Corporate IT Security Audit Compliance

 

  • Read the Article: Whitley, J. (2007). PCAOB Proposes Audit Standards. Internal Auditor, 64(1), 15. (this article is located in the EBSCO Host of the University of the Potomac Library) 
  • Write a summary analysis and discuss the formation of the standards. In your opinion are we creating too many standards or are they needed?   

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Discussion 13- Initiating project

  1. Why does the project team require a project scope statement prior to planning procurements?
  2. What is the difference between efficiency and effectiveness? Give an example of something that is one but not the other.
  3. Give specific examples of risks on a project that are within the team’s control, partially within the team’s control, and outside the team’s control. Tell how you would deal with each.

Your post must be substantive and demonstrate insight gained from the course material.

Text-

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

dwek3

 Please use this reference:  https://www.pbs.org/video/fake-news-vs-real-news-ltadaw/

Discussion:
Fake news is no longer a matter of the occasional hoax. There is growing evidence that fake news has the power to shape public opinion and even sway elections. As more Americans get their news online, it is increasingly vital that we as consumers know how to verify sources and spot fake news.
Topic 1 Questions:

  1. Explain at least two ways fake news could affect results of political elections?
  2. What can companies like Facebook and Twitter do to stop users from spreading fake news? What can we, as consumers, do? What do you think would work, especially with younger users?

Topic 2: Deepfakes

This week you read about Deepfakes (https://www.youtube.com/watch?v=T76bK2t2r8g) in two different Read & Watch items, one created by CNN Business and one by Forbes.

Discussion:
Deepfake technology will certainly become more prevalent as we move into the future.
Topic 2 Questions: 

  1. How concerned are you about the negative impact Deepfakes could have on society?

Research a Recent Data Breach Involving Databases

 

Discussion: Research a Recent Data Breach Involving Databases

Instructions:

In this module, we discussed how important security is when it comes to databases. As an effective database professional, you’ll need to ensure the systems and solutions you design and use are properly secured from accidental or intentional misuse. Many databases contain sensitive information, such as PII (Personally Identifiable Information, like your birth date), PHI (Personal Health Information, such as your medical history or current prescriptions), and PCI (Payment Card Information, such as your bank or credit card details). Then there are the thousands upon thousands of other data points captured about you and the world (physical and virtual) around you. All of this information is under attack – by malicious hackers seeking to profit, competitors looking for the “Next Big Thing”, or just bored kids who have nothing better to do. 

In your duties, you’ll be managing and acting as a “Data Custodian.” By understanding how impactful a database breach can be, use the internet to research data breaches from the past 5 years. Focus on breaches where

  • Data was stored in a database, S3 bucket, or other online repository,
  • Data was the primary focus of the attack
  • Where that attack caused serious business or financial harm

In general, your post should include: key characteristics or facts about the attack, type of data impacted, business or financial impact. Include any lessons learned or relevant personal experiences. 

The post should be roughly 3-4 paragraphs and be roughly 300-400 words long. 

You MUST cite resources in APA format. 

The Banking e-Teller system allows bank customers to

  

The Banking e-Teller system allows bank customers to perform ATM transactions from their cell phone. BeT will allow customers to check balances, make remote capture deposits, and perform balance transfers to their checking or savings account. Balance transfers should only be processed if the funds are available. It is time to start organizing your solution for this system and to begin development on your design proposal.
 

Create the following for BeT:
 

•Flowcharts showing the program processing flow for remote capture deposits, balance transfers, and balance inquiries

discussion

 

High Availability or HA is one of the primary reasons to migrate servers to a virtual environment or to the Cloud. For this discussion address the following questions. 

Question #1. What are some of the virtualization-related services available to System Administrators to ensure high availability for important servers? Name and explain some of these features available in either Hyper-V or VMware and describe the benefits.

For example, Live Migration or vMotion, HA or Failover Cluster, DSR (Distributed Resource Scheduler), FT (fault tolerance), etc.

Question #2. Provide a real-world example of how some of these HA features are being used by real companies. I suggest searching for “case studies” or “use cases” of the tools that you choose to describe.

It is NOT enough to give a generic one-sentence definition of what is HA. You should do more research (and post more details) if you wish to learn about these very important features of virtualization.

Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Activity 10 – Project Risk

Define Quality?What does Total Quality Management emphasize?State the Deming philosophy.What are the major steps for an organization to follow in implementing TQM?Requirements:

  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

30/p2

  • What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
  • What actions must be taken in response to a security incident?
  • What is computer forensics, and what role does it play in responding to a computer incident?

assembly language assignment

Algorithm Workbench page 202

Write answers and submit pdf file with your answers. Complete program nor output NOT
needed.

1. Write sequence of instructions that will use ONLY PUSH and POP instructions to
exchange values in EAX and EBX.

2. Suppose you wanted a subroutine to return to an address that is 3 bytes higher than the
return address currently on stack. Write a sequence of instructions that will be inserted
just before the RET statement to accomplish this task.

Submit one pdf file that has all your work.