Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

User Interface Design Document.

  

Assignment:

create a User Interface Design Document for this desktop part of the vehicle of interest application. 

The project background and requirements information are attached. Take the template User Interface Design Template and complete it for your design. 

You are to use Pencil GUI Designer for screen mockups.

This design must conform to good design standards.

Discussion question, 350 words and 2 references.

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Practical Connection

 

This is the Practical Connection Assignment for this course. The purpose of this assignment is to help connect the concepts learned in this course to real-world situations that you may face as an IT professional.

For this assignment, you will write an essay addressing the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional. Your essay should address the following.

  • a definition and overview your selected law or regulation
  • consideration of the duties of an Information Technology professional
  • an analysis of the application of that law or regulation in the context of the identified duties
  • a reference page(s)

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. This is not a formal paper, but should maintain scholarly tone and rigor, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus. 

Here are a few details about the overall research paper.

  • Your paper does not require a Title page.
  • Your paper must include a Reference page.
  • Your paper should NOT include an abstract.
  • Your paper must include a minimum of 4 peer-reviewed resources (articles or papers)
    • Cited sources must directly support your paper (i.e. not incidental references)
  • Your paper must be at least 500 words in length 
    • Reference pages are NOT included in calculating the paper length. (Neither are Title pages or abstracts if present).

If you are not sure how to identify peer-reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title. 

Include at least one quote from each of 3 different articles.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Discussion

Operations Security

IT Policy Compliance and Compliance Technologies

Discuss tracking, monitoring, and reporting of various compliance systems and explain the relevance of such compliance systems. 

Virtuous Business Model

What would your story look like if someone asked you to present the relation of the analytical view to its paradigm.

Analyze your story from the perspective of the Virtual Business Model.

400 words with 3 references. 

Disaster recovery plan assignment

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

case study

 

Pinto – Case Study 14.1 (516-517) – New Jersey Kills Hudson River Tunnel Project

Note if you already did this case study in a prior course you can instead complete another journal article review instead (on an article that you haven’t done a review on previously – be sure to relate it to a topic from the course).

This assignment involves that the student read the case study and answer all questions at the end of the case study in a 4-5 page paper. Your answers must include substantial support from at least two (2) scholarly journal articles on project management. See below for advice on how to find these journal articles. Refer to the course schedule matrix for due dates for all case assignments. All case study assignments are due at 11:59 p.m. EST (Sunday) on the assigned week.

This course requires that the student is able to conduct weekly online library research by utilizing UC’s Library (online) in order to locate scholarly journals such that the student can successfully complete weekly papers regarding cases and/or articles in project management, and such that the student can engage in the weekly assignments.  The following is one example of how to navigate iLearn and the online Library in order to conduct research:

Log onto your course on iLearn

Go to the home page for this course

Click on the “Library Resources” icon in the left-hand column of this webpage, This will open the Library webpage.

Under the search boxes for the UC Mega Search click the box to the left of the phrase Scholarly (Peer Reviewed) Articles. Then click the Search box.

This will give you a Basic Search page. Under the Search boxes click Advanced Search.

The Advanced Search will appear with three (3) search boxes.

In the first box type “project management”

Change the “Select a Field (optional)” selection to “SO Journal Source/Title”.

In the second box type any of your search terms (“scope”, monitoring”, etc.)

Change the “Select a Field (optional)” to “TX All Text”.

You can either add an additional search term in the third box or hit the blue Search button.

This will bring up a large selection of potential articles based upon your search parameters. You can narrow down your search by using additional search terms.

 Every paper typed in this course should be in APA formatting (title page, reference page, NO abstract page, in-text citations, running head, page numbers, Times New Roman 12 font, 1 inch margins, double-spacing, etc…).  Points will be deducted for papers that are not typed in APA formatting.  Also, every paper in this course needs to be based on research from a scholarly source that is retrieved from UC’s Library.  Your weekly research papers should include two sources, the textbook and the scholarly case/article that you found.  Papers that are not based on a scholarly source(s) will receive a grade of “0.”   

Discussion

 
After reading chapter 3, analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.