Question 5

  

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Identity and Access Management

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.   Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats. 

Research Paper

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Dissertation on IoT

 Develop the introduction to Effective Strategies on the IoT Cybersecurity where you discuss the problem gap identified and how it supported by the literature. 

Discussion Week 5 ERM

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Portfolio Project

Find a process within an business that you feel can help that business gain a competitive advantage.

Create a word document that contains at least the following:

Start by introducing the project:
* Explain the process you will be reviewing and want to modify.
* Explain the business and industry where this process exists.
* Give an overview of the current process and how it works.

Based on the materials within this course, explain a new technology that should be deployed.
* Be very specific.  Note the exact technology as well as the specific application of that technology (i.e. technology might be Smart Automation – while the specific application might be light dimming technology).
* Identify the pros and cons of the new technology. 
* Identify how the new technology would impact the business/industry and the process that was selected to be modified.

What are the various factors the business should consider before deploying the new technology.
* Are their cost considerations. 
* What other project are impacted or might impact the deployment. 
* What are 5 to 10 things the business should consider before implementing and explain how important it would be to use the new technology (i.e. use some type of scale like ‘Critical’ vs ‘High Priority’ vs … vs ‘Good to have’).

The project must be at least 3 pages in length, double-spaced, 12-font.  This total length does not include the APA approved cover page and the reference page(s).  There must be at least 3 APA approved references, with citations, to support your work.

discussion

 

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

Reply post

For this week’s discussion, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide the class with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. Remember to also reply to at least two of your classmate’s posts on this questions and include all in one single thread.

federated architecture in cloud systems

 

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class, not a database class.

Cite your sources. Do not copy. Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.