IT 345 week 4 discussion

 

Week 4 Discussion

Welcome to Week 4

This week we will explore intellectual property. Most people do not know what intellectual property is, yet it is extremely important. Intellectual property is not specific to large corporations. Rather, individuals can also generate intellectual property. We also explore challenges of new technologies and how they affect copyright laws.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

You will not be able to see your classmates’ posts until you make your first post.

topic

  • What do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect intellectual property?

cloud_computing_week8

 Discussion Topic: Define the advantages and disadvantages of securing cloud-based solutions. 

Paper:

Write a paper on securing the cloud. The following are the items to discuss in the paper:

  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Information system Assignment

Chapter 3 – study questions 1-8, Exercise 2, 4, & 5 (Information Systems for Business and Beyond) Submit the above homework in one document

Title Page

Chapter 3 – Complete the two essay assignments noted below: (Information Technology and Organizational Learning)

Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

Conflict Managment Research Paper

Each student will write an 5-7 page paper on a conflict that he or she experienced in an organizational setting.  The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font.  The organizational analysis will contain the following sections:

  • Background and history that led to the conflict.
  • How/why did the conflict escalate?
  • How was the conflict resolved?
  • What would the student have done differently, based on what he or she has learned in the class?

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

threat-dis

 

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.