Discussion

Topic( Minimum 300 words):

–    Quebecor Printing is a commercial printing company that is expanding, acquiring ailing printing companies, and moving into international markets. They have completed more than 100 mergers and buyouts since 1972 and have focused on customized service by using “selective binding” to print. Apply strategies from Porter’s model to make Quebecor Printing’s business more profitable.

– Minimum two references. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.

Discussion

Why are firewalls so important within an IT environment? What are the different firewalls and are all types still in use today? What concepts/inputs would you consider when updating an out-of-date firewall within an IT environment?

Your initial post should be 250-300 words. There must be at least two APA formatted references (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Discussion

 

  1. Think about how you would feel  if there were no rules regarding how your credit card information was  stored on merchants’ websites. Consider whether you would purchase items  online. Would the Internet be as big as it is today if we had no laws  or information security policies regarding data that makes up an  e-commerce transaction? Provide rationale for your answer.
  2. Imagine that you work for an  organization that has no Internet use policy. Employees use the Internet  in whatever way they want using company-owned personal computers. Could  this cause a problem for the organization? Why or why not?

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

INT 2681

 

Section 1 Cisco Binary game

https://learningnetwork.cisco.com/s/binary-game

Provide a screen shot of you achieving level 4.  

Section 2 Research Paper

A one page research paper on the National Cyber league.  Must be in your own words (I HATE COPY AND PASTE). Word document. The research paper on the National Cyber League (NCL) is first and foremost about introducing you to cybersecurity Capture The Flag (CTF) exercises. The paper is to have one-inch margins and answer these questions: who, what, where, when, why, and how.  You also are to list at least three benefits from joining and participating in the NCL.  The paper will be evaluated on how well you have expressed an understanding of the National Cyber League. 

LEED Certification assessment

Topic: Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area or work location. Remember to get permission from security. If you wish you may approach the subject in terms of Best Practices. 

InfoTech Import in Strat Plan 12

 The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 300 words

 

As connected medical devices are increasingly adopted within healthcare providers—from patient beds to syringes—so are the cyber risks associated with them.

Discuss the policies that need to be in place for medical device management and maintenance

Discussion

200 words+

What are authentication and authorization?

What are authentication and authorization used for?

What is Principle of Least Privilege?

Are you in favor or against the principle of least privilege? 

Justify your your answer.

Please list your reference/s

Discussion 9- Project HR & Stakeholder Mngt

Chapter 12 – Negotiations

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. What are tips for negotiations within projects? What examples/situations can you share when you have been in project negotiations? 
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22