Payroll(casestudy)

  

Case Study:

You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.

Right Wing Web sites

Hide Assignment Information

Turnitin®

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Instructions

In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. What are the primary purposes of right-wing hate Web sites that use images, music, games, and the like to spread their propaganda?

2. Identify and explain situations where search and seizure is possible without a warrant. Please describe the limitations.

Due Date

Oct 11, 2020 11:59 PM

Cyber Security Lab – Shellshock

Please narrate and stake screenshots while doing lab like it says in instruction in PDF

This lab will be done in the SEED lab VM. (Lab pdf, notes, and c code file attached.)

  • Shellshock
  • Environment variables
  • Function definition in Bash
  • Apache and CGI programs

Note: You may need to change void main() to int main() in the C code.

The submission is a lab report that includes screenshots of the steps and a narrative of what is happening.

There are two submissions in case anything goes wrong with the first.

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

financial measure

 

(1) Identify and describe one of the financial measures of profitability, liquidity, efficiency, and leverage.

2) How can an analyst use one of these financial measures to evaluate the financial condition of a corporation?   

Practical Connection Assignment

     

Writing Skills, Grammar, and APA Formatting

Assignment strongly demonstrates   graduate-level proficiency in organization, grammar, and style. 

  Assignment is well written, and ideas are well developed and explained. Demonstrates   strong writing skills. Student paid close attention to spelling and   punctuation.  Sentences and paragraphs   are grammatically correct.  

 

Proper use of APA formatting. Properly and   explicitly cited outside resources. Reference list matches citations.

 

Maintains purpose/focus

Submission is well organized and has a tight   and cohesive focus that is integrated throughout the document 

 

Understanding of Course Content

Student demonstrates understand of course   content and knowledge. 

 

Work Environment Application

Student strongly demonstrates the practical   application, or ability to apply, of course objectives within a work   environment.

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).