IT345 7 discussion

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources

 

Topics:

  • How well can we predict the consequences of a new technology or application?
  • Who should make the decision for a business on what technology the adopt?
  • What does the term “need for reasonable judgement” mean?
  • Do sites like Wikipedia hold any credibility?

Microsoft Access Discussion Easy

 

Let’s Pause and Reflect on your journey with the MICROSOFT ACCESS relational database management application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others.

You’re almost there!!! You should be able to see the ‘light at the end of tunnel’ with your journey through Microsoft Office…Are you planning for future use of these applications?
Please share how you plan to regularly and practically utilize the skills acquired in this class moving forward. How will you keep up your practice in using these applications?

ASSIGNMENT RUBRIC – Wrap Up Extra Credit: Participating in this week’s wrap up thread and satisfying all the criteria of the assignment rubric listed below is worth 0.50 points towards the overall course grade. Click on the Reply link below to make your post.

Points

Identifies and explains a useful feature/function of the application covered in the current week

0.20

Shares substantive response to additional Wrap Up questions

0.20

Satisfies minimum word count requirement = 100 words

0.10

Total Points

0.50

Project Management

 Read an article or watch a video about a recipient of PMI’s Project of the Year award.

Search online for information from PMI’s website.

  • Write a two page paper summarizing a winning project, focusing on how the project manager and team used good project management practices.

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

 

  • Cite your source, must have been written within the last five years.

Ethical Obligations in Information Security Proposal

Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.

configuring

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

How ERM can be integrated with an organization’s overall strategy.

 Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Enterprise Risk Management

 Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

 not including the required cover page and reference page 7 pages

week 3 Security Architecture and Design

 Since we know that this particular  instance of the AppMaker implements a customer-facing store that  processes financial transactions, how does that influence which threat  agents may be interested in attacking it? 

IA week14 DB

Hello,

i need this paper by 12/02 afternoon.

Strictly No plagiarism please use your own words.

Which vendor certification would you think is the most relevant in the field of IT security?  Why?

An initial post must be between 300 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism