Discussion 3

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

research

 

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios:

THE SUBJECT: Texas Department of Criminal Justice

Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)

Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations

Scenario C: A campaign group looking to influence the debate about the ending of capital punishment

Website reference: Executed Offenders dataset

Assignment Link: http://book.visualisingdata.com/chapter/chapter-3

1 page in APA 6th Format on leadership

1 Page in APA 6th format with at least one scholarly (peer-reviewed) resource should be used, reflect on the following topics.

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.
  3. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

Risk Assessment

As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Risk Assessment.  The overall cybercrime risk assessment can be outlined with a minimum of two to three sentence descriptions of what the outline will cover under each section.

  • Ensure that you provide information for three specific risks for each section. For example, three High, three Medium, and three Low.
  • You will want to take into consideration that HU Financial Firm is a legal firm. 
  • Items to think about would be the possibility of a natural disaster occurring or a cybercrime attack. 
  • You will want to rank the possibility of an incident happening from high to low as identified in the sample template in this section, which has been provided for you.
  • Additional information can be reviewed under the course reference links and research on the internet.

PLEASE USE THIS INFORMATION TO FILL OUT ATTACHED DOCUMENT.

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following:  

Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive  incident. Discuss the challenges that organizations without proper Work Area Recovery Plan may face when disruptive events arise.

What are the benefits of performing Pandemic risk assessment in an organization?

The post should include adequate citations and references that adhere strictly to the APA format.

Organ Leader and decision making PHDIT

 

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Regarding big data 2 pages 500 words

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Discussion

 

A typical DMZ is a network virtualization schema when a particular network connects to at least two different networks with different security levels. 

What would be the Cloud Based DMZ Architectures’  Challenges? Support your answer with Examples