Discussion – Information Governance

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Calderaro, A., & Craig, A. J. S. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), 917–938. https://doi.org/10.1080/01436597.2020.1729729

Setyadi, R. (2019). Assessing Trust Variable Impact on the Information Technology Governance Using Business-IT Alignment Models: A Model Development Study. 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Sustainable Engineering and Creative Computing (ICSECC), 2019 International Conference On, 218–222. https://doi.org/10.1109/ICSECC.2019.8907224

Using Stack to Evaluate Expression

 

Using a Stack to Evaluate an Expression

We often deal with arithmetic expressions written in what is called infix notation:

         Operand1 op Operand2

We have rules to indicate which operations take precedence over others, and we often use parentheses to override those rules.

Example: Suppose we have this infix expression Q:

         5 * ( 6 + 2 ) – 12 / 4

We can use two stacks to evaluate the expression: a stack for operands, a stack for operators (and parenthesis). We can split the string into array of tokens.

  1. While there are still tokens to be read in,

   1.1 Get the next token.

   1.2 If the token is:

       1.2.1 A number: push it onto the value stack.

       1.2.2 A variable: get its value, and push onto the value stack.

       1.2.3 A left parenthesis: push it onto the operator stack.You can also
choose to push the left parenthesis into the operand stack.

       1.2.4 A right parenthesis:

         1 While the thing on top of the operator stack is not a

           left parenthesis,

             1 Pop the operator from the operator stack.

             2 Pop the value stack twice, getting two operands.

             3 Apply the operator to the operands, in the correct order.

             4 Push the result onto the value stack.

         2 Pop the left parenthesis from the operator stack, and discard it.

       1.2.5 An operator (call it thisOp):

         1 While the operator stack is not empty, and the top thing on the

           operator stack has the same or greater precedence as thisOp,

           1 Pop the operator from the operator stack.

           2 Pop the value stack twice, getting two operands.

           3 Apply the operator to the operands, in the correct order.

           4 Push the result onto the value stack.

         2 Push thisOp onto the operator stack.

  1. While the operator stack is not empty,

    1 Pop the operator from the operator stack.

    2 Pop the value stack twice, getting two operands.

    3 Apply the operator to the operands, in the correct order.

    4 Push the result onto the value stack.

  1. At this point the operator stack should be empty, and the value

   stack should have only one value in it, which is the final result.

Note: Pay attention to negative operator and parenthesis.

Requirements:

1. Submit the repl.it link of the program

2. Copying code from others or from the Internet is considered as cheating and will result in 0 for the project

CIS498 PROCESS FLOW DIAGRAM AND DESCRIPTION

 WEEK 6 ASSIGNMENT – PROCESS FLOW DIAGRAM AND DESCRIPTION

Week 6 Assignment – Process Flow Diagram and Description

Overview

You just received a memo from the Project Manager with updates and a request for a process flow diagram. Read the memo below. 

Memo from the PM:We have decided to buy space on Amazon Web Services (AWS) and maintain our own e-commerce applications and databases there. This was based partly on your recommendation and the recommendation of the other team members.What does this mean for you?We’ll need your part of the project to go into a Business Requirements Document for the project plan to be sent up to the CEO for final approval. The CIO and I will review your work, so please be detailed in your responses so that we can allocate resources appropriately.

Instructions

For this week, you will need to create a process flow diagram for the project plan, showing how you want things to go with the new system. You can build on previous design work you’ve done in this area or start from scratch.You have all the Microsoft products available to you in the marketing department, so feel free to use any Microsoft product to create the process flow diagram. Visio is very popular among IT folks, so feel free to create your process flow diagram using Visio, but you can also use MS Word, PowerPoint, or whatever you’re comfortable with, as long as the output is a PDF or a Microsoft document.Your process flow diagram should include each of the following elements:

  • Easy-to-read formatting, including a font size that is large enough to easily read, simple language that is easy to understand quickly, and a clearly visible title that identifies the process being diagrammed.
  • A clear start and end to the process flow. All items are in the proper sequence with arrows or other directional objects used to indicate that sequence. Flow is logical throughout.
  • Distinct shapes for each necessary action, and are identified clearly through a legend.

