Report

 

 

  1. Read the Risk Assessment Reports Template.

2. Conduct research as needed to obtain information and support.

3. Complete the Executive Summary section of your report according to the Risk Assessment Reports Template guidelines.

Assignment

 

Week Eleven Assignment

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Database Security

  

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources.  Use the Research Databases available from the Danforth Library,  not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources using APA format. Use the quotes in your paragaphs.

INFORMATION SECURITY

 

(A).examine an organization’s relationship between information security and ISO 27001. Additionally,  students  will examine some of the different types of cryptographic Attacks such as those on social media plaforms.

  1. Understand the importance of articulating an organization’s goals, values and risk position as well understanding how they assist in setting an organization’s materiality standard.
  2. Assess effectiveness of an organization’s information security risk assessment methodologies.
  3. Define the relationship between an organization’s operational informational security requirements and the ISO 27001.

(B).The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 3 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

BI

Discussion: There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Questions: Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

Exercise: 

1. Conduct online research to find at least one new robotics application in customer service. Prepare a brief summary of your research: the problem addressed, technology summary, results achieved if any, and lessons learned.

2. Conduct research to identify the most recent developments in self-driving cars.

Project Part 3: Risk Mitigation Plan

Project Part 3: Risk Mitigation Plan 

Senior management at Health Network  allocated funds to support a risk mitigation plan. They have requested  that the risk manager and team create a plan in response to the  deliverables produced within earlier phases of the project. The risk mitigation plan should address  the identified threats described in the scenario for this project, as  well as any new threats that may have been discovered during the risk  assessment. You have been assigned to develop a draft of this new plan. 

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

Computer Networking Assignement

 

For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic: 

  • Network controller  for 3G/4G/5G mobile and wireless networks

Your submissions will be checked for plagiarism