research

 

Assume you are an IT security specialist for a large U.S. online  retail organization that does business internationally. Your CIO has  asked you to thoroughly review the new General Data Protection  Regulation (GDPR) recently implemented in the European Union. He wants  to understand exactly what the organization must do to comply with this  regulation when doing business with EU customers.

Provide a detailed discussion about the rules for businesses and the rights of the EU citizens.

Include a discussion of the following:

  • What does the GDPR govern?
  • What rights do the EU citizens have with regard to their data?
  • What is considered personal data under this regulation?
  • What is considered data processing under this regulation?
  • Describe the role of the data protection authorities (DPAs).

Discuss, in detail, how the GDPR will change business and security  operations for your organization. Provide the CIO with a recommended  checklist for GDPR compliance and discuss processes and policies that  may need to be changed in order to comply with GDPR.

In your conclusion, address what you think will be the financial  impact to the organization, both in terms of compliance and any lack of  compliance. 

Assignment Requirements

  1. The paper should be 3–4 pages.
  2. Use the rubric guide
  3. Use Times New Roman 12 pt font.
  4. Use APA formatting for paper, citations, and references.
  5. Be sure to cite your sources and provide the appropriate references

Week 11 Assignment

 

Instructions

Please share (3 to 4 paragraphs) on what you learned when you read chapter 11 along with Overview of Mobile Forensics (.PDF file) and identify what makes this different form acquiring computers in the traditional sense.

THEN

Please share (3 to 4 paragraphs) on what you learned when you read Developing Processes for Mobile Forensics (.PDF file)

THEN

Please share (3 to 4 paragraphs) on what you learned when you read Future of Mobile Foresics (.PDF) file and identify if you thought the author may have missed anything as well as your own thoughts – what did you learn!?

Capturing Metadata(Table Info) from GitHub

I want to capture Metadata (one table information) from GitHub. Please check the instructions below:

1. I have to use python code to capture the information.

2. I have a GitHub link(Where I have the data), from that link, I have to capture the data using python code (API).

Create an actionable plan

 Create an actionable plan including executive-level support and budget allocation to ensure security controls can be rapidly updated and expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

Procedures to track performance
Procedures to monitor and measure performance for areas of improvement
Procedures to identify new threats, vulnerabilities, or any countermeasures
Procedures to obtain feedback on the effectiveness of policies
Procedures and technical tools to monitor the internal and external environment
Procedures for budget allocation
Procedures to catch any oversights 

Serialization

 Using the Internet and other available resources, write a paper (minimum of 300 words excluding references, use APA format) explaining what is serialization its advantages and disadvantages? When do you use serialization? 

Week 3 – Assignment

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Journal articles:

web browser forensics

 

Last week you completed a short APA research paper on an overview of a particular Web Browser, this week we are going to dig a little deeper. You are to explore the different web browser forensic tools available, both paid and free. You are to research the different tools available to you, concentrate on free tools, and provide a summary of the tools and how you can use them to perform web browser forensics. You should also note whether the tools can be used on virtual machines.

Your research should include a 3-4 page executive summary paper in APA format, with all supporting references and screen shots of the software you explored that is available for you to use. The goal is to be able to use the software to conduct the investigation and analysis and provide a final report for testimony, just to give you an idea on where we are heading

Malware Attacks – Playbooks or Standard Operating Procedures (SOP)

I have a lengthy project. The details are in the attachments along with the due date. Each week for the next four weeks an assignment is due. Each page on the attached word document represents each week. Please see the attachment for details. First assignment is due on Sunday 4/4/2021.

The four assignments are as follows:

 Malware Attacks – due April 4, 2021 

 Online Interactions – due April 11, 2021 

 Mobile Security – due April 18, 2021 

 Backup Policies – The total of all these assignments are Due on April 25, 2021 

Data visualization – discussion

This week we will discuss what is required to really make visualizations work. Berinato (2016) notes that the nature and purpose of your visualizations must be considered in order to start thinking visually. Berinato combines the nature and purpose into a 2×2 matrix that defines the following four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz.  Select and discuss one of the four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz from Berinato’s 2016 article.

Reference: Berinato, S. (2016, June). Visualizations that really work. Harvard Business Review. Retrieved from https://hbr.org/2016/06/visualizations-that-really-work

– apa

– 2 pages

– no plagiarism