Business cont plan and disaster recovery plan

 When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement? 

INT 2681…..3

Do the following labs in testout

lab 3.3.3

lab 3.1.10

lab 4.1.7

lab 4.2.3

lab 4.2.5

lab 4.2.6

lab 4.2.9

lab 5.1.5

lab 5.1.6

lab 6.1.9

lab 6.1.11

lab 6.1.12

lab 6.2.4

lab 7.4.5

lab 7.4.6

lab 7.4.7

lab 7.4.8

lab 7.4.9

All labs in chapter 8

All labs in chapter 9

All labs in chaper 10

All labs in chapter 11

All labs in chapter 12

All labs in chapter 13

All labs in chapter 14

All labs in chapter 15

how the course is applied in workplace

 

What was your Main term course? Reflect on the connection between knowledge or concepts from this courses and how those have been or could be applied in the work place. 

Include the following: Course Name, Course ID, and a 300 word description of how knowledge and skills obtained in this course were applied in your current position or an employment opportunity in your field of study. 

Cybersecurity Strategy, Law, and Policy

 

The chief technology officer (CTO) has indicated that your  organization has been requested by the National Security Council (NSC)  to comment on the upcoming National Cybersecurity Strategy. The NSC has  asked for specific recommendations as it relates to the next  cybersecurity strategy, private/public partnerships, and comments on how  specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this  assignment. It is up to the team members to decide how they will plan,  meet, discuss, and complete the six sections of the paper. Remember, if a  member fails to complete his or her part of the work, the team is still  responsible for all sections. You will also complete a peer review for  yourself and for each member of the team. The peer feedback will be  incorporated into each team member’s assignment grade.

As a group, use the Cybersecurity Strategy, Law, and Policy Team Assignment Template to write your paper, which should cover the following topics:

Part 1: National Security Strategy and Cybersecurity

  • After reading the National Security Strategy (2017), comment on the following.
     

    • Should the United States create a separate cybersecurity strategy to  be published alongside the National Security Strategy (NSS), or do you  feel the NSS is sufficient? Why or why not?
       
    • Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity?
       

Part 2: Public/Private Partnerships

  • After reading the Cybersecurity Act of 2015, address  the private/public partnership with the DHS National Cybersecurity and  Communications Integration Center (NCCIC), arguably the most important  aspect of the act. The Cybersecurity Act of 2015 allows for private and  public sharing of cybersecurity threat information.
     

    • What should the DHS NCCIC (public) share with private sector  organizations? What type of threat information would enable private  organizations to better secure their networks?
       
    • On the flip side, what should private organizations share with the  NCCIC? As it is written, private organization sharing is completely  voluntary. Should this be mandatory? If so, what are the implications to  the customers’ private data?
       
    • The government is not allowed to collect data on citizens. How  should the act be updated to make it better and more value-added for the  public-private partnership in regards to cybersecurity?
       

Part 3: Private Sector Organizations

  • Review the General Data Protection Regulation (GDPR) of  the European Commission (EU). It includes many provisions and arguably  strengthens data protection for individuals within the EU. It even  includes the right to be forgotten. The United States does not have a  similar regulation. There have only been a few regulations implemented  related to US citizens’ private data, which include medical and  financial industries. Some argue implementing regulation such as GDPR in  the United States would hinder innovation. They contend that the End  User License Agreements (EULA) provide sufficient protections and allow  the citizens to make the choice of what is and is not shared.
     

    • As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?
       

Part 4: Protecting Critical Infrastructure and the Homeland

  • The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
     

    • What does that mean to private organizations such as yours?
       
    • If most critical infrastructure in the United States is owned by the  private sector, what responsibility does the DoD have in this regard?
       
    • Some would argue US laws are outdated and thus the DoD has little  authority to assist. Others would argue US laws were purposely  established such that the private sector would defend itself and not  need assistance from the military. Obviously, for the DoD to assist, it  would need the private organizations’ data. Said another way, the DoD  would need your data as a private citizen/customer of that organization.  Those that believe our laws need to be updated argue giving up privacy  for protection is legitimate.
       
    • Others will argue that we should not give private information of  citizens to the government for any reason. As a citizen, would you feel  comfortable with this? As a private organization, would you feel  comfortable giving information that may contain your customers’ private  data to the DoD?
       
    • Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?
       

Part 5: Cybersecurity Technologies

  • The authors of the National Security Strategy (NSS) are  looking to address particular technologies that have the opportunity to  revolutionize cybersecurity. They believe that blockchain technology is  a revolutionary technology that has the ability to significantly  improve cybersecurity.
     

    • What would be your recommendation for how the NSS should incorporate this technology to the public?
       
    • Propose exactly what you believe should be written in the NSS.  Specifically, explain the blockchain technology in layman’s terms to  nontechnical people that may be reading the NSS, give examples of how it  could be used to provide revolutionary cybersecurity, include examples  of how it is being used to provide cybersecurity solutions, and discuss  what, if any policies or laws should be established to mandate its use  in specific industries.
       

