Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course (security architecture and design) have been applied, or could be applied, in a practical manner to your current work environment. If you are not current working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Cyber law
On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass.
Service Delivery Models
Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.
Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand-alone quotes will not count toward the 3 required quotes.
Write in essay format, not in bulleted, numbered, or other list formats
CASE STUDY
As a team, pick one of the following department in your organization:
· Computer Operations
· Accounting
· Marketing
· Payroll
· Sales
· Distribution
· Human Resources
· Purchasing
· Service (i.e., Vehicle Maintenance)
· Administration (i.e., Executive Branch)
Requirements:
Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.
After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.
Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.
To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.
Deliverables:
Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.
All answers must be in the provided answer sheet.
Questions (1-7) are from Chapter 4 in textbook:
1.E4.6a
2.E4.6b
3.E4.6c
4.E4.6d
5.E4.6e
6.E4.6f
7.E4.6g
cloud computing 5
Continuing on the same path as last week, you will revisit the AWS training to start and complete AWS Cloud Practitioner Essentials (Second Edition): AWS Integrated Services module.
It will take approximately 100 minutes. Once complete, return to Week 5 discussion and (a.) tell us what you learned that you found interesting about the content. (b.) Discuss how these services work together and finally, (c.) go to another student’s post and ask a question related to their post. You must also answer a question(s) pose to you by myself or another student. Enjoy!
risk management strategies
Compare s and explain a risk management strategies situation in school life or in life where you applied risk management strategies.
Provide enough details so your classmates understand the situation and risk strategy employed.
Choose two of situation and risk strategies and offer a suggestion on how using controls could mitigate certain risks.
Discussion
Operations Security – Risk management policies
Scenario :
“You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from the speakers.”
Discussion Question:
- What is the first possible diagnosis that comes to your mind?
- What is the first step you would take in this situation?
- What is the second step that you would take in this situation?
CC W 14 A 1
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Requirements:
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.