discussion 2 wk5

 Respond to the following in a minimum of 175 words: 

 

A plan of action and milestones (POA&M) is a living, historical document that identifies tasks that need to be created to remediate security vulnerabilities. The goal of a POA&M should be to reduce the risk of the vulnerability identified.

Describe some of the common challenges with developing and maintaining a POA&M from the standpoint of a CISO versus a CIO.

computer ethics A2

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Statistic Management

Que 1:  

Why is it important to study the internal resources, capabilities, and activities of organizations? What insights can be gained? – 1 page

Que 2: 

Domino’s Pizza was 50 years old in 2010. Visit the company’s business-related website (www.dominosbiz.com) and read the company profile under the “Investors” tab. Does the firm focus on the economic, accounting, or shareholder perspective in the describing its competitive advantage in the profile. Defend/explain your answer. – 1 Page 

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition.  

Network Troubleshooting

 

Discussion Topic

There are common home network problems that you need to explore in your discussion response. Several common issues are:

  • Your home network cannot reach certain areas of your home.
  • Devices cannot see each other on the network.
  • Devices cannot get on the Internet.
  • Devices cannot join the network.
  • Your home network is slow.
  • Your home network connections drop occasionally.
  • Your home network is not secure.

In your original post, pick a common issue above, and answer the following questions:

  • Choose a networking troubleshooting  approach; there are several in the text. Feel free to cover another that  is not listed in the text, as long as it is a suitable network  troubleshooting approach.
  • Why did you choose this networking troubleshooting approach?  
  • Take your networking troubleshooting  approach, and apply it to the issue you chose. Summarize the steps you  would take to troubleshoot the issue. 

Term Paper Cybercrime

 

Instructions

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 5-8 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 8.
  4. In addition to the 5-8 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  10. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

Movement of traditional IT Staff

 

The main focus is on the movement of traditional IT staff.  To facilitate cultural assimilation, IT and non-IT must become more integrated.  What are some strategies to implement to allow this type of interaction to occur?

Note: The first post should be made by Wednesday 11:59 p.m., EST.

Your response should be 250-300 words. 

Homework

  

Please be sure to answer the questions fully and in essay/short answer format. There should not be any 1 or 2 word/sentence responses to any of the questions. Use your own words. Copied answers will NOT be accepted.