What are the criteria security decision-makers use to evaluate the trustworthiness of a data center for critical data?
Legal Reg, Compliance, Invest Discussion
One and half page is fine
Managing Risk
Your company has decided to implement a human resource demographic portal. Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc. In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.
Under the current system, employees must go to the HR office to make any changes – there is no online access.
Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed. Employees would be able to do this as needed through the portal.
There are many potential risks associated with this project.
- Your task is to Identify as many risks as you can (4 is a minimum, but feel free to identify more risks if you so desire).
- Determine the relative likelihood of each risk occurring (low, medium high)
- Propose at least one strategy for addressing each risk, and describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).
Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented. For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,
.
Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)
Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the human resource demographic portal.
Practical Connection Paper
Assignment 2 – Practical Connection Paper
Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.
Requirements: Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper. The paper should include a title page, body pages, and reference page. An abstract and introduction is not required for this assignment. Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.
Please refer to the attached text books for the
Practical Connection Assignment: Operational Excellence
Practical Connection Assignment: Operational Excellence
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Cloud Computing
Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.
IT Discussion
Essay on what non-executives need to know regarding technology. Especially in regard to innovation technology. Please note some key foundational factors that non-executives need to know and understand regarding technology. Also, note how non-IT departments interact with IT and how the change in the market will change how business is performed.
Your response should be 250-300 words.
testing
1 page
- Search the internet for best practices on testing new technologies (focus on ensuring that the technology works as it is needed). This needs to include current theories, models, and techniques in the analysis, design, implementation, and testing of secure network infrastructures across LANs and WANs (since all solutions depend on to some extent the network).
- From your research, select the 3 tips that you feel are the most likely to help and your reasons why.
- Include in your report the ways that you would keep the project on schedule.
Cloud Computing and Digital Forensics
Review in 500 words or more the video below called Cloud Security Myths.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. Stand alone quotes will not count toward the 3 required quotes.
Write in essay format not in bulleted, numbered or other list format.
paper ERM
how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Question 2
https://cacm.acm.org/news/238987-app-allows-inspectors-to-find-gas-pump-skimmers-faster/fulltext
https://cacm.acm.org/magazines/2019/9/238974-inspired-by-the-home-of-the-future/abstract
https://cacm.acm.org/magazines/2019/9/238961-can-you-locate-your-location-data/fulltext
a. Select an article from the above list, preferably one that details ethics in technology-related concern or one that explains a new technology or service.
b. Summarize the article (3 paragraphs) and include a concluding paragraph that explains how you as IT professionals would use this information.