Practical Connection Assignment

 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Wk 1 – NIST Publications and Outcomes

 2 Part question is below both need to be completed

Assignment Content

  1. Part 1
    The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

    Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

    Include the following column headings: 

    • SP number 
    • SP name  
    • SP purpose
    • Include the following row headings: 
    • SP 800-30 
    • SP 800-34 
    • SP 800-37 
    • SP 800-39 
    • SP 800-53
    • Part 2
      You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

      Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

      Cite all sources using APA guidelines. 

      Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

computer ethics

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Response Required Discussion cloud

Please read the below discussion posts and provide response in 75 to 100 words

Post#1

 

Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance  of  IT  auditing  and  especially  cloud  computing auditing  is  an  essential  effort to  ensure  the  proper  functioning processes  of  an  the organization’s  IT  systems,  management, operations, and  related  processes,  to  avoid  fraudulent,  in  order to  have  comprehensive  and  accurate financial view of their business” (Moghadasi, 2018).

The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).

The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).

The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).

Post#2

 

Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.

The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control.  The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.

The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.

The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.

Questions

Please provide each answer in two separate word documents

1. 500 words 

Write a 2 Page description of the types of threats that could be launched, or have been launched, against your organization. Describe what measures you would recommend for cloud security and disaster recovery.

Use APA (7th Edition) format.  In addition, include a Cover Page and a Reference Page.  Please use a minimum of three References.

2.  500 words

Provide a reflection of how the knowledge, skills, or theories of Organizational Leadership have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Informative Essay Final Draft

 Informative Essay Final Draft on OBAMA

Due: Sunday, October 3 2020

RENG 92

OBAMA

1.  https://www.whitehouse.gov/about-the-white-house/presidents/barack-obama/ 

2. https://www.cnn.com/2020/09/17/media/barack-obama-promised-land-memoir-trnd/index.html

3.https://www.cnn.com/2017/01/18/politics/obama-final-news-conference/index.html

4.https://www.nbcnews.com/news/us-news/president-obama-faces-white-house-press-corps-one-last-time-n708391

To begin, review the feedback provided for your submitted introduction paragraph. Next, make the suggested changes and develop a 3-page  informative essay typed in MLA Format that proves your thesis statement (last sentence in the introduction paragraph). Please note: the works cited page is page three!!

Please make sure your essay includes the following:

  • MLA Format Throughout (Size 12 Font, Times New Roman, Double Spacing, Title, Heading, and Page Numbers)
  • Strong Thesis Statement (Start with a transitional word or phrase–last sentence in the introduction paragraph)
  • Start each body paragraph with a transitional word or phrase and include text support in at least 3 body paragraphs, per MLA Format
  • Topic sentences that support the thesis statement and supporting details in each body paragraph
  • Start the conclusion paragraph with a transitional word or phrase and summarize the main points within the essay
  • No use of, ” I”  “You”, or “We”
  • No contractions

Finally, please remember to proofread your submission!

No late submissions !!!!

Privacy and Security Considerations for Information Governance

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Initial post due Thursday

Discussion question, 350 words and 2 references.

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Alternate Instruction for Microsoft 365 Apps icon

excel work ….. edit excel document ……. do today…… 5 hours……

due in 5 hours…… no late work…… 

Edit the excel attachment following the directions below.  Upload when finished so i can turn in

Do the following: 

