MIS Assignments

 

View the following video on  Information Security Concepts in LinkedIn Learning: 

Information security concepts

https://www.linkedin.com/learning/cisa-cert-prep-5-information-asset-protection-for-is-auditors?u=74653834 ( if you have LinkedIn account)

or using the video in this Google Drive link: 

https://drive.google.com/file/d/1Nh-BtPM5lUolb–Iok5bcchDedOsxQs-/view?usp=sharing

Provide discussion answers to the following statements below.  The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive. 

1. Explain the three IS Concepts in the AIC Triad.

2.  Explain, in your own words, the following terms:  

2a.  vulnerability

2b.  threat

2c.  exposure

3.  Explain the difference between privacy and security.    

portfolio assignment

pePortfolio Project: This week discuss a current business process in a specific industry.  Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • What are the pros and cons of the technology selected?
  • What various factors the business should consider prior to deploying the new technology?

 The above final paper submission should be approx three pages in length.  Include a Cover page info, the body, and on the last page add the APA References.  There should be at least three APA approved (peer reviewed*) references to support your work.

*Peer Reviewed implies it has an author name(s) and relative current publish date under 10-years old. And was reviewed by their peers (and non-opinion information), researched base, data and information driven, i,e. like a textbook, white paper (is fine), or a good peer-reviewed journal.  Avoid non-author information or company PR statements.

discussion1:(separate file)

There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

discussion2: (separate file)

Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

Eu data protection laws

 Hide Assignment InformationInstructions

In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 14A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance? 

Final project – Ethical hacking

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

CYS-D-14

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary?cys-D-14C

Discussion post – Govt

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  

Question1) What are some advantages and disadvantages to this approach?  

Question 2) Is there another approach that might work better? 

Note: 250 word minimum. At least one scholarly source should be used. In text citation need to be included.

Data Mininig

 Discuss the importance of preprocessing the datasets to ensure better data quality for data mining techniques. Give an example from your own personal experience. 

Research Paper

Topic:  Software engineering tools for soft computing: MATLAB, R Tool and DTREG.  

Comparison should focus on how they are able to model neural networks.  Also, pick criteria that compares things they all have in common.  

IT Software in business

i have assignment for IT software in business its only 3 questions and it should be submit as excel file. i need to get 100% in this assignment and its super easy but im not good at IT