IMPACT OF IT -8(b)

 

Find a recent article that relates to a software that has malfunctioned and caused either serious injury, death, or loss of revenue. Summarize the article and discuss whether you believe this will impact the adoption of this type of technology.

Post your reply by Wednesday at midnight. Your response should be at least 250 words and appropriately cite your resources.

Digital Forensics – Data Breach

 

Background:  Assume that there has been a data breach at your organization.  The root cause was one of the following:  Insufficient or weak user authentication, deliberate actions of a disgruntled employee, a server that was missing a critical security patch for 90 days, or a misconfigured SaaS program that was unknown to the IT department.

Topic:  Select one of the possible root causes listed above and write a recommendation to senior management for addressing the problem.  Suggest an immediate action that would need to be taken, then attempt to persuade management to support a project to address the root cause.  Address at least one regulatory reason for action, one ethical reason, and one reason based on industry standards.  Knowing that this effort would be too early for accurate financial numbers for a project, include one paragraph that would address three key financial impacts a project would have on an already fully committed IT budget.

Mechanics:  This portfolio assignment has a target word length of 2,000-2,500 words.  It must be in APA format.  Due to the length, an Abstract is not required.  The word count excludes the Title Page, Reference Section, and any appendices you may desire to add.  A minimum of 3 scholarly resources must be used.  To qualify as a scholarly resource, the resource must be a peer-reviewed article published in a journal in the field related to Digital Forensics.

Killware

2000 words on the topic Killware and how it was countered in the past. Or provide 2000 words on the topic Killware and detailed methodology on how to prevent this problem.

Discussion

How is the management of network security similar and different between on-prem and cloud environments? Give some examples.

Your initial discussion should be 250-300 words. There must be at least two APA formatted references (and APA in-text citation) to support your thoughts in the discussion. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

SECURITY ASSESSMENT & TESTING

Business Case: Local Hospital’s data center

Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.

Where the Local Hospital’s parameters are:  600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations. 

Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.

QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it.  What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?

How can you adapt the principles for your hospital case?

Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 2: Companies should assess threats and develop controls for the most critical assets.

If the threats against tour Hospital IT System are 

Manipulation of software

Unauthorized installation of software

Misuse of information systems

Denial of service

What would be controls that you should apply to mitigate above listed risks?

Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?  

Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

BYOD

  

Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.

Integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

1. Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.

2. Recommend methods organizations can use to address the challenges associated with BYOD policies.

H9

  Download and read the document and answer all questions in the document. Please see attached document H9 & APA Criteria doc.      

Final Assignment

I want you to identify the paper that was the best one of the semesters, and

the paper that was the worst one of all these papers below. You should name

each of them, and provide just a couple of sentences describing why you

choose them. Then use the scholarly search tools we listed early in the

semester to find current papers (2020 onward) on the same two general

topics. For example, if one of your choices is the paper that focused on

Multics virtual memory, you probably wouldn’t find much that is current and

specifically references Multics, but you could certainly find papers on some

aspect of virtual memory. So again, find a current paper on each of those two

topics. Then write the usual summary and reaction for each of them with the

headings. (Note: don’t forget which papers you chose for best and worst.)

Paper 1: Read this paper: Peter Chen, Edward Lee, Garth Gibson, Randy Katz,

and David Patterson, "RAID: High-Performance, Reliable Secondary Storage",

ACM Computing Surveys, volume 26, number 2, June 1994. 

Paper 2: Mendel Rosenblum and John Ousterhout, "The Design and

Implementation of a Log Structured File System", Proceedings of the

Symposium on Operating Systems Principles, 1991.

Paper 3: John Howard, Michael Kazarm Sherri Menees, David Nichols, M.

Satyanarayanan, Robert Sidebotham, and Michael West, "Scale and

Performance in a Distributed File System", ACM Transactions on Computer

Systems, Volume 6, Number 1, February 1988. 

Paper 4: The paper is A. Bensoussan and R. Daley, "The Multics Virtual Memory:

Concepts and Design", Proceedings of the Symposium on Operating Systems

Principles, 1969."

Paper 5: Peter Denning, "The Working Set Model for Program Behavior",

Communications of the ACM, 1968.

Paper 6: Richard Carr and John Hennessy, "WSClock — A Simple and Effective

Algorithm for Virtual Memory Management", Proceedings of the Symposium on

Operating Systems Principles, 1981.

Paper 7: Judy Kay and Piers Lauder, A fair share scheduler, Communications of

the ACM 31.1, 1988

Paper 8: Carl Waldspurger and Weihl William, Lottery scheduling: Flexible

proportional-share resource management,  In Proceedings of the 1st USENIX

conference on Operating Systems Design and Implementation,  1994

Paper 9: Dabek, Frank, et al. "Event-driven programming for robust software."

Proceedings of the 10th workshop on ACM SIGOPS European workshop. 2002.

Paper 10: Rob von Behren, Jeremy Condit, and Eric Brewer, Why Events Are A

Bad Idea (for high-concurrency servers), Workshop on Hot Topics in Operating

Systems, 2003.