Threat Model

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (” Do not copy and paste images from the Internet, I need 100% original work, no plagiarism is encouraged or tolerated” ). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately 2 to 3 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

paper

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What are key issues with interacting and using a computer for people who are visually impaired?
  • What input and output devices are specifically created to help the visually impaired use a computer?
  • What would be the privacy concerns of visually impaired learners and how is their privacy managed?

5s week 10 assignment BS

In 300 Words

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Please include references, strictly no copy paste.

Technology Entrepreneurship

Que 1:

Discuss the advantage of acquiring and maintaining intellectual property rights

Que 2:

Discuss this statement: “How do you know if the company is progressing or not?” What separates “vanity metrics” and real, actionable metrics.

Que 3: 

Discuss this statement: “With the rapid advances in science, growing market opportunities in convergent technology marketplaces and sustained levels of public and private investment in research and development means there are ample opportunities for technology-based entrepreneurs”. Discuss the opportunities for technology-based entrepreneurs.

NOTE:  My assignment will need actual references from EBSCO, Google scholar, or Semantic Scholar with a website link at the end 

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.

Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

In WORD document 

Youtube link:  https://www.youtube.com/watch?v=aeekxpX3YTU 

Organ Leader and decision making PHDIT

 

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Net Neutrality Discussion Board

The term net neutrality refers to the equality of data as it is transferred over the Internet. For instance, the data from an individual and the data from Microsoft are treated the same. A recent controversy surrounding the cable giant Comcast brought up the possibility of ISPs interfering with the delivery of Internet data. According to complaints by customers, Comcast has been blocking the use of P2P sites like BitTorrent to download movies, music, and other large files. Comcast, like most ISPs, includes a statement in its terms of service that allows it to use tools to “efficiently manage its networks,” in order to prevent those customers using a higher than normal level of bandwidth from interfering with the access of other customers. However, the Comcast issue was considered by many to be a blatant net neutrality issue—blocking access to multimedia from sources other than its own cable sources.

Do you think the actions taken by Comcast were ethical?

Does an ISP have a right to block selected Internet traffic? Why or why not?

Was there a more ethical way Comcast could have handled the problem of some users consuming a higher than normal level of bandwidth?

computer programing

 what is useful for, how would you apply it in your class or school work, or future/ current job about User-Defined Functions, User-Defined Simple Data Types, Namespaces and String Type, Arrays and Strings. you should have at least a paragraph ( 200 Words )