Assignment

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

 Article:

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help  Achieve GDPR Compliance. 2019 14th Iberian Conference on Information  Systems and Technologies (CISTI), pp. 1-6. https://ieeexplore.ieee.org/document/8760937?arnumber=8760937

From your research, discuss whether or not your organization has  ISO 27001 certification. Outside of overall protection from  cyber-attacks, describe, in detail, some other benefits your  organization will achieve in obtaining this certification. If your  company does not have this certification, how can they go about  obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

 A substantive post will do  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Week 6 Discussion Data Visualization

Initial Post

Data representation is the act displaying the visual form of your data. The process of identifying the most effective and appropriate solution for representing our data is unquestionably the most important feature of our visualization design. Working on this layer involves making decisions that cut across the artistic and scientific foundations of the field.

Here we find ourselves face-to-face with the demands of achieving that ideal harmony of form and function that was outlined in Chapter 6Data Representation. We need to achieve the elegance of a design that aesthetically suits our intent and the functional behavior required to fulfill the effective imparting of information.

According to Kirk 2016, in order to dissect the importance of data representation, we are going to “look at it from both theoretical and pragmatic perspectives.” Choose three of the storytelling techniques (Pages 161 – 209) in which data is presented and stories are being interpreted. Discuss the importance and the advantages of using these techniques. Provide an example of each technique.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Reply Post

When replying to a classmate, offer your opinion on what they posted as the important advantage of each technique. Also, are the examples, in your opinion, relevant and usable? 

IT Contracts

In 175 words or more research and discuss criteria to evaluate IT suppliers and contracts. What are the most important things you think must be considered? How might you use this information in your organization or an organization at which you would like to work?

case study

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

Discussion : Global Wireless

We looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

note minimum of 250 words.  At least one scholarly source should be used 

Week 4 Research Paper: ERM Strategy

  1. The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.
    Your paper should meet these requirements: 

    • Be approximately four to six pages in length, not including the required cover page and reference page.
    • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

  

1. Watch the following two videos:  https://www. youtube.com/watch?v=GHc63Xgc0-8 and  https://www.youtube.com/watch?v=ggN8wCWSIx4 for a  different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more  likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply  for many jobs?

2. Conduct research to identify the most recent develop-ments in self-driving cars.