  1. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
  2. Rename Sheet1 and change the color of the sheet tab.
    1. Right-click on the Sheet1 tab, choose Rename, and type: WF300
    2. Press Enter.
    3. Right-click the sheet tab again, point to Tab Color, and select Blue, Accent 1 (the fifth color in the first row of theme colors).
  3. Make a copy of the WF300 sheet.
    1. Right-click the sheet tab and select Move or Copy… to open the Move or Copy dialog.
    2. In the Before sheet box, select Sheet2.
    3. Check the Create a copy check box.
    4. Click OK.
  4. Name the new sheet WF301 and change the tab color.
    1. Right-click the new WF300(2) sheet tab, choose Rename, and type: WF301
    2. Press Enter.
    3. Right-click the sheet tab again, point to Tab Color, and select Green, Accent 6 (the last color in the first row of theme colors).
  5. Group sheets WF300 and WF301 so you can apply formatting changes to both sheets at once.
    1. Click the WF300 sheet tab, press and hold Ctrl, and click the WF301 sheet tab. Now any changes made to one of the sheets will be made to both sheets.
    2. Verify that Group appears in the title bar, indicating that the selected sheets are grouped.
  6. Resize column A in both worksheets at once to best fit the data by double-clicking the right border of the column heading.
  7. Add a header and footer to both worksheets at once.
    1. Switch to Page Layout view by clicking the Page Layout button on the status bar.
    2. Click in the center section of the header.
    3. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the File Name button. The code &[File] will be entered in the center section of the header. Once you click somewhere else, this will display the name of your file.
      Alternate Instruction for Microsoft 365 Apps icon On the Header & Footer tab, in the Header & Footer Elements group, click the File Name button. The code &[File] will be entered in the center section of the header. Once you click somewhere else, this will display the name of your file.
    4. Click in the right section of the header and type your own name.
    5. On the Header & Footer Tools Design tab, in the Navigation group, click the Go to Footer button.
      Alternate Instruction for Microsoft 365 Apps icon On the Header & Footer tab, in the Navigation group, click the Go to Footer button.
    6. Click in the center section of the footer.
    7. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the Sheet Name button. The code &[Tab] will be entered. Once you click somewhere else, this will display the name of the sheet.
      Alternate Instruction for Microsoft 365 Apps icon On the Header & Footer tab, in the Header & Footer Elements group, click the Sheet Name button. The code &[Tab] will be entered. Once you click somewhere else, this will display the name of the sheet.
    8. Click in the right section of the footer.
    9. On the Header & Footer Tools Design tab, in the Header & Footer Elements group, click the Current Date button. Once you click somewhere else, this will display the current date.
      Alternate Instruction for Microsoft 365 Apps icon On the Header & Footer tab, in the Header & Footer Elements group, click the Current Date button. Once you click somewhere else, this will display the current date.
    10. Click in any cell of the worksheet and click the Normal button on the status bar.
  8. Ungroup the sheets by clicking Sheet2. Verify that the same formatting was applied to both sheets and that they are now ungrouped.
  9. Apply the Gallery theme to the workbook.
    1. On the Page Layout tab, in the Themes group, click the Themes button to display the Themes gallery.
    2. Notice that as you hover the mouse pointer over each option in the Themes gallery, Excel updates the worksheet to display a live preview of how the theme would affect the worksheet.
    3. Click the Gallery option.
  10. Select the WF300 sheet. It can be difficult to work with such a wide worksheet. Scroll to the right to see the end of the semester, and you can no longer see the student names. Split the screen into two views of different parts of this worksheet.
    1. Click cell D1. On the View tab, in the Window group, click the Split button. Now you can scroll each pane separately, but it is all still the same worksheet. You can drag the split bar to the right or left as needed.
    2. Scroll to show the student names and the last few weeks of the semester on your screen.
    3. Click the Split button again to return to normal.
  11. Insert a new row to add a new student to the list.
    1. Right-click on the row heading for row number 9 and select Insert.
    2. Click the Insert Options button that appears immediately below where you right-clicked, and select Format Same As Below.
    3. Enter the new student name: Abrams, Maria
    4. Enter her student ID #: 1350417
  12. Select the WF301 sheet. Because this sheet was copied from the WF300 class worksheet, the student names and ID numbers are not those of the students in WF301 class. Copy the student data from Sheet2, and then hide Sheet2 when it is no longer needed.
    1. On sheet WF301, select cells A9:B29. Press Delete to delete the content.
    2. Go to Sheet2 and copy the student names and ID numbers from cells A2:B20.
    3. Paste the copied names and ID numbers to cell A9 in the WF301 sheet.
    4. Hide Sheet2 by right-clicking on the sheet name and selecting Hide.
  13. Mary Wahl has decided to drop the class. Remove her from the WF301 class roster.
    1. On worksheet WF301, delete the entire row for Mary by right-clicking on the row heading for row number 25 and selecting Delete.
  14. Use the Freeze Panes option to keep rows 1:8 and columns A:B visible at all times.
    1. Verify that the WF301 sheet is selected, and click cell C9.
    2. On the View tab, in the Window group, click the Freeze Panes button, then click the Freeze Panes option.
    3. Verify that you selected the correct point at which to freeze panes. Scroll down and to the right. Are rows 1:8 and columns A:B visible regardless of where you scroll?
  15. There is an extra blank worksheet in the workbook. Right-click Sheet3 and select Delete.