Part 6: Ethics in Cybersecurity.

  • Ethical issues are at the core of what we do as cybersecurity  professionals. Think of the example of a cyber defender working in a  hospital. They are charged with securing the network, medical devices,  and protecting sensitive personal health information from unauthorized  disclosure. They are not only protecting patient privacy but their  health and perhaps even their lives. Confidentiality, Integrity,  Availability – the C-I-A triad – and many other cybersecurity practices  are increasingly at play in protecting citizens in all walks of life and  in all sectors. Thus, acting in an ethical manner, is one of the  hallmarks of a cybersecurity professional. 
    • What are the ethically significant harms that may result from mass surveillance (including by government and corporations)? 
    • What are the ethically significant harms that may result from  emerging technologies such as blockchain technology, artificial  intelligence, and machine learning. 

Notes

  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.
     
  • Use additional sources as needed and be sure to critically analyze the questions, addressing the pros and cons in your proposal.
     
  • Use visuals where appropriate.
     
  • Each team will submit one assignment.
     
  • You will receive an individual grade for this assignment based on your contribution to the overall project.  

HCI-W3

Usability Journal

Usability Journal – write three (3) journal entries.

  • Each entry shall be approximately 500 words each.
  • Each entry shall focus on an object that contains a bad usability design. These are PHYSICAL objects, not software or website interfaces. 
  • Explain why the object being described does not maintain good usability practices.
  • The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.

Example:

  • A remote control.
    • What about the remote control makes the device both a good and bad example for the usability perspective?
    • Each deliverable will contain:
    • Three entries with 300-400 words for EACH entry
    • APA citation with examples from scholars explaining best practices that should be followed
    • An example image of the bad design practice followed
    • An example of good potential practices to follow

Human computer interaction and usability

 

  1. A Usability Evaluation examines the way users interact with products and services in order to achieve a goal. Often times, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:

    • Learnability 
    • Findability 
    • Satisfaction 
    • Efficiency 
    • Memorability 
    • Effectiveness 
    • Ease of Use 
    • Error Handling 
    • Remember, usability is not one-dimensional. It is a complex system of properties that integrates many factors. It is subjective from user to user. For this assignment,  you are asked to explore one of these topics. You are to conduct an analytical research review of the assigned usability category/dimension above by evaluating 6-10 academic journals that focus on this topic. 

      You MUST include the following as part of the assignment. 

    • Abstract
    • Title Page
    • Introduction
    • Literature Review of Term
    • Conclusion
    • Considerations:
    • Must provide a minimum of six sources and how it was evaluated by the authors/scholars in each study
    • Must evaluate the study method used to complete the analysis.
    • Identify any unique similarities or differences across each study.
    • Define your own term based on your understanding of the literature you’ve evaluated.
    • Explain how you derive this definition.
    • Qualify/quantify the definition by explaining how many sources you used to come up with this definition.
    • Make Recommendations of Additional Ideas For Future Literature Review Consideration
    • The paper should be a minimum of 6 pages. This does not include the cover page, abstract, or citations. You must use APA format throughout the entire paper.

analytical memo

write an analytical memo 1 page 

 Write an analytic memo as if you were the researcher. Questions to consider: What patterns do you notice? What are the ideas/themes? If you were categorizing and coding the data thematically, what ideas stand out most? How do the participants differ in how they approach the question? How does each participant’s experience impact the way they answered the question? What qualitative “findings” or interpretations can you make with this sample data set? 

introduction to computer

  1. What are the five functions of Microsoft Word?
  2. How can you apply them in a resume document?
  3. How do you tailor a resume to a job post? (Use details)

AI helping with protecting people's health

AI is a growing topic and the use of data can have an impact on the way we live our lives. If technology could predict when someone is buying enough cigarettes to put them at more risk for cancer, or by purchasing an increasing amount of fast food that could cause health problems in the near future, would this be acceptable? How do you believe the laws regarding AI need to evolve to protect the way we live our lives? What laws would you implement to protect consumer information?

Module 04: Critical Thinking (Collaborative Technologies and the Internet of Things (IoT)

  Module 04: Critical Thinking

Collaborative Technologies and the Internet of Things (IoT)

The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.

  • Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
  • Discuss the potential impact that IoT can have on how people live.
  • Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
  • How has the IoT been impacted by the pandemic? Explain specific examples.

Required: 

· Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability

· Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Transactions on Internet Technology (TOIT) – Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1–4.https://doi.org/10.1145/3361071

· Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective. ACM Computing Surveys, 54(5), 102.

· Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks. IEEE Internet of Things Journal, 7(12), 11473–11491.

· Recommended:

· Chapter 4 PowerPoint slides

should meet the following requirements:

  • Be 4-5 pages in length
  • Use APA (7th ed) style guidelines.
  • Support yourWOEK with course material concepts, principles, and theories from the textbook and at least 7 seven scholarly,  peer-reviewed journal articles
  • Add some Figure, table, Visuals (important )