Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

The discussion posts for this course are in two parts, the Initial Post and the Reply Post.

Initial Post: Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

A. Research and select an organization that effectively implement the disaster recovery and business continuity plan. Identify the list of activities involved in the process and highlight the significance of this plan to the organization.

B. Discuss the Business Impact Analysis in Disaster Recovery and Business Continuity Plan

The post should include adequate citations and references that adhere strictly to the APA format.

Assg

Optional Resources:

 Chapter 3 & 4 Journal articles

Task 1: total 1 page

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also, note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Task 2: total 3 pages

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Task 3 total 3 pages

https://opentextbook.site/informationsystems2019/

Essay Assignment 1: Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Essay Assignment 2: Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above assignment should be two pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

This assignment must be submitted by 11:59 PM on Sunday, September 13, 2020 (No Exceptions).  As per the syllabus, no late assignments will be accepted.

Please understand that Plagiarism will not be tolerated and will result in a zero grade. Please review the Academic Dishonesty Policy outlined in the syllabus and in your student handbook. 

Discussion

There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

How does software defined networking affect the management of a VPN in comparison to traditional VPN management? Does it improve or does it not improve the management of a VPN?

As threats and attacks are a continuing issue, what new technologies/methods do you think should be implemented to protect a VPN?

Wireless Security-2

1) You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone is powered on versus powered off status.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-5 to 8

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

the cs

 

Please solve three (3) programming problems related to the content presented in Chapter 12 in your text. You can find the programming problems in the attached file (Module 5 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod5-Worksheet-Programming-Last-First.docx. For example, Mod5-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod5-Java-Programming-Last-First, for example, Mod5-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod5Problem#.java, for example, Mod5Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted separately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod5-Java-Programming-Last-First.zip (including .java files, data files, and .txt files).
    • Mod5-Worksheet-Programming-Last-First.docx.

Grading

This assignment is worth 20 points. You can find the grading rubric for each program in the worksheet attached above.

  • CycleThrowTryCatch (6 pts.).
  • CycleFileOutput (7 pts.).
  • CycleFileInput (7 pts.).

Discussion

 After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)

BI_Discussion_1

Discussion (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Response should be 250-300 words and with references

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.