Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more .
online discussion
Where does data analysis begin?
The collection of data is not the onset of data analysis projects. A data analysis project begins with a purpose, problem, and research questions.
Find one scholarly research paper with an excellent example of:
- Problem statement
- Research questions
The example shall relate to a practical, real-world work environment in the information technology field. After finding the research, discuss the following:
- What makes this example excellent in the topics that initiate a data analysis project?
- What relates this example to a practical, real-world work environment in the information technology field?
- Do the research questions meet the criteria defined in the lecture in week one?
- What is the generalizability of this research?
Do not restate what the authors of the research have already stated. Your post shall be in your own words. Reference the research example using APA 7, as well as any other references used in your post. The hanging indent required in research papers is not appropriate on the discussion board.
When replying to your peers, do you agree with their answers to the topics? The peer response posts should identify whether you agree and why or why not. Reference your peer’s research example in your peer response.
Keep in mind, a citation must be made for every reference. When citing, ensure that the statement requires a citation.
Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Article:
Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6. https://ieeexplore.ieee.org/document/8760937?arnumber=8760937
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.
A substantive post will do of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Management of Information Security Project
Project Description
Carry out a security self-assessment of an organization of your current or previous employer or your own organization. You must seek permission from the individual responsible for the information security of that organization. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.
Report
Write a report based on the self-assessment of an organization. It should be 5-7 pages long, 12 point character size, double line spacing, and have 1” margins on all sides. It is recommended that you do not use the actual name of the organization in the report; use a title, such as “ABC, Inc.” Your report should include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of an action plan.
Deliverables: A single Word document
Project Guidelines:
For the project, you can do a security assessment on either a single IT system or the entire IT infrastructure of an organization, whichever you think is feasible and manageable.
You can use these guidelines when working on your project:
1) Your project report just needs to be a very general assessment of the IT system in organization. You can keep it brief (about 4 to 8 pages long, not including the cover page), and broadly cover the following areas:
Management Controls
Operational Controls
Technical Controls.
You don’t need to get into specifics on anything that might be considered sensitive or proprietary. Keep it very general (something that can be in the public-domain).
2) For your project, **only** use information that is considered public. Please **do not** use or reference any proprietary or non-public information. As the project guidelines state, do not use the actual name of any organization – instead use “ABC Inc.” And in your project please don’t reference any documents that are not considered to be in the public domain; also don’t use any company names – use something generic such as XYZ Inc.
3) Instead of doing a self-assessment of a real company, you can also do a self-assessment of a fictitious company similar to a real entity. For example, you could imagine that you are performing an assessment of a fictitious entity such as the following:
A college bookstore that accepts online textbook purchases, or
A pharmacy store that maintains a database of customer prescriptions
An auto-insurance agency that maintains customer data
… etc. … etc.
You can imagine yourself being hired as an Info Security consultant to perform a security audit of the fictitious company’s IT infrastructure. Assume that some rudimentary security measures are currently in place, but there is much room for improvement. In your report describe your assessment of the security measures currently in place and recommend any needed improvements to ensure better IT security in the organization.
IT PROJECT
Conduct Internet research and identify an established process improvement strategy. Explain the strategy and describe what you feel are its biggest strengths.(75words)
Describe what you think are the two most important aspects of leading a successful IT project. Provide examples to justify your selections. (75words)
Practical Connection Assignment
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
This assignment should not be a rehash of a previous practical connection assignment from another residency/course/student.
Impact of Mobile computing on Businesses
Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Mobile Computing on Businesses. Your submission must include the following information in the following format:
ANALYSIS: Using 750-800 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.
REFERENCES: All references must be listed at the bottom of the submission–in APA format.
Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.
PLE 11
Please answer the below in 2-3 lines:
1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?
2. How has the term hacking changed meaning over the years?
3. What is the most dangerous hacker tool?
4. From the news: How were NSA’s hacker tools compromised?
5. What was the vulnerability in the Target Breach?
6. What do you think of hactivism?
7. How did Stuxnet work?
8. What was the Arpanet?
9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?
10. What is the Red Team?
Peer Review Process- Security Architecture & Design
What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?
his assignment should be in APA format and have to include at least two references.
Discussion: Global Technology
Deadline: 5 hours
Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence. Why or why not?
Books/Reference paper
Textbook, Chapter 1 & 2: Olsen, S., & National Academy of Engineering (U.S.). (2011). Global Technology : Changes and Implications: Summary of a Forum. Washington, D.C.: National Academies Press. (Included through library subscription)
Scherz, C., Hahn, J., & Ladikas, M. (2019). Technology Assessment in a Globalized World. Management Systems in Production Engineering, 27(3), 149.
technology assessment in a globalized world – Sciendo
https://content.sciendo.com › 27 › 3 › article-p149
Lynn, L., & Salzman, H. (2007). The Real Global Technology Challenge. Change, 39(4), 8.
https://rucore.libraries.rutgers.edu/rutgers-lib/45958/PDF/1/play/
APA Format
https://academicwriter.apa.org/6/
“NO PLAGIARISM”
Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.