MS 3

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include the following sections:

a. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

b. Conclusion

c. References

Notes:

1. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

2. Must cite at least 5 peer reviewed scholarly journals.

3. This paper should be in APA format and should be a minimum of 4 pages in length

Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 In continuation of your project work, discuss the significance of formulating adequate policies and procedures in your organization. Outline the impact of such policies and procedures in your business continuity planning policy. Also, describe the five-step process for building a proper policies for business continuity. 

 

Reading – Chapters 14, 15, and 16 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763

Week 2 Project

*ROUGH DRAFT and PROJECT TIPS ARE ATTACHED*  

Graduation Party Location

It is now time to revisit your graduation planning activities by  choosing your location and entertainment for the party. You will do this  by creating tables to compare the attributes and issues of your various  choices.

Click on the link below, Week 2 Project Tips, for some visual aids on how to tackle this week’s project.

Week 2 Project Tips

Create a new Microsoft Word document and save it as W2P_LastName.docx. Note that you might want to change your page orientation to landscape to better fit your data.

  1. Create a table to compare the different locations you chose in Week 1.  You can add a table to your document by using the Table icon in the  Insert ribbon of Microsoft Word. Your table should include the following  columns – you can see an example of this layout in the Week 2 Project Tips:
    • Location: List the three possible locations.
    • Web site: Include the URL hyperlink for each location’s Web site.
    • Positives: Include a bulleted or numbered list* of positive attributes of each.
    • Negatives: Include a bulleted or numbered list of issues for each location.
    • Estimated Cost: Include the cost(s) associated with using the location/facility.
      *You  can create a list using the icons in the Paragraph panel of the Home  ribbon (Bullets, Numbering, or Multilevel). Changing the margin settings  of the cells with bullets can be helpful.
  2. Beneath your table, write a paragraph of at least 50 words to include:
    • Identify which location you chose.
    • Justify why you made the choices you did using the information in the tables to guide your decision.
    • Check the Status bar at the bottom of the window to see the word count.
       
  3. Finally add the finishing touches to the paper.
    • Add page numbers in the Footer (bottom of your page).
    • Add a Header that includes the name of your event and your name.
    • Add some formatting and color to your table.
    • Bold and center the table headings.
    • You can change the color of your text or the color of the background  to color code your table or make it more readable. Be creative and have  fun!

By the due date assigned, submit your completed document to the Submissions Area. In the Comments box, briefly share your experiences with completing this project.

Security Architect and Design: Individual Assignment

Length:   Minimum of 700 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

5s week 11 assignment BS

In 300 words

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing.

Include References, do not copy paste strictly.

Cyber law assignments

  

All the below three questions need to be without plagiarism and need to user proper references, inline citations, APA formatted and wordcount to be as requested,.

Question 1:

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court. The minimum word count shall be not less than 500 words

Question 2:

Using a Microsoft Word document, please review ONE of the following films and tell how that film represents a contribution to the field of CyberLaw. 

War Games (1983)

Citizen Four (2014)

AlphaGo (2017)

Google and the World Brain (2013) 

The minimum word count shall be not less than 1000 words.

Question3:

Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking

The minimum word count shall be not less than 250 words.

Health Informatics & Inform System – Assignment 6

Questions:

1.      Discuss the changes in home health devices over the past 10 years

2.       Research a mobile health app of your choice and discuss its potential impact on healthcare

3.       Discuss the pros and cons of using electronic communications between providers and patients

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.