Physical securrity Discussion 6(500 words and references)

 10 threats choose 5:

  

a. Internal theft or diversion

b. Armed attack

c. Hostage incident

d. Burglary

e. Civil disturbance

f. Auto theft

g. Sabotage

h. Employee pilferage

i. Kidnapping

j. Robbery

he course textbook outlined the top ten security threats to an organization. For this assignment, write at least 500 words discussing the following:

  • Out of the ten threats list the five you think are most important
  • Describe and define each of these five threat areas as to their significance
  • Provide strategies you would have implemented to improve these areas to reduce risk and vulnerability

Assignment Requirements

Please provide and discuss the above

  • Each paragraph must have at least four complete sentences
  • You also need to respond to at least two (2) classmates’ posts (150-word each)
  • There should be no personal pronouns in your initial discussion post.
  • Your initial post is due by Wednesday before 1159pm
  • You should have a minimum of three credible in-text citations (Not at the end of your paragraphs)
  • All requirements must be met, and proper grammar, spelling, and punctuation must be correct.
  • Please also ensure you use the Discussion Board Header; you can find this template in the Getting Started folder.
  • No contractions should be used, or any conjunctions at the beginning of a sentence.
  • Failure to follow each instruction will negatively affect your grades.

Paper

 

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

Written Essay2

For this assignment, submit a 5-6 page paper that addresses the following questions as complete as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Data analytics

 Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles and write one sentence about the primary job responsibility of each of them. The post should be 500 words or more 

week two discussion

 how business processes as services can improve efficiency. This discussion is about business process as a service and security.  

Instructions:

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

Assignment

  

1.[13]  The oral arguments before the Supreme Court concerning the Communications Decency Act (CDA) focused extensively on determining the most appropriate analogy for cyberspace.  Arguments were presented that compared the Internet to a library, to television, and to a public place such as a street corner or park.

(a)   Why are these comparisons important?  Briefly explain the differences between libraries, television, and public places with respect to First Amendment protection.

 (b)   For each of these three analogies (library, television, and public place), describe one significant way in which the Internet is similar and one significant way in which it is different.  Explain the relevance of each of these similarities and differences to the issue of regulation of the Internet.

2.[12]   Veterinarians implant computer chips into pets and farm animals to identify them if they get lost. Some people suggest doing so for children. Discuss the privacy implications of this proposal and answer the following questions:

a. What are the risks?

b. Do the benefits outweigh the risks? If yes, in what way? If not, why not?

c. Do parents have the right to have the chips implanted in their young children?  Why or why not?

                d. If there was a bill in Congress to require ID chips in children under the age of 5, would you support it? Why or why not?

3. [10] a. Two approaches to the problem of protecting personal information are (a) the free market view and (b) the consumer protection view.  How do these points of view differ on the issue of a company disclosing personal information about its customers?  How do they differ on the issue of errors in the data about an individual that is distributed by a credit bureau?

        b. Briefly describe what an “opt-in” policy is and an “opt-out” policy is. Let’s say you were filling out a survey for an online magazine.  Give an example of what you’d see that would distinguish an opt-in from an opt-out policy.

4. [15]  a. Briefly describe the difference between negative and positive rights (liberties and claim rights). Give an example of a negative right and a positive right.

     b. Explain the DMCA (Digital Millennium Copyright Act). What are its two main provisions? 

c. How are the Napster and Grokster copyright cases similar, and how are they different?

d. Explain the difference between deontological theories of ethics and utilitarian theories of ethics

Notes :   

Answer all questions in detail (At least 15 lines AND no more than 50 lines for each answer – including sub sections). Provide your justification based on earlier cases or other supporting material.  Structure and presentation of your answers will affect the points. (Cite your references in the body of the answers if needed)

Discussion 6

 Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 7 (Jamsa, 2013).

Chapter 7 topics:

  • Define collaboration.
  • Define and describe cloud-based collaboration.
  • The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
  • List the questions one should consider when evaluating a cloud-based collaborative solution.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Portfolio Assignment

 

Portfolio Project: This week discuss a current business process in a specific industry.  Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work.