mad discussion

  

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(9), 195. Retrieved from https://doi.org/10.3390/fi11090195

Puchley, T., & Toppi, C. (2018). ERM: Evolving From Risk Assessment to Strategic Risk Management. HFM (Healthcare Financial Management), 1–5.

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

RM-RESEARCH-12

RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

4 pages full excluding references and cover page. Follow APA 7 format and citations.

TOPIC:

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

assignment

 

f you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

HomeWork

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Security Policies

 

Many organizations lack a clear and concise security policy. Without a policy there is often an inconsistency in security focus by employees and management and increased opportunities for experiencing security incidents.

Respond to the following in a minimum of 175 words:

  • Search the internet for two companies’ policies.
  • Analyze the policies to determine commonalities.
  • What would be your top three concepts that should be included in an organizational security policy mission statement? Explain your reasoning for your listed three concepts.

Wk 1 – NIST Publications and Outcomes

 2 Part question is below both need to be completed

Assignment Content

  1. Part 1
    The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

    Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

    Include the following column headings: 

    • SP number 
    • SP name  
    • SP purpose
    • Include the following row headings: 
    • SP 800-30 
    • SP 800-34 
    • SP 800-37 
    • SP 800-39 
    • SP 800-53
    • Part 2
      You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

      Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

      Cite all sources using APA guidelines. 

      Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

A7

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.