Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

CC Week 14 DB

Hello,

i need this paper by 08/12 afternoon.

Strictly No plagiarism please use your own words.

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php) not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism

week 1 Managerial Finance

Part 1: Financial Acumen

Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time.

1. Review at least three (3) articles on financial acuity. Summarize the articles in 400 – 600 words. Use APA formatting throughout including in-text citations and references.

2. Discuss the benefits of establishing solid financial acumen in a company? Discuss your personal experiences in a situation where financial acumen was either not supported as an organizational hallmark or, conversely, was built into the company’s culture.

Part 2: Sarbanes-Oxley (SOX)

Write a 200-word commentary on Sarbanes Oxley and the importance this act has for American businesses today. Your commentary should include the following:

A. Rationale for SOX
B. Provisions of SOX
C. Enforcement of SOX 

B) 3 replies each 150 words

4 discussions due in 24 hours

 4 DISCUSSIONS DUE IN 24 HOURS – 50 WORDS EACH

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 https://youtu.be/WL2YkK5dvkg 

 Research and discuss the advantages and disadvantages of popular browsers available today? 

 

INSTRUCTIONS: 

  • Respond to the following topic in a minimum of 50 words. 

 

Files and Directories

A root directory is the very base of a file system, under which all other directories are sub-directories. The root directory changes for different volumes. In other words, the root directory for the C: volume is different from the root directory of the D: volume because each volume has its own root directory. 

View the below YouTube video which demonstrates working with Windows files and folders.

  https://youtu.be/4-MF7t5KGuQ 

Why should folders be created on a hard drive instead of placing every file in the root directory?

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Protection from Viruses and Other Malware

Click the link below to view the video from TEDTalks  as computer security expert Mikko Hyppönen tells us how we can stop these new viruses from threatening the internet as we know it.  

TedTalk Video: Fighting viruses

It is impossible to ensure a virus or malware never will attack a computer, but you can take steps to protect your computer.

What precautions do you take to prevent viruses and other malware from infecting your computer? 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Would You Connect to an Unsecured Network? 

View the below YouTube video on WiFi (wireless) security.

 https://youtu.be/WZaIfyvERcA 

 What would you do if you found out that someone was using your wireless home network without your permission? How should legal authorities address such abuse? What punishment should violators receive? Should those leaving their networks unsecured receive punishment, too? Why or why not?  

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.

Cryptography

For this project you will solve the problem presented using Figure 7.17 located in our text and write a 2-3 page report that includes the following: 

  • 2-3 pages of content minimum (does not include cover, abstract or references pages)
  • Paper must conform to full APA guidelines to include a cover page, abstract, headers, introduction, body paragraphs with appropriate headings/subheadings, conclusion, and a reference page.
  • All sources must be cited and references. Remember, unless the statement is common knowledge, you must cite and reference your sources. 
  • You must use at least one peer-reviewed source 
  • Ensure you follow academic integrity policies.  

Problem:  You want to build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. Figure 7.17 shows two possibilities, both of which follow from the definition of CBC. Which of the two would you choose and why: 

  1. For security?
  2. For performance? 

You must fully explain your justification and reasoning.

Discussion question CIS

Want to know what movies are showing? Need to find a new place to eat? Kids need help with a school project? Have to fix that leaky faucet yourself? With the internet, the answer is just one click away…ok, maybe two or three clicks (or swipes), but it’s there. The internet has made it far easier to solve problems of all types, big and small.

What types of problems has the internet helped YOU solve? Choose one of the topics below. Then, identify a problem you faced and explain how you were able to solve it using resources available on the internet.

  1. Personal Development and Improvement
  2. Do-It-Yourself
  3. Entertainment or Travel
  4. Workplace or Job Hunting