Modify sheet WF301 to print as an attendance sign-in sheet.

  1. First, hide the student ID numbers by right-clicking on the column B heading and selecting Hide.
  2. Set the page layout options.
    1. On the Page Layout tab, in the Page Setup group, click the Orientation button, and select Landscape.
    2. On the Page Layout tab, in the Page Setup group, click the Margins button, and select Narrow.
    3. On the Page Layout tab, in the Scale to Fit group, expand the Width list and select 1 page, and expand the Height list and select 1 page.
    4. On the Page Layout tab, in the Sheet Options group, click the Print check box under Gridlines.
  3. Print only the part of the worksheet to use as the attendance sign-in sheet.
    1. Select the appropriate cells to print as an attendance sign-in by selecting cells A1:C26.
    2. Click the File tab to open Backstage view, and then click Print to display the Print page.
    3. Under Settings, click the Print Active Sheets button to expand the options, and select Print Selection.
    4. If your instructor has directed you to print the attendance sign-in list, click the Print button.
    5. Click the Back arrow to exit Backstage view.

At the end of the semester you will need to print all the attendance records to turn in to the administration office. Let’s set this up for the WF300 class worksheet.

  1. Select the WF300 worksheet, and hide the attendance sign-in column by right-clicking the column C heading and selecting Hide.
  2. Modify the worksheet so column A and rows 1 through 8 will print on every page.
    1. On the Page Layout tab, in the Page Setup group, click the Print Titles button.
    2. Click in the Rows to repeat at top box, and then click and drag with the mouse to select rows 1:8. When you release the mouse button, you should see $1:$8 in the box.
    3. Click in the Columns to repeat at left box, and then click with the mouse to select column A. When you release the mouse button, you should see $A:$A in the box.
    4. Click OK.
  3. Preview how the worksheet will look when printed and make adjustments from the Print page to keep the report to four or fewer pages.
    1. Click the File tab to open Backstage view, and then click Print.
    2. If necessary, click the Print Selection under Settings and select Print Active Sheets. Click the Show Print Preview button.
    3. Note that the current settings will cause the worksheet to print on five pages.
    4. Under Settings, click the Portrait Orientation button and switch to Landscape Orientation instead.
    5. Under Settings, click the Normal Margins button, and select Custom Margins… to set your own margins.
    6. In the Page Setup dialog, on the Margins tab, change the Top, Bottom, Left, and Right values to 0.5 inches. Click OK.
    7. Under Settings, click the No Scaling button, and select Fit All Rows on One Page.
    8. Click the Back arrow to exit Backstage.
  4. Modify the worksheet page breaks so weeks 1-8 print on the first page and weeks 9-16 print on the second page.
    1. If necessary, scroll to the right so columns T:V are visible. Note that the current page break occurs between columns U and V (after week 9).
    2. Click cell T1.
    3. On the Page Layout tab, in the Page Setup group, click the Breaks button, and select Insert Page Break. This inserts a page break to the left of the selected cell (after week 8).
    4. Click the File tab to open Backstage view, and then click Print to preview how the change will affect the printed pages.
    5. If your instructor has directed you to print the worksheet, click the Print button.
    6. Click the Back arrow to exit Backstage view.
  5. Save and close the workbook.