frustrate your efforts. 

2. Accessing a Locked iOS Device – After you have done your research on the case and the challenges the FBI faced please summarize the methods and challenges used in this regard. 

3. Challenges of an Encrypted iOS Device – You have learned that Apple does a very good job with its encryption. Can you review your notes as well as the research about this case then summarize known barriers when trying to access encrypted data? 

4. Other Methods of Access – Let’s assume you are unable to unlock the access. Are there other methods that you could consider gaining valuable forensic evidence? Do you know what attempts the FEBI tried in this case study? How reliable are these methods and are they admissible in court? 

5. Final recommendations – Now that you have researched and analyzed this case, think of how you would have approached this case if you were attempting to unlock the iPhone. Include a step-by-step plan that you would have employed to access the data. Support your plan with academic research that points to its viability. You do not need to test your solution, nor does it need to necessarily be correct as there’s no way to know for sure. However, it must be logical, well-reasoned, and supported by evidence. 

casestudy_0613

 
Answer this question: Are today’s ClOs responsible for figuring out how to handle the total digitization of their enterprises? What is their strength in directing this endeavor?  

study material pdf attached 

Please refer the word document and do the work in the same format 4 pages