cyber-attack can cause economic damage

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Legal Reg, Compliance, Invest

For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Network Management

Instructions:

Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).

–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.

–The minimum requirements are as follows:

—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.

—At least one site must have a connection to the Internet.

—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.

—At least one switch at each site that creates a LAN of at least two PCs.

—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.

—One site must have at least one server.

—Appropriate cabling and connectivity between the two sites.

—Labeling to make the drawing professional.

–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).

Part Two:

-The minimum requirements are as follows:

—An executive summary of the implementation plan

—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)

—Other recommended network management or monitoring applications/techniques recommended

—At least 10 recommended scorecards and/or metrics for monitored circuits and devices

—A list of which network devices will be monitored

—Security recommendations

—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring

—Labeling to make the drawing professional

Case study

 Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations. 

Articlee writing

Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
APA format

What are some of the potential risks involved with cloud computing? Does the research and model in this article propose a viable solution to cloud-based risk management?

Article:

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk  Management Framework for IT Systems Which Adopt Cloud Computing. Future  Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195  

After reading the article this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

 A substantive post will do  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

persuasive essay

Instructions

Select one of the papers/articles provided in this section. Based on the argument of the author, take a position and write persuasive essay (1000 +/- 10% words). 

there are two links to Web Sites where you can find steps and guidelines for writing a persuasive essay.

http://www.studygs.net/wrtstr4.htm

The essay would be graded 0 to 10 points. If you submit late your highest grade would be six out of ten points.

While writing your essay, please do not read/use other references. This is not an English writing or a research assignment. This is a business writing assignment. Review the PowerPoint presentation (Persuasive essay structure) on how to write a persuasive essay. 

Steps

1.  Visit the web sites to find out how to write a persuasive essay.

     https://www.hamilton.edu/academics/centers/writing/writing-resources/persuasive-essays

     https://learning.hccs.edu/faculty/jason.laviolette/persuasive-essay-outline

2.  Review the PowerPoint presentation on a persuasive essay structure. This is not an English writing assignment. It is Business Writing assignment, and your essay should have the proposed structure.

3.  Please read the rubric before start working on your essay.

4.  Select an article that compels you to write an essay with your opinion.

5.  Write your persuasive essay (1000 +/- 100 words).

6.  Submit your essay to the Writing Center (see how on BB) request a “grammar and mechanics” review. Reviews from the LRC are not accepted. We need the “grammar and mechanics” feedback

7.  Use Project 4 link to submit your two files: 1) File with the “grammar and mechanics’ feedback from the Writing Center and 1) Your updated (if needed) essay on a Word document (no PDFs) file.

assignment-7

 why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.