Organizational Risk Assessment

 

In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:

  1. Describe when some controls cannot be implemented (such as on a personal laptop).
  2. Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
  3. Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
  4. Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Risk Assessment Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

Discussion 1- Org Behav

Assigned Readings:

Chapter 1. What is Organizational Behavior

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. You are working as a manager of a financial planning office where you require your employees to have a presence on social media. One of your financial advisors posts to his Twitter account that he needs $500 to pay his rent for the month. Would you punish him? Why or why not? 
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] 

 [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

case-study

  • Describe any laws or regulations that may have been violated. 
  • How would you feel as a consumer if your personal information was stolen in this case?
  • How should Target customers be reassured that this won’t happen again?
  • 2 pages

Purpose:

Identify the main information security and privacy protections of the Financial Services Modernization Act of 1999 (Gramm-Leach-Bliley).sites about the attackhttps://www.infoworld.com/article/2609942/target-contractor-says-it-was-victim-of-cyber-attack.htmlhttps://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data

Research Assignment

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

Computer Science Homework

 Remember to review the syllabus expectations for initial discussion posts and peer replies! 

Discuss the following questions: 

1. What is Blockchain’s potential for application in the HR functions of recruitment and selection. 

2. How might Blockchain technology impact job repositories. You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Portfolio Project: Milestone 1: Introduction

Your final project paper is broken down into 3 parts, worth a total of 600 points towards your final grade. This milestone is worth 100 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (2-3 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 3-5 sources from the UC Library.

Review the instructions in the Portfolio Project document first (attached here). Each milestone is a separate writing assignment, leading up to the final submission in week 7.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offense) or failing the course (2nd offense).