Create a report documenting various aspects of how risk management impacts the business m

Assignment: Risk Management in a Business Model

Learning Objectives and Outcomes

  • Create a report documenting various aspects of how risk management impacts the business model.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.

The task is due over the weekend.

You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements. 

Assignment Requirements

Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

Final Project: US Naturalization Practice Test

Please note: It is just a given in our industry that your code has to run! If your code does not run, you will not receive any points.

You will be creating a PHP-driven web site that is a practice quiz for people taking the civics portion of the United States Naturalization Test. There are 100 possible questions for this portion of the test; however, in practice applicants are given only 10 questions, chosen randomly. An applicant must answer 6 out of 10 questions correctly to pass the civics portion of the naturalization test.

Your task is to use the 100 sample questions provided in the official Civics (History and Government) Questions for the Naturalization Test document. (Dr. Alfaro will provide a PHP code snippet with two arrays, one of questions and one of answers, which you may use.) Your application should display ten questions at random along with a text input box for each answer. The user should be able to input a short answer, and the script will compare the user’s answers against the correct answers. Be sure to convert any special characters to HTML!

When checking for correct answers, CASE SHOULD NOT MATTER. Also, your code should check to see if the answer string is included anywhere within the answer. So, if a correct answer is “Constitution”, any of the following answers should score as correct:

  • the constitution
  • our Constitution
  • The Constitution is the supreme law of the land
  • CONSTITUTION

It is up to you how you want to store and retrieve the questions. However, your project must meet these minimum requirements:

  1. Displays 10 questions chosen at random (by the PHP; not by you!) and ten corresponding text boxes for short answers.
  2. When the user submits the test, the user will see their grade and whether they passed or failed the practice exam (60% is passing). It will also indicate which questions the user got wrong so they can go back and study!
  3. Upon submission, the page should also display a date-time stamp stating when the exam was submitted.
  4. Your code must include an array, and this array must actually be used to create the quiz. (No creating an array that is never accessed!)
  5. Your code must contain a PHP include to show that you know how to do this.
  6. Your code must contain at least one function that is actually utilized in the application.
  7. Your code must utilize at least one loop (for, while, do-while, or foreach).
  8. On the page which displays the user’s score, there should be a link or button that allows the user to go back and take the quiz again with a new set of 10 random questions.
  9. Use semantic HTML code and best practices (an h1, at least one h2, alt text for images, etc.).
  10. Add CSS as appropriate to make this a professional-looking portfolio piece. (We may be showing this to clients in the capstone next term!)

NO SQL!! DO NOT USE SQL. 

ONLY PHP, HTML, and CSS

Submit your completed file final-yourlastname.tar.gz below. 

Assignment and memo

 

1.Assignment

  • identify and apply the different analysis and design methods for business applications;
  • operate effectively within a team environment demonstrating team building and project management skills in information systems analysis and design; and
  • communicate information effectively in presentations with oral, written and electronic formats using media formats widely adopted for information systems development in business and government.

Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C).

The idea is to create a worksheet that can be applied to any set of alternatives.

Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and

the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.

Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).

Order # 12527

Title: Network Installation

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine your cousin, Frank, just bought a small hardware store. He wants to install a network that will include 14 PCs; a printer, scanner, and fax combination; and a cable modem line that are all currently configured as a P2P network. Frank is on a tight budget, so he would like to do the work himself. He has been conducting research and cannot decide if he should install Cat5, Cat6, or fiber. He has asked you to help with his decision.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Then, using research you conduct on the Internet and the lab activity as references, write a 3–5-page report in which you make recommendations to Frank. Address the following:

•Compare and contrast the different cabling standards.

•Discuss the cost benefits of client/server networks.

•Define the basic concepts of network cabling.

•Recommend a network to Frank based on your research.

•Apply the concepts from the practice lab activity for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

Discussion

 After reading chapter 13, analyze the advantages and disadvantages of digital signatures, please write one page(body) in APA format.

1 page in APA 6th Format Operational Excellence

1 page in APA 6th Format, no Plagiarism with at least one scholarly (peer-reviewed) resource.

Reflect on a below key concepts :

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Security controls

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Security breach

Review a Security Breach which occurred over the past year and present a research paper providing the below point!! 

Describe the incident

Provide Specifics about the incident.

What data or information was impacted?

Describe threat modeling techniques which could have assisted in the mitigation of breach.

How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references and 650 words

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.