Take a look at the Example Process Flow Diagram [PDF] for reference.In addition to the process flow diagram, you will also need to use the MS Word template to submit a written description of the diagram to ensure that the PM and any others reading the diagram will know what is being communicated. Your description, much like your diagram, will be specific to the process you are supporting in the project based on your area of expertise.Your description should respond to the questions below that align with your role in the project and should address all parts of the process flow diagram:Data Analytics: How data will be stored, created, modified, and deleted. Include all the requirements such as data security, data integrity, resilience, etc.Data Management: Physical storage and security. Backup and disaster recovery plan, access control, etc.Cybersecurity: Access control, malware concerns, physical and logical access, forensic investigation, etc.IT Project Manager: Project control, PM methodologies, scope control, end-user input, training, etc.Networking: Physical and logical topologies, network infrastructure build-out and expansion, required equipment and physical media acquisition and control, etc.Software Developers: Applications needed, input from end-users, design process, steps of the SDLC for app development, etc.Note: Since this is the capstone class, work you submitted to a previous class is permitted but must be 100% original work created by you and not shared with anyone else. The best process, therefore, is to build on previous work and adapt to your fictitious company for this ongoing project.As a reminder, for this assignment, you are submitting two deliverables that are 100% original:

  1. A process flow diagram in PDF format.
  2. A written memo using the provided MS Word template that includes an image of your process flow diagram.

Article Review – Denial of Service

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack.

GUIDELINES:

Paper must be a minimum of 2 pages double spaced

Make sure you are using at least two (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Discussions and Research paper

Discussion 1:

  Discuss  the challenges that incident handlers face in identifying incidents  when resources have been moved to a cloud environment.   Follow  up your discussion with a recent article discussing a company who has  begun utilizing a cloud environment and what challenges they may  face.  Make sure to cite the article.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Discussion 2:

 You can get a basic understanding if  individuals are being held accountable for adherence to security  policies by examining policy violations, incidents, and security  awareness. These basic measurements are as follows: 

  • Number of security violations by employees reported
  • Number of incidents that could have been avoided
  • Completion and competency rate for security awareness

Answer the following question(s): 

  1. Are there other ways to measure  accountability for adherence to security policies? If yes, provide an  example. If not, explain your answer.

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Research Paper:

  When  law enforcement becomes involved, the need may arise to freeze systems  as part of the evidence. There is also the likelihood that the incident  will become known publicly. Do you think these issues play a significant  part in the decision to involve law enforcement? Why or why not? Can  you name some situations in which you believe that large organizations  have decided not to involve law enforcement?    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

Assignment:

Please see attachment.

FireFold – EcoFlow Solar Panel

 FireFold is a one-stop-shop for EcoFlow Solar Panels and all kinds of genuine networking accessories such as sleek socket ultra-thin electrical outlet cover, ethernet cables, Chargers, IOT Installations, and much more. Shop now! 

Project Part 2: Risk Assessment Plan

 Please see attached.

Project Part 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan. For this part of the project:

  1. Research risk assessment approaches.
  2. Create an outline for a basic qualitative risk assessment plan.
  3. Write an introduction to the plan explaining its purpose and importance.
  4. Define the scope and boundaries for the risk assessment.
  5. Identify data center assets and activities to be assessed.
  6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
  7. Identify relevant types of controls to be assessed.
  8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
  9. Develop a proposed schedule for the risk assessment process.
  10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 4–6 pages

Privacy Compliant Systems Design

Draw an annotated DFM diagram for the following ER scenario. Use annotations from the list in  Week 3 documents. 

Upon your arrival at the Department of Emergency Medicine, you will need to register at the reception desk located at the waiting room. You have to complete a paper form with the requested information and deliver the form to the clerk at the admission desk. The clerk may ask you few follow up questions based on the information you provide in the form. Your information is entered by the admission clerk in a computer systems and the paper form is filed in a cabinet. Our hospital systems have five locations in Texas, Louisiana, Arkansas, Mississippi and Missouri. You can receive services at all these locations in the future since they will have access to your electronic admission records which is stored in in amazon cloud. All communications between Amazon cloud and the local systems use secure protocols.  While patients’ name, SSN, address and telephone number, and dates of visits are stored in Amazon cloud as plain texts, patients’ health and insurance related information are saved in encrypted form. Admission clerks have access to unencrypted data, but the doctors, hospital administrators, and billing personnel have access to all data. Treatment category (not specific disease information) information is shared with the specified insurance companies for the billing purposes. Copies of the health records are made available to the medical researchers after removing patients’ name, SSN, address and telephone numbers. 

week-15

 Discuss  a situation at work where you felt you had to consider the ethics of something you were being asked to do.