Discussion

 

1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Future impact of the internet

 

Week 8 Written Assignment

  • Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.
  • The title page and bibliography do not count towards the word count.
  • Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference
  • After completing the essay, save and upload the document in the Assignments section of the e-classroom.
  • Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that forecasts future impact of the Internet as its role in society continues to evolve. You should point out new issues if you foresee them.

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

OE W 4 D

 This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic. 

Incident Detection

select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.

Please respond to the following in a post of 500 words:

  • Distinguish between incident detection precursors and incident detection indicators.
  • For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.

week 7 individual

 Minimum 600 words

This assignment should be in APA format and have to include at least two references.

As  you consider the reputation service and the needs of customers or  individual consumers, as well as, perhaps, large organizations that are  security conscious like our fictitious enterprise, Digital Diskus, what  will be the expectations and requirements of the customers? Will  consumers’ needs be different from those of enterprises? Who owns the  data that is being served from the reputation service? In addition, what  kinds of protections might a customer expect from other customers when  accessing reputations?

Discussion

Operations Security – Risk management policies

Scenario :

“You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from the speakers.”

Discussion Question:

  • What is the first possible diagnosis that comes to your mind?
  • What is the first step you would take in this situation?
  • What is the second step that you would take in this situation?

Hate Crime Ecpa act

1. Legally define “hate crime,” and explain why hate crime legislation has been so controversial in the United States.

2. What are the major requirements established by the Electronic Communication Privacy Act?

Discussion Questions

 Research software that will allow you to review a file’s metadata or generate Hash values for files.  Write a review of one software and annotate the pros and cons of that particular software. 

IT345 7 discussion

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources

 

Topics:

  • How well can we predict the consequences of a new technology or application?
  • Who should make the decision for a business on what technology the adopt?
  • What does the term “need for reasonable judgement” mean?
  • Do sites like Wikipedia hold any credibility?