Software Information Assurance CS661

Add 3 pages of original research update table of contents and add to and exiting document 

APA format 3 additional references 

must include a turn in report

due in 15hrs

topic will be Security Standards for Development and Deployment

Project Management – Disussion

 1. Describe trade-offs that may need to be made among project stakeholders’ priorities. How would you address these trade-offs as a project manager?

2. List and describe at least three common quantitative risk analysis techniques. Under what circumstances would you find each one useful? 

Portfolio Project 3

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.  

Research paper

  

Question 1) Summarize what you have learned in your coursework about your special area. Be sure to discuss how the literature interacts with your own experience on job if any

  

Question 2) Choose a topic in your area of specialization ( blockchain, cybersecurity or forensic) and describe whether a qualitative or quantitative research study would be more appropriate.

Question 3 ) identify and explain three IT leadership models and how each can positively influence behaviors in an organization. 

The answers for each question  should be more than 750 words  need to concentrate on goals from the courses infotech import from strat plan, Emerging threats and countermeasures, infotech in the global economy, information governance, enterprise risk management, and Data Science & Big data Analysis

Requirements Management

 

Choose one of the research areas under the Trends in Requirements Management in Chapter One of the Wiley Guide to Project Technology, Supply Chain and Procurement Management. Those trends include:

  • Data Processing and Modeling
  • Increasing Formality
  • Viewpoints
  • Goal-oriented requirement elicitation
  • Nonbehavioral requirements
  • Scenarios

In this paper, provide the reader the following for your chosen trend:

  • Introduce information on the trend
  • What research has been done in this trend
  • What exciting new outputs may be derived from this research that could add to how we gather requirements
  • What is next for this trend e.g. further questions to be answered, efforts to use some of the knowledge derived from the research in projects, etc.

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: [8 pages (not including cover & references pages)
  • Citations Required: Minimum 0f 5 citations (2 Scholarly and three from other legitimate resources)

Database security

  

Describe in 500 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Exp22_PowerPoint_Ch03_CumulativeAssessment_IT_Careers

Exp22_PowerPoint_Ch03_CumulativeAssessment_IT_Careers

  

Project Description:

As the department chair of Information Technology at the college, you often give presentations on IT Careers to potential students. You have been asked to to update the presentation with recent data on the programs you offer at the college that will prepare students for a career in IT.

     

Start PowerPoint. Download and   open the file named Exp22_PPT_Ch03_CumulativeAssessment_IT   Careers.pptx. Grader has automatically added your last name to the   beginning of the filename. 

 

Insert a Title and Content   layout slide after Slide 1. Type Jobs in IT in the Title Placeholder.
 

  Insert a Trapezoid List SmartArt graphic in the content placeholder. Type the   following in the Text pane as first level bullet points. Remove any unneeded   bullet points in the Text pane.
 

Software   applications developer
Information   security analyst
Computer   systems analyst
Database   administrator
Computer   network architect
Management   analyst

 

Apply the Moderate Effect   SmartArt style. Change the color to Colorful – Accent Colors.

 

On Slide 4, insert a two column,   seven row table in the content placeholder.
 

  Type the following information into the table:
  Row 1: Col 1: Profession; Col 2: Salary Per Year
  Row 2: Col 1 Software applications developer; Col 2: $103,560
  Row 3: Col 1: Information security analyst; Col 2: $95,510
 Row 4: Col 1: Computer   systems analyst;   Col 2: $88,270
  Row 5: Col 1: Database administrator; Col 2: $87,020
  Row 6: Col 1: Computer network architect; Col 2: $104,650
  Row 7: Col 1: Management analyst; Col 2: $82,450 

 

Apply the Light Style 2 – Accent   4 table style.

 

Add a new column to the left of   column 1. Merge the cells in the new column. Set the cell width of the merged   cell to 0.79“. Type 2016 in the new column and rotate the text 270°. Center   the text in the cell horizontally. Increase the font size of the text to 28   pt. Change the cell shading to White, Text 1.

 

Set the text in the table to   Center Vertically. Set the table height to 4.2” and the width to 10.7“.

 

Change the layout of Slide 3 to   Title Only.

 

Start Excel. Download and open   the file named ITData.xlsx and save   it as ITData_LastFirst.xlsx. Copy   the chart from the Job Growth Percentage worksheet and embed the chart using   Paste Special on Slide 3. Paste as Microsoft Office Graphic Object.
 

Note, Mac users: Paste as Microsoft   Office Graphic Object.

 

Size the chart to a height of 4.5“. Position the chart   horizontally at 1” and vertically at 1.85“.

 

On Slide 5, create a Clustered   Column chart with the following data:
 

  In cell A1, type Profession and in cell B1 type # of Jobs.Then populate A2:B7 with the   following values:
 

Software   applications developer 1,256,200
Information   security analyst  100,000
Computer   system analyst 600,500
Database   administrator 119,500
Computer   network architect 162,700
Management   analyst 806,400
 

  Change the source data to use the range A1:B7.

 

Make the following changes to   the clustered column chart:
  • Apply Chart Style 9
  • Apply the Layout 4 Quick Layout
  • Remove the legend and y-axis

 

Save and close Exp22_PPT_Ch03_CumulativeAssessment_ITCareers.pptx.   Exit PowerPoint. Submit the file as directed.

Final project outline

 

Choose one of the 1 Security Topics from the Management of Information Security Book and write your final paper educating the reader on that topic. Use the sub-categories for each Security Topic presented in the book as a guide to your content for the paper.

  • Chapter 2 Compliance: Law and Ethics
  • Chapter 3: Governance and Strategic Planning for Security
  • Chapter 4: Information Security Polic
  • Chapter 5: Developing the Security Program
  • Chapter 6: Risk Management: Assessing Risk
  • Chapter 7: Risk Management: Treating Risk
  • Chapter 8: Security Management Models
  • Chapter 9: Security Management Practices
  • Chapter 10: Planning for Contingencies
  • Chapter 11: Security Maintenance
  • Chapter 12: Protection Mechanisms

This proposal should be an annotated outline of your paper. Use sample # 2 and 3 as your guide. The samples can be found here. Only write outlines describing what you are going to write about. Do not write paragraphs but make sure it is in outline form.

Content for the paper should have the following at a minimum:

  1. Introduction to the topic
  2. A description of the each area of the topic
  3. How each area provides security for an organization
  4. What are the tools and methods used for each area
  5. What are the challenges in providing security and describe problems that can occur in each area
  6. A conclusion summarizing what you wrote
  • Assignment Format: MS Word Document; APA format
  • Submission Format: Blackboard Submission
  • Length: 2 – 4 pages with a separate reference page
  • Citations Required: 5 – 6 Scholarly References

short paper

 

Define employment at will. Are there legal exceptions to the employment-at-will doctrine? How can employers protect themselves from wrongful discharge lawsuits? Discuss