Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 

ITM capstone – Discussion 3

Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly? 

Response should be in 250 words. Indicate at least one source or reference in APA format.

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words

What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

BSWP Week 3

 

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words.

RM DISCUSSION-9

 Discussion: Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now).

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

Topic:

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

Paper

 

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

(2) C++

 Trace the C++ program below showing all output in the order that it is displayed. If anything happens that makes it impossible to accomplish an operation or the results of so doingare unpredictable, describe what happens and abort the program at that point. Assume the Stack class is fully defined in an appropriate header and implementation file. The effect of the functions (methods) is as follows: constructor – creates an empty stack empty – returns true if the stack is empty, false otherwise push – adds the specified element to the top of the stack display – displays every stack element on the specified stream, top to bottom order pop – removes the top element of a stack; attempting to pop an element from an empty stack causes an error condition and immediately terminates the program. top – returns the top element of the stack but does not remove it boolalpha – a flag that causes the words true or false to be displayed for a bool variable 

 #include

using namespace std;

#include “Stack.h”

int main(void)

{int jimmy_carter, bill_clinton;

 jimmy_carter=0;

 Stack george_w_bush;

 for (bill_clinton=17; bill_clinton>13; bill_clinton–)

 {george_w_bush.push(bill_clinton%3*2-2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 george_w_bush.push(george_w_bush.top()+2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 cout<<"Contents of george_w_bush "<

 george_w_bush.display(cout);

 cout<<"jimmy carter is "<

 }

while (!(george_w_bush.empty()))

 {cout<<"popping "<

 jimmy_carter=jimmy_carter-george_w_bush.top();

 george_w_bush.pop();

 cout<<"popping "<

 george_w_bush.pop();

 cout<<"Contents of george_w_bush: "<

 george_w_bush.display(cout);

 cout<<"jimmy_carter is now "<

 }

cout<<"at end jimmy_carter is "<

cout<

“<

 return 0;

}