Privacy and Security Considerations for Information Governance

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Initial post due Thursday

Digital Forensics Tools & Tchq

Find a criminal case that involved Digital Forensics. describing the case and how digital forensics were used in the investigation. 

Using WORD, write an ORIGINAL brief essay of 500 words or more.

I need at least 3 references and Turnitin Report.

Discussion 3

 

Week 3: Discussion

The United States vs. Carey, 1998

Prologue 

Carey had been under investigation for possible sale and possession of cocaine and his residence as the center of operation. Six (6) months after the last purchase, the law enforcement officers obtained a warrant to arrest him. During the arrest, officers observed in plain view, a device for smoking marijuana in his residence and labeled the unit as marijuana in defendant’s apartment.

Plan of Action

Alerted by these items discovered in Mr. Carey’s apartment, the law enforcement officers asked Mr. Carey to consent to a search of his apartment. In clean and clear language, the law enforcement officers informed him of the intention to obtain a search warrant to search his apartment if Mr. Carey refused permission. After considerable discussion with the officers, Mr. Carey verbally consented to the search and later signed a formal written consent at the Officer’s station.

The search warrant was all-inclusive; thereby, authorized officers to search the filesystems on the computers for names, telephone numbers, ledger receipts, addresses, and vital documentary evidence about the sale and distribution of controlled substances.

Discoveries

1:1. Armed with the consent, the officers returned to Mr. Carey’s apartment the same night and discovered quantities of cocaine, marijuana, hallucinogenic mushrooms; took two computers believed to demonstrate evidence of drug dealing.

1:2. During the examination of Mr. Carey’s computer, investigators found files with sexually suggestive titles and the label “.jpg” that contained child pornography. 

1:3. In the process, investigators temporarily abandoned the search for evidence about the sale and distribution of controlled substances and focused on child pornography files, and Mr. Carey was charged with one count of child pornography.

 Court Proceeding

  • In the appeal, Mr. Carey challenged child pornography count as inadmissible and unacceptable because the computer was taken as the result of a general, warrantless search out of his apartment
  • Law enforcement officers contention was the warrant authorized them to search any filesystem on the computer that might contain data and information germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and asserted that child pornography came into plain view during the search. 
  • The court concluded that the investigators exceeded the scope of the warrant and reversed Mr. Carey’s conviction.
  • The Law enforcement officers adopted “Plain view doctrine” that must have not been extended to embrace wide-ranging search warranties from one item to another until something incriminating emerges.

Precautious

  1. Digital forensic investigators must be extremely cautious and avoid breaching the fundamental principle of digital forensic investigation.
  2. Digital forensic investigators inadvertently abandoned the search warrant and overstepped the authorized limit of the search warrant.  
  3. Investigators engrossed in child pornography files. Notably, Mr. Carey was charged with one count of child pornography.
  4. Tactlessly, Digital forensic investigators failed to obtain a new search warrant before conducting extra search on Mr. Carey’s child pornography operation.

Answer All Questions: (1:1 – 1:3)

Question 1:1. Provide a comprehensive plan of action on Mr. Carey’s count germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms.

Question 1:2. Provide a comprehensive narrative and concluding evidence on Mr. Carey’s use of the computer to compiled names, telephone numbers, ledger receipts, addresses, and vital documentary evidence on the sale and distribution of controlled substances.

Question 1:3. Describe the immediate danger of Mr. Carey’s modus operandi germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and child pornography in a developing rural community?

Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the  readings from the course and at least two scholarly journal articles to  support your positions, claims, and observations, in addition to your  textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise,  and logical, using excellent grammar and style techniques. You are  being graded in part on the quality of your writing.

Essay that evaluates how to conduct effective research online.

Week 2 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that evaluates how to conduct effective research online.

Functional foods

 Select what you consider to be a functional food from your own pantry, fridge, or freezer, or the kitchen of a friend. To which major food group does it belong? Describe its history and distinctive health benefits, citing at least two sources. 

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Writing Assignment 1

 

Answer the following questions in a cohesive and comprehensive essay. 

  • What is the difference between the “DELETE” and “TRUNCATE” commands?
  • What is the difference between the “WHERE” clause and the “HAVING” clause?
  • What is the difference between “Primary Key” and “Unique Key”?

Click the link above to submit your completed assignment.

Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

Supply Chain Management

There are fundamental challenges in managing effective supply chains (those activities that largely affect a company’s COGS and working capital deployed).  The effective supply chain manager must recognize then lead the way through these challenges.  The best explanation of the challenges is:
A.  Trying to understand true Customer Expected Lead Time (CELT) and effort to make supply chains more responsive
B.  Trying to change production mindsets from push to pull while illuminating muda.
C.  Trying to make the purchase of milk more Make-to-Order
D.  Use techniques like postponement and vendor managed inventory to shift inventory holding responsibility from our balance sheet to another supply chain partner
E.  Identifying the adjectives that describe potential supply chain segments then implementing them throughout the company.